diff options
author | Miloslav Trmac <mitr@redhat.com> | 2008-10-13 10:35:15 +0100 |
---|---|---|
committer | Linus Torvalds <torvalds@linux-foundation.org> | 2008-10-13 09:51:39 -0700 |
commit | 7459b6ff36ab5e7d160980c3cb2be2f8cd194778 (patch) | |
tree | 0cac8e47e2f4242aed9dcb124007b5f6e9c8cf8c /security/security.c | |
parent | 9d020a2e5fd2c79f5b08a6cab2b02e7231d7cb84 (diff) |
audit: Handle embedded NUL in TTY input auditing
Data read from a TTY can contain an embedded NUL byte (e.g. after
pressing Ctrl-2, or sent to a PTY). After the previous patch, the data
would be logged only up to the first NUL.
This patch modifies the AUDIT_TTY record to always use the hexadecimal
format, which does not terminate at the first NUL byte. The vast
majority of recorded TTY input data will contain either ' ' or '\n', so
the hexadecimal format would have been used anyway.
Signed-off-by: Miloslav Trmac <mitr@redhat.com>
Signed-off-by: Alan Cox <alan@redhat.com>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
Diffstat (limited to 'security/security.c')
0 files changed, 0 insertions, 0 deletions