unix domain socket bind causes kernel audit NULL pointer deference
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
linux (Ubuntu) |
Confirmed
|
Undecided
|
Unassigned |
Bug Description
As requested, re-report of https:/
When syscall auditing for bind syscall is enabled, a socket bind with a relative path causes a NULL-pointer dereference.
Reproducer for Ubuntu Trusty LTS:
auditctl -a always,exit -F arch=b64 -S bind
#!/usr/bin/python2 -BEsSt
import socket
testSocket=
testSocket.
ProblemType: Bug
DistroRelease: Ubuntu 14.04
Package: linux-image-
ProcVersionSign
Uname: Linux 3.13.0-86-generic x86_64
ApportVersion: 2.14.1-0ubuntu3.21
Architecture: amd64
Date: Mon May 30 09:20:20 2016
PackageArchitec
ProcEnviron:
PATH=(custom, no user)
LANG=en_US.utf8
SHELL=/bin/sh
ProcKernelCmdLine: root=UUID=
RelatedPackageV
linux-
linux-
linux-firmware 1.127.22
SourcePackage: linux
UpgradeStatus: No upgrade log present (probably fresh install)
information type: | Private Security → Public Security |
Changed in linux (Ubuntu): | |
status: | Incomplete → Confirmed |
This bug is missing log files that will aid in diagnosing the problem. From a terminal window please run:
apport-collect 1586997
and then change the status of the bug to 'Confirmed'.
If, due to the nature of the issue you have encountered, you are unable to run this command, please add a comment stating that fact and change the bug status to 'Confirmed'.
This change has been made by an automated script, maintained by the Ubuntu Kernel Team.