On Wed, 2014-05-28 at 18:44 -0700, Andy Lutomirski wrote:
> Fixes an easy DoS and possible information disclosure.
> 
> This does nothing about the broken state of x32 auditing.
> 
> Cc: sta...@vger.kernel.org
> Signed-off-by: Andy Lutomirski <l...@amacapital.net>
> ---
>  kernel/auditsc.c | 27 ++++++++++++++++++---------
>  1 file changed, 18 insertions(+), 9 deletions(-)
> 
> diff --git a/kernel/auditsc.c b/kernel/auditsc.c
> index f251a5e..7ccd9db 100644
> --- a/kernel/auditsc.c
> +++ b/kernel/auditsc.c
> @@ -728,6 +728,22 @@ static enum audit_state audit_filter_task(struct 
> task_struct *tsk, char **key)
>       return AUDIT_BUILD_CONTEXT;
>  }
>  
> +static bool audit_in_mask(const struct audit_krule *rule, unsigned long val)
> +{
> +     int word, bit;
> +
> +     if (val > 0xffffffff)
> +             return false;

Why is this necessary?  

> +
> +     word = AUDIT_WORD(val);
> +     if (word >= AUDIT_BITMASK_SIZE)
> +             return false;

Since this covers it and it extensible...

> +
> +     bit = AUDIT_BIT(val);
> +
> +     return rule->mask[word] & bit;

Returning an int as a bool creates worse code than just returning the
int.  (although in this case if the compiler chooses to inline it might
be smart enough not to actually convert this int to a bool and make
worse assembly...)   I'd suggest the function here return an int.  bools
usually make the assembly worse...

Otherwise I'd give it an ACK...

> +}
> +
>  /* At syscall entry and exit time, this filter is called if the
>   * audit_state is not low enough that auditing cannot take place, but is
>   * also not high enough that we already know we have to write an audit
> @@ -745,11 +761,8 @@ static enum audit_state audit_filter_syscall(struct 
> task_struct *tsk,
>  
>       rcu_read_lock();
>       if (!list_empty(list)) {
> -             int word = AUDIT_WORD(ctx->major);
> -             int bit  = AUDIT_BIT(ctx->major);
> -
>               list_for_each_entry_rcu(e, list, list) {
> -                     if ((e->rule.mask[word] & bit) == bit &&
> +                     if (audit_in_mask(&e->rule, ctx->major) &&
>                           audit_filter_rules(tsk, &e->rule, ctx, NULL,
>                                              &state, false)) {
>                               rcu_read_unlock();
> @@ -769,20 +782,16 @@ static enum audit_state audit_filter_syscall(struct 
> task_struct *tsk,
>  static int audit_filter_inode_name(struct task_struct *tsk,
>                                  struct audit_names *n,
>                                  struct audit_context *ctx) {
> -     int word, bit;
>       int h = audit_hash_ino((u32)n->ino);
>       struct list_head *list = &audit_inode_hash[h];
>       struct audit_entry *e;
>       enum audit_state state;
>  
> -     word = AUDIT_WORD(ctx->major);
> -     bit  = AUDIT_BIT(ctx->major);
> -
>       if (list_empty(list))
>               return 0;
>  
>       list_for_each_entry_rcu(e, list, list) {
> -             if ((e->rule.mask[word] & bit) == bit &&
> +             if (audit_in_mask(&e->rule, ctx->major) &&
>                   audit_filter_rules(tsk, &e->rule, ctx, n, &state, false)) {
>                       ctx->current_state = state;
>                       return 1;


--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Reply via email to