lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Thu, 11 Sep 2008 21:37:47 +0200 From: Miloslav Trmač <mitr@...hat.com> To: Andrew Morton <akpm@...ux-foundation.org> Cc: viro@...iv.linux.org.uk, eparis@...hat.com, linux-audit@...hat.com, linux-kernel@...r.kernel.org Subject: Re: [PATCH 1/2] audit: fix NUL handling in untrusted strings Andrew Morton píše v Čt 11. 09. 2008 v 12:14 -0700: > On Thu, 11 Sep 2008 00:23:38 +0200 > Miloslav Trma__ <mitr@...hat.com> wrote: > > > The audit record can thus contain a NUL byte (and some unchecked data > > after that). Because the user-space audit daemon treats audit records > > as NUL-terminated strings, an untrusted string that is shorter than the > > specified maximum length effectively terminates the audit record. > > > It's unclear how serious this problem is. * AUDIT_USER_TTY records (which are sent from user-space with a trailing NUL byte) are missing a terminating '"' character. * Some data is not recorded in AUDIT_TTY records, and the terminating '"' character is missing in that case as well. > Do you believe that it is > sufficiently serious to warrant merging these fixes into 2.6.27? > 2.6.26.x? 2.6.25.x? This patch (1/2) only fixes creation of incorrectly formatted, but easy-to-understand audit records; it would be nice to have it in 2.6.27 (assuming the audit maintainer acks it - or a variant of it). The other one (2/2), which makes sure all TTY audit data is recorded, should probably be merged in the stable releases as well. Mirek -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists