diff options
author | John Johansen <john.johansen@canonical.com> | 2011-06-28 15:06:38 +0100 |
---|---|---|
committer | John Johansen <john.johansen@canonical.com> | 2011-06-29 02:02:03 +0100 |
commit | 04fdc099f9c80c7775dbac388fc97e156d4d47e7 (patch) | |
tree | 886a4176abfe4a4c4e3ee7b62da520914bf666e0 /security | |
parent | b0af8dfdd67699e25083478c63eedef2e72ebd85 (diff) | |
download | linux-04fdc099f9c80c7775dbac388fc97e156d4d47e7.tar.gz linux-04fdc099f9c80c7775dbac388fc97e156d4d47e7.tar.bz2 linux-04fdc099f9c80c7775dbac388fc97e156d4d47e7.zip |
AppArmor: Fix reference to rcu protected pointer outside of rcu_read_lock
The pointer returned from tracehook_tracer_task() is only valid inside
the rcu_read_lock. However the tracer pointer obtained is being passed
to aa_may_ptrace outside of the rcu_read_lock critical section.
Mover the aa_may_ptrace test into the rcu_read_lock critical section, to
fix this.
Kernels affected: 2.6.36 - 3.0
Reported-by: Oleg Nesterov <oleg@redhat.com>
Cc: stable@kernel.org
Signed-off-by: John Johansen <john.johansen@canonical.com>
Diffstat (limited to 'security')
-rw-r--r-- | security/apparmor/domain.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/security/apparmor/domain.c b/security/apparmor/domain.c index c825c6e0b636..78adc4303efa 100644 --- a/security/apparmor/domain.c +++ b/security/apparmor/domain.c @@ -73,7 +73,6 @@ static int may_change_ptraced_domain(struct task_struct *task, cred = get_task_cred(tracer); tracerp = aa_cred_profile(cred); } - rcu_read_unlock(); /* not ptraced */ if (!tracer || unconfined(tracerp)) @@ -82,6 +81,7 @@ static int may_change_ptraced_domain(struct task_struct *task, error = aa_may_ptrace(tracer, tracerp, to_profile, PTRACE_MODE_ATTACH); out: + rcu_read_unlock(); if (cred) put_cred(cred); |