kernel-packages team mailing list archive
-
kernel-packages team
-
Mailing list archive
-
Message #20246
[Bug 1235523] Re: apparmor Mem leak of profile hash field
** Also affects: linux-goldfish (Ubuntu)
Importance: Undecided
Status: New
** Changed in: linux-goldfish (Ubuntu Saucy)
Importance: Undecided => High
** Changed in: linux-goldfish (Ubuntu Saucy)
Status: New => Fix Committed
** Changed in: linux-goldfish (Ubuntu Saucy)
Assignee: (unassigned) => John Johansen (jjohansen)
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-maguro in Ubuntu.
https://bugs.launchpad.net/bugs/1235523
Title:
apparmor Mem leak of profile hash field
Status in “linux” package in Ubuntu:
Fix Committed
Status in “linux-goldfish” package in Ubuntu:
Fix Committed
Status in “linux-grouper” package in Ubuntu:
Fix Committed
Status in “linux-maguro” package in Ubuntu:
Fix Committed
Status in “linux-mako” package in Ubuntu:
Fix Committed
Status in “linux-manta” package in Ubuntu:
Fix Committed
Status in “linux” source package in Saucy:
Fix Committed
Status in “linux-goldfish” source package in Saucy:
Fix Committed
Status in “linux-grouper” source package in Saucy:
Fix Committed
Status in “linux-maguro” source package in Saucy:
Fix Committed
Status in “linux-mako” source package in Saucy:
Fix Committed
Status in “linux-manta” source package in Saucy:
Fix Committed
Bug description:
kmemleak dump of saucy 3.11.0-11-generic kernel
unreferenced object 0xffff8801e8c35680 (size 32):
comm "apparmor_parser", pid 691, jiffies 4294895667 (age 13230.876s)
hex dump (first 32 bytes):
e0 d3 4e b5 ac 6d f4 ed 3f cb ee 48 1c fd 40 cf ..N..m..?..H..@.
5b cc e9 93 00 00 00 00 00 00 00 00 00 00 00 00 [...............
backtrace:
[<ffffffff817a97ee>] kmemleak_alloc+0x4e/0xb0
[<ffffffff811ca9f3>] __kmalloc+0x103/0x290
[<ffffffff8138acbc>] aa_calc_profile_hash+0x6c/0x150
[<ffffffff8138074d>] aa_unpack+0x39d/0xd50
[<ffffffff8137eced>] aa_replace_profiles+0x3d/0xd80
[<ffffffff81376937>] profile_replace+0x37/0x50
[<ffffffff811e9f2d>] vfs_write+0xbd/0x1e0
[<ffffffff811ea96c>] SyS_write+0x4c/0xa0
[<ffffffff817ccb1d>] system_call_fastpath+0x1a/0x1f
[<ffffffffffffffff>] 0xffffffffffffffff
Requires: unconfined root user replacing policy to trigger. 80 bytes
per profile replaced
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1235523/+subscriptions
References