[SELinux]: Fix double free in selinux_netlbl_sock_setsid()
authorPaul Moore <paul.moore@hp.com>
Tue, 29 Jan 2008 03:49:00 +0000 (19:49 -0800)
committerDavid S. Miller <davem@davemloft.net>
Fri, 1 Feb 2008 03:27:04 +0000 (19:27 -0800)
commite1770d97a730ff4c3aa1775d98f4d0558390607f
tree64ad3c2d24b5506861aac9cef8f08c0e0fbd9959
parent1a6509d991225ad210de54c63314fd9542922095
[SELinux]: Fix double free in selinux_netlbl_sock_setsid()

As pointed out by Adrian Bunk, commit
45c950e0f839fded922ebc0bfd59b1081cc71b70 ("fix memory leak in netlabel
code") caused a double-free when security_netlbl_sid_to_secattr()
fails.  This patch fixes this by removing the netlbl_secattr_destroy()
call from that function since we are already releasing the secattr
memory in selinux_netlbl_sock_setsid().

Signed-off-by: Paul Moore <paul.moore@hp.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
security/selinux/ss/services.c