Bugzilla – Bug 121930
VUL-0: CVE-2005-3119: kernel: plug request_key_auth memleak
Last modified: 2021-11-22 10:22:25 UTC
Here we go... To: vendor-sec@lst.de User-Agent: Mutt/1.5.6i Subject: [vendor-sec] [Fwd: [PATCH] key: plug request_key_auth memleak] Errors-To: vendor-sec-admin@lst.de Date: Fri, 7 Oct 2005 15:42:00 -0700 Possible memleak if CONFIG_KEYS is enabled. No embargo plan. Will go into next -stable. Hasn't hit upstream yet AFAICT. ----- Forwarded message from David Howells <dhowells@redhat.com> ----- From: David Howells <dhowells@redhat.com> To: torvalds@osdl.org, akpm@osdl.org X-Mailer: MH-E 7.84; nmh 1.1; GNU Emacs 22.0.50.1 Date: Fri, 07 Oct 2005 15:01:09 +0100 Cc: security@kernel.org Subject: [Security] [PATCH] key: plug request_key_auth memleak Plug request_key_auth memleak. This can be triggered by unprivileged users, so is local DoS. Signed-off-by: Chris Wright <chrisw@osdl.org> Signed-Off-By: David Howells <dhowells@redhat.com> --- security/keys/request_key_auth.c | 1 + 1 files changed, 1 insertion(+) Index: linus-2.6/security/keys/request_key_auth.c =================================================================== --- linus-2.6.orig/security/keys/request_key_auth.c +++ linus-2.6/security/keys/request_key_auth.c @@ -96,6 +96,7 @@ static void request_key_auth_destroy(str kenter("{%d}", key->serial); key_put(rka->target_key); + kfree(rka); } /* end request_key_auth_destroy() */ _______________________________________________
CAN-2005-3119
http://kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=74fd92c511bd4a0771ac0faaaef38bb1be3a29f6 ... not enabled in our kernels. so not affected.
from security internal -> novell internal
bothing hidden in here.
CVE-2005-3119: CVSS v2 Base Score: 2.1 (AV:L/AC:L/Au:N/C:N/I:N/A:P)