On Fri, 2017-03-31 at 18:21 +0300, Dan Carpenter wrote:
> We removed this initialization as a cleanup but it is probably
> required.
>
> The concern is that "nel" can be zero. I'm not an expert on SELinux
> code but I think it looks possible to write an SELinux policy which
> triggers this bug. GCC doesn't catch this, but my static checker
> does.
>
> Fixes: 9c312e79d6af ("selinux: Delete an unnecessary variable
> initialisation in range_read()")
> Signed-off-by: Dan Carpenter <[email protected]>
Nice catch, thanks!
Acked-by: Stephen Smalley <[email protected]>
>
> diff --git a/security/selinux/ss/policydb.c
> b/security/selinux/ss/policydb.c
> index 658247f98dc1..0080122760ad 100644
> --- a/security/selinux/ss/policydb.c
> +++ b/security/selinux/ss/policydb.c
> @@ -1832,7 +1832,7 @@ u32 string_to_av_perm(struct policydb *p, u16
> tclass, const char *name)
>
> static int range_read(struct policydb *p, void *fp)
> {
> - struct range_trans *rt;
> + struct range_trans *rt = NULL;
> struct mls_range *r = NULL;
> int i, rc;
> __le32 buf[2];
_______________________________________________
Selinux mailing list
[email protected]
To unsubscribe, send email to [email protected].
To get help, send an email containing "help" to [email protected].