diff options
author | Kees Cook <kees.cook@canonical.com> | 2011-05-31 11:31:41 -0700 |
---|---|---|
committer | Greg Kroah-Hartman <gregkh@suse.de> | 2011-06-03 10:34:49 +0900 |
commit | 035165d752508146f79fe90631fe6b95022d8833 (patch) | |
tree | dc922776b339af455365570268b0317269747d6d | |
parent | ad106f8c9b2493de31e4b560b9aac000aa81ba10 (diff) | |
download | linux-stable-035165d752508146f79fe90631fe6b95022d8833.tar.gz linux-stable-035165d752508146f79fe90631fe6b95022d8833.tar.bz2 linux-stable-035165d752508146f79fe90631fe6b95022d8833.zip |
AppArmor: fix oops in apparmor_setprocattr
commit a5b2c5b2ad5853591a6cac6134cd0f599a720865 upstream.
When invalid parameters are passed to apparmor_setprocattr a NULL deref
oops occurs when it tries to record an audit message. This is because
it is passing NULL for the profile parameter for aa_audit. But aa_audit
now requires that the profile passed is not NULL.
Fix this by passing the current profile on the task that is trying to
setprocattr.
Signed-off-by: Kees Cook <kees@ubuntu.com>
Signed-off-by: John Johansen <john.johansen@canonical.com>
Signed-off-by: James Morris <jmorris@namei.org>
Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
-rw-r--r-- | security/apparmor/lsm.c | 3 |
1 files changed, 2 insertions, 1 deletions
diff --git a/security/apparmor/lsm.c b/security/apparmor/lsm.c index b7106f192b75..e2e902f39ac2 100644 --- a/security/apparmor/lsm.c +++ b/security/apparmor/lsm.c @@ -592,7 +592,8 @@ static int apparmor_setprocattr(struct task_struct *task, char *name, sa.aad.op = OP_SETPROCATTR; sa.aad.info = name; sa.aad.error = -EINVAL; - return aa_audit(AUDIT_APPARMOR_DENIED, NULL, GFP_KERNEL, + return aa_audit(AUDIT_APPARMOR_DENIED, + __aa_current_profile(), GFP_KERNEL, &sa, NULL); } } else if (strcmp(name, "exec") == 0) { |