摘要:
In the log_replay function in the fs/ntfs3/fslog.c file, if *r_page fails to apply for memory when the log_read_rst function is invoked, the log_read_rst function returns ENOEM error. As a result, the rst_info structure in the log_replay function cannot be initialized. When kfree(rst_info.r_page) is executed, an uninitialized wild pointer is released. As a result, the memory is released again. This patch may cause crashes. In this case, the initialization function memset(info, 0, sizeof(struct restart_info)) is moved before the rst_info function is invoked and the structure is initialized.
安全等级: Low
公告ID: KylinSec-SA-2022-1855
发布日期: 2022年8月5日
关联CVE: CVE-2022-1973
In the log_replay function in the fs/ntfs3/fslog.c file, if *r_page fails to apply for memory when the log_read_rst function is invoked, the log_read_rst function returns ENOEM error. As a result, the rst_info structure in the log_replay function cannot be initialized. When kfree(rst_info.r_page) is executed, an uninitialized wild pointer is released. As a result, the memory is released again. This patch may cause crashes. In this case, the initialization function memset(info, 0, sizeof(struct restart_info)) is moved before the rst_info function is invoked and the structure is initialized.
cve名称 | 产品 | 组件 | 是否受影响 |
---|---|---|---|
CVE-2022-1973 | KY3.4-4A | kernel | Unaffected |
CVE-2022-1973 | KY3.4-5 | kernel | Unaffected |
CVE-2022-1973 | KY3.5.1 | kernel | Unaffected |