Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 268875 (CVE-2009-1184) - Kernel: selinux_ip_postroute_iptables_compat <, <2.6.28.? < network restriction bypass (CVE-2009-1184)
Summary: Kernel: selinux_ip_postroute_iptables_compat <, <2.6.28.? <
Alias: CVE-2009-1184
Product: Gentoo Security
Classification: Unclassified
Component: Kernel (show other bugs)
Hardware: All Linux
: High normal (vote)
Assignee: Gentoo Security
Whiteboard: [linux <] [linux >=2.6.28 <2...
Depends on:
Reported: 2009-05-06 22:39 UTC by Stefan Behte (RETIRED)
Modified: 2013-09-05 03:09 UTC (History)
2 users (show)

See Also:
Package list:
Runtime testing required: ---


Note You need to log in before you can comment on or make changes to this bug.
Description Stefan Behte (RETIRED) gentoo-dev Security 2009-05-06 22:39:57 UTC
CVE-2009-1184 (
  The selinux_ip_postroute_iptables_compat function in
  security/selinux/hooks.c in the SELinux subsystem in the Linux kernel
  before, and 2.6.28.x before, when compat_net is
  enabled, omits calls to avc_has_perm for the (1) node and (2) port,
  which allows local users to bypass intended restrictions on network
  traffic.  NOTE: this was incorrectly reported as an issue fixed in