• 公告ID (KylinSec-SA-2024-4529)

摘要:

In the Linux kernel, the following vulnerability has been resolved:

isofs: avoid memory leak in iocharset

A memleak was found as below:

unreferenced object 0xffff0000d10164d8 (size 8):
comm "pool-udisksd", pid 108217, jiffies 4295408555
hex dump (first 8 bytes):
75 74 66 38 00 cc cc cc utf8....
backtrace (crc de430d31):
[<ffff800081046e6c&gt;] kmemleak_alloc+0xb8/0xc8
[<ffff8000803e6c3c&gt;] __kmalloc_node_track_caller_noprof+0x380/0x474
[<ffff800080363b74&gt;] kstrdup+0x70/0xfc
[<ffff80007bb3c6a4&gt;] isofs_parse_param+0x228/0x2c0 [isofs]
[<ffff8000804d7f68&gt;] vfs_parse_fs_param+0xf4/0x164
[<ffff8000804d8064&gt;] vfs_parse_fs_string+0x8c/0xd4
[<ffff8000804d815c&gt;] vfs_parse_monolithic_sep+0xb0/0xfc
[<ffff8000804d81d8&gt;] generic_parse_monolithic+0x30/0x3c
[<ffff8000804d8bfc&gt;] parse_monolithic_mount_data+0x40/0x4c
[<ffff8000804b6a64&gt;] path_mount+0x6c4/0x9ec
[<ffff8000804b6e38&gt;] do_mount+0xac/0xc4
[<ffff8000804b7494&gt;] __arm64_sys_mount+0x16c/0x2b0
[<ffff80008002b8dc&gt;] invoke_syscall+0x7c/0x104
[<ffff80008002ba44&gt;] el0_svc_common.constprop.1+0xe0/0x104
[<ffff80008002ba94&gt;] do_el0_svc+0x2c/0x38
[<ffff800081041108&gt;] el0_svc+0x3c/0x1b8

The opt-&gt;iocharset is freed inside the isofs_fill_super function,
But there may be situations where it's not possible to
enter this function.

For example, in the get_tree_bdev_flags function,when
encountering the situation where "Can't mount, would change RO state,"
In such a case, isofs_fill_super will not have the opportunity
to be called,which means that opt-&gt;iocharset will not have the chance
to be freed,ultimately leading to a memory leak.

Let's move the memory freeing of opt-&gt;iocharset into
isofs_free_fc function.

安全等级: Low

公告ID: KylinSec-SA-2024-4529

发布日期: 2025年1月15日

关联CVE: CVE-2024-56534  

  • 详细介绍

1. 漏洞描述

   

In the Linux kernel, the following vulnerability has been resolved:

isofs: avoid memory leak in iocharset

A memleak was found as below:

unreferenced object 0xffff0000d10164d8 (size 8):
comm "pool-udisksd", pid 108217, jiffies 4295408555
hex dump (first 8 bytes):
75 74 66 38 00 cc cc cc utf8....
backtrace (crc de430d31):
[<ffff800081046e6c&gt;] kmemleak_alloc+0xb8/0xc8
[<ffff8000803e6c3c&gt;] __kmalloc_node_track_caller_noprof+0x380/0x474
[<ffff800080363b74&gt;] kstrdup+0x70/0xfc
[<ffff80007bb3c6a4&gt;] isofs_parse_param+0x228/0x2c0 [isofs]
[<ffff8000804d7f68&gt;] vfs_parse_fs_param+0xf4/0x164
[<ffff8000804d8064&gt;] vfs_parse_fs_string+0x8c/0xd4
[<ffff8000804d815c&gt;] vfs_parse_monolithic_sep+0xb0/0xfc
[<ffff8000804d81d8&gt;] generic_parse_monolithic+0x30/0x3c
[<ffff8000804d8bfc&gt;] parse_monolithic_mount_data+0x40/0x4c
[<ffff8000804b6a64&gt;] path_mount+0x6c4/0x9ec
[<ffff8000804b6e38&gt;] do_mount+0xac/0xc4
[<ffff8000804b7494&gt;] __arm64_sys_mount+0x16c/0x2b0
[<ffff80008002b8dc&gt;] invoke_syscall+0x7c/0x104
[<ffff80008002ba44&gt;] el0_svc_common.constprop.1+0xe0/0x104
[<ffff80008002ba94&gt;] do_el0_svc+0x2c/0x38
[<ffff800081041108&gt;] el0_svc+0x3c/0x1b8

The opt-&gt;iocharset is freed inside the isofs_fill_super function,
But there may be situations where it's not possible to
enter this function.

For example, in the get_tree_bdev_flags function,when
encountering the situation where "Can't mount, would change RO state,"
In such a case, isofs_fill_super will not have the opportunity
to be called,which means that opt-&gt;iocharset will not have the chance
to be freed,ultimately leading to a memory leak.

Let's move the memory freeing of opt-&gt;iocharset into
isofs_free_fc function.

2. 影响范围

cve名称 产品 组件 是否受影响
CVE-2024-56534 KY3.4-5 kernel Unaffected
CVE-2024-56534 KY3.5.3 kernel Unaffected
CVE-2024-56534 V6 kernel Unaffected

3. 影响组件

    无

4. 修复版本

    无

5. 修复方法

   无

6. 下载链接

    无
上一篇:KylinSec-SA-2024-4528 下一篇:KylinSec-SA-2024-4530