• 公告ID (KylinSec-SA-2022-1855)

摘要:

In the log_replay function in the fs/ntfs3/fslog.c file, if *r_page fails to apply for memory when the log_read_rst function is invoked, the log_read_rst function returns ENOEM error. As a result, the rst_info structure in the log_replay function cannot be initialized. When kfree(rst_info.r_page) is executed, an uninitialized wild pointer is released. As a result, the memory is released again. This patch may cause crashes. In this case, the initialization function memset(info, 0, sizeof(struct restart_info)) is moved before the rst_info function is invoked and the structure is initialized.

安全等级: Low

公告ID: KylinSec-SA-2022-1855

发布日期: 2022年8月5日

关联CVE: CVE-2022-1973  

  • 详细介绍

1. 漏洞描述

   

In the log_replay function in the fs/ntfs3/fslog.c file, if *r_page fails to apply for memory when the log_read_rst function is invoked, the log_read_rst function returns ENOEM error. As a result, the rst_info structure in the log_replay function cannot be initialized. When kfree(rst_info.r_page) is executed, an uninitialized wild pointer is released. As a result, the memory is released again. This patch may cause crashes. In this case, the initialization function memset(info, 0, sizeof(struct restart_info)) is moved before the rst_info function is invoked and the structure is initialized.

2. 影响范围

cve名称 产品 组件 是否受影响
CVE-2022-1973 KY3.4-4A kernel Unaffected
CVE-2022-1973 KY3.4-5 kernel Unaffected
CVE-2022-1973 KY3.5.1 kernel Unaffected

3. 影响组件

    无

4. 修复版本

    无

5. 修复方法

   无

6. 下载链接

    无
上一篇:KylinSec-SA-2022-1854 下一篇:KylinSec-SA-2022-1856