← Back to team overview

kernel-packages team mailing list archive

[Bug 1235523] Re: apparmor Mem leak of profile hash field

 

** Also affects: linux-goldfish (Ubuntu)
   Importance: Undecided
       Status: New

** Changed in: linux-goldfish (Ubuntu Saucy)
   Importance: Undecided => High

** Changed in: linux-goldfish (Ubuntu Saucy)
       Status: New => Fix Committed

** Changed in: linux-goldfish (Ubuntu Saucy)
     Assignee: (unassigned) => John Johansen (jjohansen)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-maguro in Ubuntu.
https://bugs.launchpad.net/bugs/1235523

Title:
  apparmor Mem leak of profile hash field

Status in “linux” package in Ubuntu:
  Fix Committed
Status in “linux-goldfish” package in Ubuntu:
  Fix Committed
Status in “linux-grouper” package in Ubuntu:
  Fix Committed
Status in “linux-maguro” package in Ubuntu:
  Fix Committed
Status in “linux-mako” package in Ubuntu:
  Fix Committed
Status in “linux-manta” package in Ubuntu:
  Fix Committed
Status in “linux” source package in Saucy:
  Fix Committed
Status in “linux-goldfish” source package in Saucy:
  Fix Committed
Status in “linux-grouper” source package in Saucy:
  Fix Committed
Status in “linux-maguro” source package in Saucy:
  Fix Committed
Status in “linux-mako” source package in Saucy:
  Fix Committed
Status in “linux-manta” source package in Saucy:
  Fix Committed

Bug description:
  kmemleak dump of saucy 3.11.0-11-generic kernel

  unreferenced object 0xffff8801e8c35680 (size 32):
    comm "apparmor_parser", pid 691, jiffies 4294895667 (age 13230.876s)
    hex dump (first 32 bytes):
      e0 d3 4e b5 ac 6d f4 ed 3f cb ee 48 1c fd 40 cf  ..N..m..?..H..@.
      5b cc e9 93 00 00 00 00 00 00 00 00 00 00 00 00  [...............
    backtrace:
      [<ffffffff817a97ee>] kmemleak_alloc+0x4e/0xb0
      [<ffffffff811ca9f3>] __kmalloc+0x103/0x290
      [<ffffffff8138acbc>] aa_calc_profile_hash+0x6c/0x150
      [<ffffffff8138074d>] aa_unpack+0x39d/0xd50
      [<ffffffff8137eced>] aa_replace_profiles+0x3d/0xd80
      [<ffffffff81376937>] profile_replace+0x37/0x50
      [<ffffffff811e9f2d>] vfs_write+0xbd/0x1e0
      [<ffffffff811ea96c>] SyS_write+0x4c/0xa0
      [<ffffffff817ccb1d>] system_call_fastpath+0x1a/0x1f
      [<ffffffffffffffff>] 0xffffffffffffffff

  Requires: unconfined root user replacing policy to trigger. 80 bytes
  per profile replaced

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1235523/+subscriptions


References