From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1755797AbaE1WVZ (ORCPT ); Wed, 28 May 2014 18:21:25 -0400 Received: from mail-pa0-f47.google.com ([209.85.220.47]:60258 "EHLO mail-pa0-f47.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752610AbaE1WVY (ORCPT ); Wed, 28 May 2014 18:21:24 -0400 From: Andy Lutomirski To: Andy Lutomirski , Philipp Kern , "H. Peter Anvin" , linux-kernel@vger.kernel.org, "H. J. Lu" , Eric Paris , security@kernel.org, greg@kroah.com Subject: [PATCH 0/2] Fix auditsc DoS and move it to staging Date: Wed, 28 May 2014 15:21:18 -0700 Message-Id: X-Mailer: git-send-email 1.9.3 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org CONFIG_AUDITSYSCALL is awful. Patch 2 enumerates some reasons. Patch 1 fixes a nasty DoS and possible information leak. It should be applied and backported. Patch 2 is optional. I leave it to other peoples' judgment. Andy Lutomirski (2): auditsc: audit_krule mask accesses need bounds checking audit: Move CONFIG_AUDITSYSCALL into staging and update help text init/Kconfig | 13 ++++++++----- kernel/auditsc.c | 27 ++++++++++++++++++--------- 2 files changed, 26 insertions(+), 14 deletions(-) -- 1.9.3