lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date:	Fri, 18 Jan 2008 22:35:30 -0500
From:	Paul Moore <paul.moore@...com>
To:	Chuck Ebbert <cebbert@...hat.com>
Cc:	Netdev <netdev@...r.kernel.org>
Subject: Re: Memory leak in security_netlbl_sid_to_secattr(), kernel 2.6.23.12

On Friday 18 January 2008 6:19:51 pm Chuck Ebbert wrote:
> We have two reports of this now.
>
> https://bugzilla.redhat.com/show_bug.cgi?id=352281
>
> The user enabled SLUB user tracing and reports that the entries
> created by security_netlbl_sid_to_secattr() were increasing the
> most.  Disabling selinux makes the problem go away completely.

Thanks for the report, sorry about the leak.  I just posted an RFC patch, CC'd 
to you, which I believe should fix the problem.  I did a quick compile test 
on the SELinux module but I am "on vacation" with family visiting so I am 
currently unable to do any real testing until next week.

I've added myself to the bugzilla, but if you are able to do any tests please 
let me know if the patch does or does not solve the problem.

Thanks.

-- 
paul moore
linux security @ hp
--
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ