Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1030292AbVJGX4i (ORCPT ); Fri, 7 Oct 2005 19:56:38 -0400 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S964952AbVJGXzm (ORCPT ); Fri, 7 Oct 2005 19:55:42 -0400 Received: from mail.kroah.org ([69.55.234.183]:28630 "EHLO perch.kroah.org") by vger.kernel.org with ESMTP id S964949AbVJGXz1 (ORCPT ); Fri, 7 Oct 2005 19:55:27 -0400 Date: Fri, 7 Oct 2005 16:55:08 -0700 From: Greg KH To: linux-kernel@vger.kernel.org, stable@kernel.org Cc: Justin Forbes , Zwane Mwaikambo , "Theodore Ts'o" , Randy Dunlap , Chuck Wolber , torvalds@osdl.org, akpm@osdl.org, alan@lxorguk.ukuu.org.uk, dhowells@redhat.com Subject: [patch 7/7] key: plug request_key_auth memleak Message-ID: <20051007235508.GH23111@kroah.com> References: <20051007234348.631583000@press.kroah.org> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline; filename="key-rka-memleak.patch" In-Reply-To: <20051007235353.GA23111@kroah.com> User-Agent: Mutt/1.5.11 Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 901 Lines: 29 From: David Howells Plug request_key_auth memleak. This can be triggered by unprivileged users, so is local DoS. Signed-off-by: Chris Wright Signed-Off-By: David Howells Signed-off-by: Greg Kroah-Hartman --- security/keys/request_key_auth.c | 1 + 1 file changed, 1 insertion(+) --- linux-2.6.13.y.orig/security/keys/request_key_auth.c +++ linux-2.6.13.y/security/keys/request_key_auth.c @@ -96,6 +96,7 @@ static void request_key_auth_destroy(str kenter("{%d}", key->serial); key_put(rka->target_key); + kfree(rka); } /* end request_key_auth_destroy() */ -- - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/