Commit a5b2c5b2ad5853591a6cac6134cd0f599a720865

Authored by Kees Cook
Committed by James Morris
1 parent e12ca23d41

AppArmor: fix oops in apparmor_setprocattr

When invalid parameters are passed to apparmor_setprocattr a NULL deref
oops occurs when it tries to record an audit message. This is because
it is passing NULL for the profile parameter for aa_audit. But aa_audit
now requires that the profile passed is not NULL.

Fix this by passing the current profile on the task that is trying to
setprocattr.

Signed-off-by: Kees Cook <kees@ubuntu.com>
Signed-off-by: John Johansen <john.johansen@canonical.com>
Cc: stable@kernel.org
Signed-off-by: James Morris <jmorris@namei.org>

Showing 1 changed file with 2 additions and 1 deletions Side-by-side Diff

security/apparmor/lsm.c
... ... @@ -593,7 +593,8 @@
593 593 sa.aad.op = OP_SETPROCATTR;
594 594 sa.aad.info = name;
595 595 sa.aad.error = -EINVAL;
596   - return aa_audit(AUDIT_APPARMOR_DENIED, NULL, GFP_KERNEL,
  596 + return aa_audit(AUDIT_APPARMOR_DENIED,
  597 + __aa_current_profile(), GFP_KERNEL,
597 598 &sa, NULL);
598 599 }
599 600 } else if (strcmp(name, "exec") == 0) {