Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!

Bug 268875 (CVE-2009-1184)

Summary: Kernel: selinux_ip_postroute_iptables_compat <2.6.27.22, <2.6.28.? <2.6.28.10 network restriction bypass (CVE-2009-1184)
Product: Gentoo Security Reporter: Stefan Behte (RETIRED) <craig>
Component: KernelAssignee: Gentoo Security <security>
Status: RESOLVED FIXED    
Severity: normal CC: hardened-kernel+disabled, kernel
Priority: High    
Version: unspecified   
Hardware: All   
OS: Linux   
URL: http://patchwork.ozlabs.org/patch/25238/
Whiteboard: [linux <2.6.27.22] [linux >=2.6.28 <2.6.28.10]
Package list:
Runtime testing required: ---

Description Stefan Behte (RETIRED) gentoo-dev Security 2009-05-06 22:39:57 UTC
CVE-2009-1184 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1184):
  The selinux_ip_postroute_iptables_compat function in
  security/selinux/hooks.c in the SELinux subsystem in the Linux kernel
  before 2.6.27.22, and 2.6.28.x before 2.6.28.10, when compat_net is
  enabled, omits calls to avc_has_perm for the (1) node and (2) port,
  which allows local users to bypass intended restrictions on network
  traffic.  NOTE: this was incorrectly reported as an issue fixed in
  2.6.27.21.