[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <20190121122456.935354258@linuxfoundation.org>
Date: Mon, 21 Jan 2019 14:44:30 +0100
From: Greg Kroah-Hartman <gregkh@...uxfoundation.org>
To: linux-kernel@...r.kernel.org
Cc: Greg Kroah-Hartman <gregkh@...uxfoundation.org>,
stable@...r.kernel.org, Casey Schaufler <casey@...aufler-ca.com>,
John Johansen <john.johansen@...onical.com>,
James Morris <james.morris@...rosoft.com>,
syzbot+69ca07954461f189e808@...kaller.appspotmail.com
Subject: [PATCH 4.9 34/51] LSM: Check for NULL cred-security on free
4.9-stable review patch. If anyone has any objections, please let me know.
------------------
From: James Morris <james.morris@...rosoft.com>
commit a5795fd38ee8194451ba3f281f075301a3696ce2 upstream.
From: Casey Schaufler <casey@...aufler-ca.com>
Check that the cred security blob has been set before trying
to clean it up. There is a case during credential initialization
that could result in this.
Signed-off-by: Casey Schaufler <casey@...aufler-ca.com>
Acked-by: John Johansen <john.johansen@...onical.com>
Signed-off-by: James Morris <james.morris@...rosoft.com>
Reported-by: syzbot+69ca07954461f189e808@...kaller.appspotmail.com
Signed-off-by: Greg Kroah-Hartman <gregkh@...uxfoundation.org>
---
security/security.c | 7 +++++++
1 file changed, 7 insertions(+)
--- a/security/security.c
+++ b/security/security.c
@@ -904,6 +904,13 @@ int security_cred_alloc_blank(struct cre
void security_cred_free(struct cred *cred)
{
+ /*
+ * There is a failure case in prepare_creds() that
+ * may result in a call here with ->security being NULL.
+ */
+ if (unlikely(cred->security == NULL))
+ return;
+
call_void_hook(cred_free, cred);
}
Powered by blists - more mailing lists