• 公告ID (KylinSec-SA-2024-4343)

摘要:

In the Linux kernel, the following vulnerability has been resolved:

sctp: fix memory leak in sctp_stream_outq_migrate()

When sctp_stream_outq_migrate() is called to release stream out resources,
the memory pointed to by prio_head in stream out is not released.

The memory leak information is as follows:
unreferenced object 0xffff88801fe79f80 (size 64):
comm "sctp_repo", pid 7957, jiffies 4294951704 (age 36.480s)
hex dump (first 32 bytes):
80 9f e7 1f 80 88 ff ff 80 9f e7 1f 80 88 ff ff ................
90 9f e7 1f 80 88 ff ff 90 9f e7 1f 80 88 ff ff ................
backtrace:
[<ffffffff81b215c6&gt;] kmalloc_trace+0x26/0x60
[<ffffffff88ae517c&gt;] sctp_sched_prio_set+0x4cc/0x770
[<ffffffff88ad64f2&gt;] sctp_stream_init_ext+0xd2/0x1b0
[<ffffffff88aa2604&gt;] sctp_sendmsg_to_asoc+0x1614/0x1a30
[<ffffffff88ab7ff1&gt;] sctp_sendmsg+0xda1/0x1ef0
[<ffffffff87f765ed&gt;] inet_sendmsg+0x9d/0xe0
[<ffffffff8754b5b3&gt;] sock_sendmsg+0xd3/0x120
[<ffffffff8755446a&gt;] __sys_sendto+0x23a/0x340
[<ffffffff87554651&gt;] __x64_sys_sendto+0xe1/0x1b0
[<ffffffff89978b49&gt;] do_syscall_64+0x39/0xb0
[<ffffffff89a0008b&gt;] entry_SYSCALL_64_after_hwframe+0x63/0xcd

安全等级: Low

公告ID: KylinSec-SA-2024-4343

发布日期: 2024年12月9日

关联CVE: CVE-2022-49013  

  • 详细介绍

1. 漏洞描述

   

In the Linux kernel, the following vulnerability has been resolved:

sctp: fix memory leak in sctp_stream_outq_migrate()

When sctp_stream_outq_migrate() is called to release stream out resources,
the memory pointed to by prio_head in stream out is not released.

The memory leak information is as follows:
unreferenced object 0xffff88801fe79f80 (size 64):
comm "sctp_repo", pid 7957, jiffies 4294951704 (age 36.480s)
hex dump (first 32 bytes):
80 9f e7 1f 80 88 ff ff 80 9f e7 1f 80 88 ff ff ................
90 9f e7 1f 80 88 ff ff 90 9f e7 1f 80 88 ff ff ................
backtrace:
[<ffffffff81b215c6&gt;] kmalloc_trace+0x26/0x60
[<ffffffff88ae517c&gt;] sctp_sched_prio_set+0x4cc/0x770
[<ffffffff88ad64f2&gt;] sctp_stream_init_ext+0xd2/0x1b0
[<ffffffff88aa2604&gt;] sctp_sendmsg_to_asoc+0x1614/0x1a30
[<ffffffff88ab7ff1&gt;] sctp_sendmsg+0xda1/0x1ef0
[<ffffffff87f765ed&gt;] inet_sendmsg+0x9d/0xe0
[<ffffffff8754b5b3&gt;] sock_sendmsg+0xd3/0x120
[<ffffffff8755446a&gt;] __sys_sendto+0x23a/0x340
[<ffffffff87554651&gt;] __x64_sys_sendto+0xe1/0x1b0
[<ffffffff89978b49&gt;] do_syscall_64+0x39/0xb0
[<ffffffff89a0008b&gt;] entry_SYSCALL_64_after_hwframe+0x63/0xcd

2. 影响范围

cve名称 产品 组件 是否受影响
CVE-2022-49013 V6 kernel Unaffected

3. 影响组件

    无

4. 修复版本

    无

5. 修复方法

   无

6. 下载链接

    无
上一篇:KylinSec-SA-2024-4342 下一篇:KylinSec-SA-2024-4344