auditsc: audit_krule mask accesses need bounds checking
authorAndy Lutomirski <luto@amacapital.net>
Thu, 29 May 2014 03:09:58 +0000 (23:09 -0400)
committerWilly Tarreau <w@1wt.eu>
Wed, 18 Jun 2014 22:26:00 +0000 (00:26 +0200)
commita986d9c350c41fbb56b75d9da04a9725a044454a
tree2eccda36accc2f995b6eb0afcd758e59185b4282
parent07bc7fb4fcff0e24cc25abea01742e1f07d37246
auditsc: audit_krule mask accesses need bounds checking

Fixes an easy DoS and possible information disclosure.

This does nothing about the broken state of x32 auditing.

eparis: If the admin has enabled auditd and has specifically loaded
audit rules.  This bug has been around since before git.  Wow...

Cc: stable@vger.kernel.org
Signed-off-by: Andy Lutomirski <luto@amacapital.net>
Signed-off-by: Eric Paris <eparis@redhat.com>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
(cherry picked from commit a3c54931199565930d6d84f4c3456f6440aefd41)
[wt: no audit_filter_inode_name(), applied to audit_filter_inodes() instead]
Signed-off-by: Willy Tarreau <w@1wt.eu>
kernel/auditsc.c