mirror of
https://github.com/AuxXxilium/linux_dsm_epyc7002.git
synced 2024-11-30 08:16:41 +07:00
audit/stable-4.18 PR 20180731
-----BEGIN PGP SIGNATURE----- iQJIBAABCAAyFiEEcQCq365ubpQNLgrWVeRaWujKfIoFAltguv8UHHBhdWxAcGF1 bC1tb29yZS5jb20ACgkQVeRaWujKfIqYOA/9GgMzBJYU+bVCbNSagcq6LluWFoYV ObZb9sfsf23wL0YgtKgkWaCefWAAYnWOr6bUvDa+5oMRLVR+bsP+YEkCVK45CJr0 g44oe4VH9t5inX2F2JSkoVbkUDZIwwOxiTi/L4Emqhv8cT9zc89tcKRjYhqt50d1 4Gm4++jZcTHQNKkzYUIIpKc0TZmKW5mRNmFaGogWPi72FWrhbDfjKLZZUvd+kIUC HSKnv6pKnwbxLPhd9i0p5NchuTM6kRCptGzN07UUzeww6UVvs8t62+DzHUM1o3Ft sraIx7BLenGC8OBCgi8aNkE+yseQE4h2OTym3paEkLVJsl/9qcsSyXL1dwO4Z96U HFq/TpDZoBieZihHDBk4ry7ox942mE5N51QTDUh+cygEWeNvqGwqpAUbI14J23oh 3p7w7hgXAtdtuj4pzqUARemHvIR0Xbpn8ritH9cx1s1mDdycyyBDn9mFw3Ehigom XIpUrSJtdfJYFj+z6wA4vXssvXe4TITrJTUmPAM1Alk1p+LhRkTA8JxBjHmL3qjR mFIxA40t+ON5OtCqTtGsapaoJy2Jj97dPEp5i5Jg49BQclQoTG2rpYuIu/aKrixG EZwdezckD3DPQUQdQidru7dS1J/phIaDDvEauq291ERHPfNAxQuMllXHeczzyJkc eVRMkj0/E5lihlE= =MN3z -----END PGP SIGNATURE----- Merge tag 'audit-pr-20180731' of git://git.kernel.org/pub/scm/linux/kernel/git/pcmoore/audit Pull audit fix from Paul Moore: "A single small audit fix to guard against memory allocation failures when logging information about a kernel module load. It's small, easy to understand, and self-contained; while nothing is zero risk, this should be pretty low" * tag 'audit-pr-20180731' of git://git.kernel.org/pub/scm/linux/kernel/git/pcmoore/audit: audit: fix potential null dereference 'context->module.name'
This commit is contained in:
commit
37b71411b7
@ -1279,8 +1279,12 @@ static void show_special(struct audit_context *context, int *call_panic)
|
||||
break;
|
||||
case AUDIT_KERN_MODULE:
|
||||
audit_log_format(ab, "name=");
|
||||
audit_log_untrustedstring(ab, context->module.name);
|
||||
kfree(context->module.name);
|
||||
if (context->module.name) {
|
||||
audit_log_untrustedstring(ab, context->module.name);
|
||||
kfree(context->module.name);
|
||||
} else
|
||||
audit_log_format(ab, "(null)");
|
||||
|
||||
break;
|
||||
}
|
||||
audit_log_end(ab);
|
||||
@ -2411,8 +2415,9 @@ void __audit_log_kern_module(char *name)
|
||||
{
|
||||
struct audit_context *context = audit_context();
|
||||
|
||||
context->module.name = kmalloc(strlen(name) + 1, GFP_KERNEL);
|
||||
strcpy(context->module.name, name);
|
||||
context->module.name = kstrdup(name, GFP_KERNEL);
|
||||
if (!context->module.name)
|
||||
audit_log_lost("out of memory in __audit_log_kern_module");
|
||||
context->type = AUDIT_KERN_MODULE;
|
||||
}
|
||||
|
||||
|
Loading…
Reference in New Issue
Block a user