AppArmor does not put cred reference causing a leak
Bug #479115 reported by
John Johansen
This bug affects 1 person
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
linux (Ubuntu) |
Fix Released
|
Undecided
|
John Johansen | ||
Karmic |
Fix Released
|
Medium
|
Unassigned |
Bug Description
SRU Justification: Failure to put the cred causes a memory leak that is larger than the cred struct, as it leaks everything it references. This happens for every unconfined processes that does an exec, change_hat or change_profile and passes through this function.
AppArmor fails to drop the cred reference in domain.
if (tracer)
cred = aa_get_
rcu_read_unlock();
if (!tracerp)
Changed in linux (Ubuntu): | |
assignee: | nobody → John Johansen (jjohansen) |
status: | New → In Progress |
description: | updated |
Changed in linux (Ubuntu Karmic): | |
importance: | Undecided → Medium |
status: | New → Fix Committed |
To post a comment you must log in.
This bug was fixed in the package linux - 2.6.32-4.5
---------------
linux (2.6.32-4.5) lucid; urgency=low
[ Andy Whitcroft ]
* [Config] SERIO_LIBPS2 and SERIO_I8042 must match
* rebase to v2.6.32-rc7
* resync with Karmic proposed
[ John Johansen ]
* SAUCE: AppArmor: Fix oops after profile removal bprm_set_ creds
- LP: #475619
* SAUCE: AppArmor: Fix Oops when in apparmor_
- LP: #437258
* SAUCE: AppArmor: Fix cap audit_caching preemption disabling
- LP: #479102
* SAUCE: AppArmor: Fix refcounting bug causing leak of creds
- LP: #479115
* SAUCE: AppArmor: Fix oops there is no tracer and doing unsafe
transition.
- LP: #480112
[ Ubuntu Changes ]
* resync with Karmic proposed (ddbc670a86a3de e18541a3734149f 250ff307adf)
[ Upstream Kernel Changes ]
* rebase to v2.6.32-rc7
-- Andy Whitcroft <email address hidden> Fri, 13 Nov 2009 11:35:13 +0000