** Information type changed from Private Security to Public Security -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1586997
Title: unix domain socket bind causes kernel audit NULL pointer deference Status in linux package in Ubuntu: New Bug description: As requested, re-report of https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1508737/ : When syscall auditing for bind syscall is enabled, a socket bind with a relative path causes a NULL-pointer dereference. Reproducer for Ubuntu Trusty LTS: auditctl -a always,exit -F arch=b64 -S bind #!/usr/bin/python2 -BEsSt import socket testSocket=socket.socket(socket.AF_UNIX, socket.SOCK_STREAM) testSocket.bind('sock') ProblemType: Bug DistroRelease: Ubuntu 14.04 Package: linux-image-3.13.0-86-generic 3.13.0-86.131 ProcVersionSignature: Ubuntu 3.13.0-86.131-generic 3.13.11-ckt39 Uname: Linux 3.13.0-86-generic x86_64 ApportVersion: 2.14.1-0ubuntu3.21 Architecture: amd64 Date: Mon May 30 09:20:20 2016 PackageArchitecture: amd64 ProcEnviron: PATH=(custom, no user) LANG=en_US.utf8 SHELL=/bin/sh ProcKernelCmdLine: root=UUID=784cd3ad-c5b5-4979-b6dc-734b91ec0345 ro RelatedPackageVersions: linux-restricted-modules-3.13.0-86-generic N/A linux-backports-modules-3.13.0-86-generic N/A linux-firmware 1.127.22 SourcePackage: linux UpgradeStatus: No upgrade log present (probably fresh install) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1586997/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp