From mboxrd@z Thu Jan 1 00:00:00 1970 From: Greg KH Subject: Re: [PATCH 1/2] auditsc: audit_krule mask accesses need bounds checking Date: Mon, 9 Jun 2014 15:30:57 -0700 Message-ID: <20140609223057.GB18475@kroah.com> References: <1401332999-15167-1-git-send-email-eparis@redhat.com> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Return-path: Content-Disposition: inline In-Reply-To: <1401332999-15167-1-git-send-email-eparis@redhat.com> Sender: stable-owner@vger.kernel.org To: Eric Paris Cc: torvalds@linux-foundation.org, linux-audit@redhat.com, linux-kernel@vger.kernel.org, Andy Lutomirski , stable@vger.kernel.org List-Id: linux-audit@redhat.com On Wed, May 28, 2014 at 11:09:58PM -0400, Eric Paris wrote: > From: Andy Lutomirski > > Fixes an easy DoS and possible information disclosure. > > This does nothing about the broken state of x32 auditing. > > eparis: If the admin has enabled auditd and has specifically loaded audit > rules. This bug has been around since before git. Wow... > > Cc: stable@vger.kernel.org > Signed-off-by: Andy Lutomirski > Signed-off-by: Eric Paris > --- > kernel/auditsc.c | 27 ++++++++++++++++++--------- > 1 file changed, 18 insertions(+), 9 deletions(-) Did this patch get dropped somewhere? Isn't it a valid bugfix, or did I miss a later conversation about this? thanks, greg k-h