kernel-packages team mailing list archive
-
kernel-packages team
-
Mailing list archive
-
Message #182524
[Bug 1586997] Re: unix domain socket bind causes kernel audit NULL pointer deference
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1586997
Title:
unix domain socket bind causes kernel audit NULL pointer deference
Status in linux package in Ubuntu:
New
Bug description:
As requested, re-report of
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1508737/ :
When syscall auditing for bind syscall is enabled, a socket bind with
a relative path causes a NULL-pointer dereference.
Reproducer for Ubuntu Trusty LTS:
auditctl -a always,exit -F arch=b64 -S bind
#!/usr/bin/python2 -BEsSt
import socket
testSocket=socket.socket(socket.AF_UNIX, socket.SOCK_STREAM)
testSocket.bind('sock')
ProblemType: Bug
DistroRelease: Ubuntu 14.04
Package: linux-image-3.13.0-86-generic 3.13.0-86.131
ProcVersionSignature: Ubuntu 3.13.0-86.131-generic 3.13.11-ckt39
Uname: Linux 3.13.0-86-generic x86_64
ApportVersion: 2.14.1-0ubuntu3.21
Architecture: amd64
Date: Mon May 30 09:20:20 2016
PackageArchitecture: amd64
ProcEnviron:
PATH=(custom, no user)
LANG=en_US.utf8
SHELL=/bin/sh
ProcKernelCmdLine: root=UUID=784cd3ad-c5b5-4979-b6dc-734b91ec0345 ro
RelatedPackageVersions:
linux-restricted-modules-3.13.0-86-generic N/A
linux-backports-modules-3.13.0-86-generic N/A
linux-firmware 1.127.22
SourcePackage: linux
UpgradeStatus: No upgrade log present (probably fresh install)
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1586997/+subscriptions