Description
In the Linux kernel, the following vulnerability has been resolved: rxrpc: Fix key reference count leak from call->key When creating a client call in rxrpc_alloc_client_call(), the code obtains a reference to the key. This is never cleaned up and gets leaked when the call is destroyed. Fix this by freeing call->key in rxrpc_destroy_call(). Before the patch, it shows the key reference counter elevated: $ cat /proc/keys | grep afs@54321 1bffe9cd I--Q--i 8053480 4169w 3b010000 1000 1000 rxrpc afs@54321: ka $ After the patch, the invalidated key is removed when the code exits: $ cat /proc/keys | grep afs@54321 $
Product status
f3441d4125fc98995858550a5521b8d7daf0504a (git) before f1a7a3ab0f35f83cf11bba906b9e948cf3788c28
f3441d4125fc98995858550a5521b8d7daf0504a (git) before e6b7943c5dc875647499da09bf4d50a8557ab0c3
f3441d4125fc98995858550a5521b8d7daf0504a (git) before 2e6ef713b1598f6acd7f302fa6b12b6731c89914
f3441d4125fc98995858550a5521b8d7daf0504a (git) before 978108902ee4ef2b348ff7ec36ad014dc5bc6dc6
f3441d4125fc98995858550a5521b8d7daf0504a (git) before d666540d217e8d420544ebdfbadeedd623562733
6.2
Any version before 6.2
6.6.135 (semver)
6.12.82 (semver)
6.18.23 (semver)
6.19.13 (semver)
7.0 (original_commit_for_fix)
References
git.kernel.org/...c/f1a7a3ab0f35f83cf11bba906b9e948cf3788c28
git.kernel.org/...c/e6b7943c5dc875647499da09bf4d50a8557ab0c3
git.kernel.org/...c/2e6ef713b1598f6acd7f302fa6b12b6731c89914
git.kernel.org/...c/978108902ee4ef2b348ff7ec36ad014dc5bc6dc6
git.kernel.org/...c/d666540d217e8d420544ebdfbadeedd623562733