← Back to team overview

kernel-packages team mailing list archive

[Bug 1235523] Re: apparmor Mem leak of profile hash field

 

This bug was fixed in the package linux-mako - 3.4.0-3.21

---------------
linux-mako (3.4.0-3.21) saucy; urgency=low

  [ John Johansen ]

  * SAUCE: apparmor: fix unix domain sockets to be mediated on connection
    - LP: #1208988
  * SAUCE: apparmor: allocate path lookup buffers during init
    - LP: #1208988
  * SAUCE: apparmor: fix memleak of the profile hash
    - LP: #1235523
  * SAUCE: apparmor: fix memleak of replacedby struct
    - LP: #1235973
  * SAUCE: apparmor: fix bad lock balance when introspecting policy
    - LP: #1235977

  [ Scott James Remnant ]

  * SAUCE: (no-up) trace: add trace events for open(), exec() and uselib()
    - LP: #1194127
 -- Andy Whitcroft <apw@xxxxxxxxxxxxx>   Mon, 07 Oct 2013 18:17:50 +0100

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-maguro in Ubuntu.
https://bugs.launchpad.net/bugs/1235523

Title:
  apparmor Mem leak of profile hash field

Status in “linux” package in Ubuntu:
  Fix Released
Status in “linux-goldfish” package in Ubuntu:
  Fix Released
Status in “linux-grouper” package in Ubuntu:
  Fix Released
Status in “linux-maguro” package in Ubuntu:
  Fix Released
Status in “linux-mako” package in Ubuntu:
  Fix Released
Status in “linux-manta” package in Ubuntu:
  Fix Committed
Status in “linux” source package in Saucy:
  Fix Released
Status in “linux-goldfish” source package in Saucy:
  Fix Released
Status in “linux-grouper” source package in Saucy:
  Fix Released
Status in “linux-maguro” source package in Saucy:
  Fix Released
Status in “linux-mako” source package in Saucy:
  Fix Released
Status in “linux-manta” source package in Saucy:
  Fix Committed

Bug description:
  kmemleak dump of saucy 3.11.0-11-generic kernel

  unreferenced object 0xffff8801e8c35680 (size 32):
    comm "apparmor_parser", pid 691, jiffies 4294895667 (age 13230.876s)
    hex dump (first 32 bytes):
      e0 d3 4e b5 ac 6d f4 ed 3f cb ee 48 1c fd 40 cf  ..N..m..?..H..@.
      5b cc e9 93 00 00 00 00 00 00 00 00 00 00 00 00  [...............
    backtrace:
      [<ffffffff817a97ee>] kmemleak_alloc+0x4e/0xb0
      [<ffffffff811ca9f3>] __kmalloc+0x103/0x290
      [<ffffffff8138acbc>] aa_calc_profile_hash+0x6c/0x150
      [<ffffffff8138074d>] aa_unpack+0x39d/0xd50
      [<ffffffff8137eced>] aa_replace_profiles+0x3d/0xd80
      [<ffffffff81376937>] profile_replace+0x37/0x50
      [<ffffffff811e9f2d>] vfs_write+0xbd/0x1e0
      [<ffffffff811ea96c>] SyS_write+0x4c/0xa0
      [<ffffffff817ccb1d>] system_call_fastpath+0x1a/0x1f
      [<ffffffffffffffff>] 0xffffffffffffffff

  Requires: unconfined root user replacing policy to trigger. 80 bytes
  per profile replaced

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1235523/+subscriptions


References