diff options
author | Richard Guy Briggs <rgb@redhat.com> | 2015-04-14 11:01:02 -0400 |
---|---|---|
committer | James Morris <james.l.morris@oracle.com> | 2015-04-15 10:13:20 +1000 |
commit | 5deeb5cece3f9b30c8129786726b9d02c412c8ca (patch) | |
tree | 65ca929e44dc78b71be07d22091041f6dc80b936 /Kbuild | |
parent | 3add594bf60a901ba973cdcdafd47af2aac0ac1c (diff) | |
download | linux-5deeb5cece3f9b30c8129786726b9d02c412c8ca.tar.bz2 |
lsm: copy comm before calling audit_log to avoid race in string printing
When task->comm is passed directly to audit_log_untrustedstring() without
getting a copy or using the task_lock, there is a race that could happen that
would output a NULL (\0) in the middle of the output string that would
effectively truncate the rest of the report text after the comm= field in the
audit log message, losing fields.
Using get_task_comm() to get a copy while acquiring the task_lock to prevent
this and to prevent the result from being a mixture of old and new values of
comm would incur potentially unacceptable overhead, considering that the value
can be influenced by userspace and therefore untrusted anyways.
Copy the value before passing it to audit_log_untrustedstring() ensures that a
local copy is used to calculate the length *and* subsequently printed. Even if
this value contains a mix of old and new values, it will only calculate and
copy up to the first NULL, preventing the rest of the audit log message being
truncated.
Use a second local copy of comm to avoid a race between the first and second
calls to audit_log_untrustedstring() with comm.
Reported-by: Tetsuo Handa <penguin-kernel@I-love.SAKURA.ne.jp>
Signed-off-by: Richard Guy Briggs <rgb@redhat.com>
Signed-off-by: James Morris <james.l.morris@oracle.com>
Diffstat (limited to 'Kbuild')
0 files changed, 0 insertions, 0 deletions