← Back to team overview

kernel-packages team mailing list archive

[Bug 1586997] Re: unix domain socket bind causes kernel audit NULL pointer deference

 

** Information type changed from Private Security to Public Security

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1586997

Title:
  unix domain socket bind causes kernel audit NULL pointer deference

Status in linux package in Ubuntu:
  New

Bug description:
  As requested, re-report of
  https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1508737/ :

  When syscall auditing for bind syscall is enabled, a socket bind with
  a relative path causes a NULL-pointer dereference.

  Reproducer for Ubuntu Trusty LTS:

  auditctl -a always,exit -F arch=b64 -S bind

  #!/usr/bin/python2 -BEsSt
  import socket
  testSocket=socket.socket(socket.AF_UNIX, socket.SOCK_STREAM)
  testSocket.bind('sock')

  ProblemType: Bug
  DistroRelease: Ubuntu 14.04
  Package: linux-image-3.13.0-86-generic 3.13.0-86.131
  ProcVersionSignature: Ubuntu 3.13.0-86.131-generic 3.13.11-ckt39
  Uname: Linux 3.13.0-86-generic x86_64
  ApportVersion: 2.14.1-0ubuntu3.21
  Architecture: amd64
  Date: Mon May 30 09:20:20 2016
  PackageArchitecture: amd64
  ProcEnviron:
   PATH=(custom, no user)
   LANG=en_US.utf8
   SHELL=/bin/sh
  ProcKernelCmdLine: root=UUID=784cd3ad-c5b5-4979-b6dc-734b91ec0345 ro
  RelatedPackageVersions:
   linux-restricted-modules-3.13.0-86-generic N/A
   linux-backports-modules-3.13.0-86-generic  N/A
   linux-firmware                             1.127.22
  SourcePackage: linux
  UpgradeStatus: No upgrade log present (probably fresh install)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1586997/+subscriptions