kernel-packages team mailing list archive
-
kernel-packages team
-
Mailing list archive
-
Message #20480
[Bug 1235523] Re: apparmor Mem leak of profile hash field
This bug was fixed in the package linux-manta - 3.4.0-4.19
---------------
linux-manta (3.4.0-4.19) saucy; urgency=low
[ John Johansen ]
* SAUCE: apparmor: fix unix domain sockets to be mediated on connection
- LP: #1208988
* SAUCE: apparmor: allocate path lookup buffers during init
- LP: #1208988
* SAUCE: apparmor: fix memleak of the profile hash
- LP: #1235523
* SAUCE: apparmor: fix memleak of replacedby struct
- LP: #1235973
* SAUCE: apparmor: fix bad lock balance when introspecting policy
- LP: #1235977
[ Scott James Remnant ]
* SAUCE: (no-up) trace: add trace events for open(), exec() and uselib()
- LP: #1194127
-- Andy Whitcroft <apw@xxxxxxxxxxxxx> Mon, 07 Oct 2013 18:23:03 +0100
** Changed in: linux-manta (Ubuntu Saucy)
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-maguro in Ubuntu.
https://bugs.launchpad.net/bugs/1235523
Title:
apparmor Mem leak of profile hash field
Status in “linux” package in Ubuntu:
Fix Released
Status in “linux-goldfish” package in Ubuntu:
Fix Released
Status in “linux-grouper” package in Ubuntu:
Fix Released
Status in “linux-maguro” package in Ubuntu:
Fix Released
Status in “linux-mako” package in Ubuntu:
Fix Released
Status in “linux-manta” package in Ubuntu:
Fix Released
Status in “linux” source package in Saucy:
Fix Released
Status in “linux-goldfish” source package in Saucy:
Fix Released
Status in “linux-grouper” source package in Saucy:
Fix Released
Status in “linux-maguro” source package in Saucy:
Fix Released
Status in “linux-mako” source package in Saucy:
Fix Released
Status in “linux-manta” source package in Saucy:
Fix Released
Bug description:
kmemleak dump of saucy 3.11.0-11-generic kernel
unreferenced object 0xffff8801e8c35680 (size 32):
comm "apparmor_parser", pid 691, jiffies 4294895667 (age 13230.876s)
hex dump (first 32 bytes):
e0 d3 4e b5 ac 6d f4 ed 3f cb ee 48 1c fd 40 cf ..N..m..?..H..@.
5b cc e9 93 00 00 00 00 00 00 00 00 00 00 00 00 [...............
backtrace:
[<ffffffff817a97ee>] kmemleak_alloc+0x4e/0xb0
[<ffffffff811ca9f3>] __kmalloc+0x103/0x290
[<ffffffff8138acbc>] aa_calc_profile_hash+0x6c/0x150
[<ffffffff8138074d>] aa_unpack+0x39d/0xd50
[<ffffffff8137eced>] aa_replace_profiles+0x3d/0xd80
[<ffffffff81376937>] profile_replace+0x37/0x50
[<ffffffff811e9f2d>] vfs_write+0xbd/0x1e0
[<ffffffff811ea96c>] SyS_write+0x4c/0xa0
[<ffffffff817ccb1d>] system_call_fastpath+0x1a/0x1f
[<ffffffffffffffff>] 0xffffffffffffffff
Requires: unconfined root user replacing policy to trigger. 80 bytes
per profile replaced
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1235523/+subscriptions
References