• CVE-2021-47250

发布时间: 2024年6月26日

修改时间: 2025年1月4日

概要

In the Linux kernel, the following vulnerability has been resolved: net: ipv4: fix memory leak in netlbl_cipsov4_add_std Reported by syzkaller: BUG: memory leak unreferenced object 0xffff888105df7000 (size 64): comm "syz-executor842", pid 360, jiffies 4294824824 (age 22.546s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000e67ed558&gt;] kmalloc include/linux/slab.h:590 [inline] [<00000000e67ed558&gt;] kzalloc include/linux/slab.h:720 [inline] [<00000000e67ed558&gt;] netlbl_cipsov4_add_std net/netlabel/netlabel_cipso_v4.c:145 [inline] [<00000000e67ed558&gt;] netlbl_cipsov4_add+0x390/0x2340 net/netlabel/netlabel_cipso_v4.c:416 [<0000000006040154&gt;] genl_family_rcv_msg_doit.isra.0+0x20e/0x320 net/netlink/genetlink.c:739 [<00000000204d7a1c&gt;] genl_family_rcv_msg net/netlink/genetlink.c:783 [inline] [<00000000204d7a1c&gt;] genl_rcv_msg+0x2bf/0x4f0 net/netlink/genetlink.c:800 [<00000000c0d6a995&gt;] netlink_rcv_skb+0x134/0x3d0 net/netlink/af_netlink.c:2504 [<00000000d78b9d2c&gt;] genl_rcv+0x24/0x40 net/netlink/genetlink.c:811 [<000000009733081b&gt;] netlink_unicast_kernel net/netlink/af_netlink.c:1314 [inline] [<000000009733081b&gt;] netlink_unicast+0x4a0/0x6a0 net/netlink/af_netlink.c:1340 [<00000000d5fd43b8&gt;] netlink_sendmsg+0x789/0xc70 net/netlink/af_netlink.c:1929 [<000000000a2d1e40&gt;] sock_sendmsg_nosec net/socket.c:654 [inline] [<000000000a2d1e40&gt;] sock_sendmsg+0x139/0x170 net/socket.c:674 [<00000000321d1969&gt;] ____sys_sendmsg+0x658/0x7d0 net/socket.c:2350 [<00000000964e16bc&gt;] ___sys_sendmsg+0xf8/0x170 net/socket.c:2404 [<000000001615e288&gt;] __sys_sendmsg+0xd3/0x190 net/socket.c:2433 [<000000004ee8b6a5&gt;] do_syscall_64+0x37/0x90 arch/x86/entry/common.c:47 [<00000000171c7cee&gt;] entry_SYSCALL_64_after_hwframe+0x44/0xae The memory of doi_def-&gt;map.std pointing is allocated in netlbl_cipsov4_add_std, but no place has freed it. It should be freed in cipso_v4_doi_free which frees the cipso DOI resource.

CVSS v3 指标

NVD openEuler
Confidentiality None None
Attack Vector Local Local
CVSS评分 5.5 5.5
Attack Complexity Low Low
Privileges Required Low Low
Scope Unchanged Unchanged
Integrity None None
User Interaction None None
Availability High High

安全公告

公告名 概要 发布时间
KylinSec-SA-2024-2888 In the Linux kernel, the following vulnerability has been resolved: net: ipv4: fix memory leak in netlbl_cipsov4_add_std Reported by syzkaller: BUG: memory leak unreferenced object 0xffff888105df7000 (size 64): comm "syz-executor842", pid 360, jiffies 4294824824 (age 22.546s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000e67ed558&gt;] kmalloc include/linux/slab.h:590 [inline] [<00000000e67ed558&gt;] kzalloc include/linux/slab.h:720 [inline] [<00000000e67ed558&gt;] netlbl_cipsov4_add_std net/netlabel/netlabel_cipso_v4.c:145 [inline] [<00000000e67ed558&gt;] netlbl_cipsov4_add+0x390/0x2340 net/netlabel/netlabel_cipso_v4.c:416 [<0000000006040154&gt;] genl_family_rcv_msg_doit.isra.0+0x20e/0x320 net/netlink/genetlink.c:739 [<00000000204d7a1c&gt;] genl_family_rcv_msg net/netlink/genetlink.c:783 [inline] [<00000000204d7a1c&gt;] genl_rcv_msg+0x2bf/0x4f0 net/netlink/genetlink.c:800 [<00000000c0d6a995&gt;] netlink_rcv_skb+0x134/0x3d0 net/netlink/af_netlink.c:2504 [<00000000d78b9d2c&gt;] genl_rcv+0x24/0x40 net/netlink/genetlink.c:811 [<000000009733081b&gt;] netlink_unicast_kernel net/netlink/af_netlink.c:1314 [inline] [<000000009733081b&gt;] netlink_unicast+0x4a0/0x6a0 net/netlink/af_netlink.c:1340 [<00000000d5fd43b8&gt;] netlink_sendmsg+0x789/0xc70 net/netlink/af_netlink.c:1929 [<000000000a2d1e40&gt;] sock_sendmsg_nosec net/socket.c:654 [inline] [<000000000a2d1e40&gt;] sock_sendmsg+0x139/0x170 net/socket.c:674 [<00000000321d1969&gt;] ____sys_sendmsg+0x658/0x7d0 net/socket.c:2350 [<00000000964e16bc&gt;] ___sys_sendmsg+0xf8/0x170 net/socket.c:2404 [<000000001615e288&gt;] __sys_sendmsg+0xd3/0x190 net/socket.c:2433 [<000000004ee8b6a5&gt;] do_syscall_64+0x37/0x90 arch/x86/entry/common.c:47 [<00000000171c7cee&gt;] entry_SYSCALL_64_after_hwframe+0x44/0xae The memory of doi_def-&gt;map.std pointing is allocated in netlbl_cipsov4_add_std, but no place has freed it. It should be freed in cipso_v4_doi_free which frees the cipso DOI resource. 2024年6月26日

影响产品

产品 状态
KY3.4-5 kernel Unaffected
KY3.5.2 kernel Unaffected
KY3.5.3 kernel Unaffected
V6 kernel Unaffected