This patch fixes a double free (security_netlbl_sid_to_secattr() already
calls netlbl_secattr_destroy() when it returns !0) introduced by
commit 45c950e0f839fded922ebc0bfd59b1081cc71b70 and spotted by the
Coverity checker.
Signed-off-by: Adrian Bunk [EMAIL PROTECTED]
---
---
On Monday 28 January 2008 5:35:40 pm Adrian Bunk wrote:
On Mon, Jan 28, 2008 at 05:23:46PM -0500, Paul Moore wrote:
Thanks for finding this mistake, however, I'd rather see it fixed
by removing the netlbl_secattr_destroy() call in
security_netlbl_sid_to_secattr() as it really shouldn't be
On Mon, Jan 28, 2008 at 05:23:46PM -0500, Paul Moore wrote:
On Monday 28 January 2008 5:09:38 pm Adrian Bunk wrote:
This patch fixes a double free (security_netlbl_sid_to_secattr()
already calls netlbl_secattr_destroy() when it returns !0) introduced
by commit
On Monday 28 January 2008 5:09:38 pm Adrian Bunk wrote:
This patch fixes a double free (security_netlbl_sid_to_secattr()
already calls netlbl_secattr_destroy() when it returns !0) introduced
by commit 45c950e0f839fded922ebc0bfd59b1081cc71b70 and spotted by the
Coverity checker.
Hi Adrian,