CVE-2021-46956

In the Linux kernel, the following vulnerability has been resolved: virtiofs: fix memory leak in virtio_fs_probe() When accidentally passing twice the same tag to qemu, kmemleak ended up reporting a memory leak in virtiofs. Also, looking at the log I saw the following error (that's when I realised the duplicated tag): virtiofs: probe of virtio5 failed with error -17 Here's the kmemleak log for reference: unreferenced object 0xffff888103d47800 (size 1024): comm "systemd-udevd", pid 118, jiffies 4294893780 (age 18.340s) hex dump (first 32 bytes): 00 00 00 00 ad 4e ad de ff ff ff ff 00 00 00 00 .....N.......... ff ff ff ff ff ff ff ff 80 90 02 a0 ff ff ff ff ................ backtrace: [<000000000ebb87c1>] virtio_fs_probe+0x171/0x7ae [virtiofs] [<00000000f8aca419>] virtio_dev_probe+0x15f/0x210 [<000000004d6baf3c>] really_probe+0xea/0x430 [<00000000a6ceeac8>] device_driver_attach+0xa8/0xb0 [<00000000196f47a7>] __driver_attach+0x98/0x140 [<000000000b20601d>] bus_for_each_dev+0x7b/0xc0 [<00000000399c7b7f>] bus_add_driver+0x11b/0x1f0 [<0000000032b09ba7>] driver_register+0x8f/0xe0 [<00000000cdd55998>] 0xffffffffa002c013 [<000000000ea196a2>] do_one_initcall+0x64/0x2e0 [<0000000008f727ce>] do_init_module+0x5c/0x260 [<000000003cdedab6>] __do_sys_finit_module+0xb5/0x120 [<00000000ad2f48c6>] do_syscall_64+0x33/0x40 [<00000000809526b5>] entry_SYSCALL_64_after_hwframe+0x44/0xae
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

06 Dec 2024, 17:54

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/310efc95c72c13faf855c692d19cd4d054d827c8 - () https://git.kernel.org/stable/c/310efc95c72c13faf855c692d19cd4d054d827c8 - Patch
References () https://git.kernel.org/stable/c/5116e79fc6e6725b8acdad8b7e928a83ab7b47e6 - () https://git.kernel.org/stable/c/5116e79fc6e6725b8acdad8b7e928a83ab7b47e6 - Patch
References () https://git.kernel.org/stable/c/9b9d60c0eb8ada99cce2a9ab5c15dffc523b01ae - () https://git.kernel.org/stable/c/9b9d60c0eb8ada99cce2a9ab5c15dffc523b01ae - Patch
References () https://git.kernel.org/stable/c/c79c5e0178922a9e092ec8fed026750f39dcaef4 - () https://git.kernel.org/stable/c/c79c5e0178922a9e092ec8fed026750f39dcaef4 - Patch
References () https://git.kernel.org/stable/c/d19555ff225d0896a33246a49279e6d578095f15 - () https://git.kernel.org/stable/c/d19555ff225d0896a33246a49279e6d578095f15 - Patch
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
First Time Linux linux Kernel
Linux
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CWE CWE-401

21 Nov 2024, 06:35

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/310efc95c72c13faf855c692d19cd4d054d827c8 - () https://git.kernel.org/stable/c/310efc95c72c13faf855c692d19cd4d054d827c8 -
References () https://git.kernel.org/stable/c/5116e79fc6e6725b8acdad8b7e928a83ab7b47e6 - () https://git.kernel.org/stable/c/5116e79fc6e6725b8acdad8b7e928a83ab7b47e6 -
References () https://git.kernel.org/stable/c/9b9d60c0eb8ada99cce2a9ab5c15dffc523b01ae - () https://git.kernel.org/stable/c/9b9d60c0eb8ada99cce2a9ab5c15dffc523b01ae -
References () https://git.kernel.org/stable/c/c79c5e0178922a9e092ec8fed026750f39dcaef4 - () https://git.kernel.org/stable/c/c79c5e0178922a9e092ec8fed026750f39dcaef4 -
References () https://git.kernel.org/stable/c/d19555ff225d0896a33246a49279e6d578095f15 - () https://git.kernel.org/stable/c/d19555ff225d0896a33246a49279e6d578095f15 -

28 Feb 2024, 14:06

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux se ha resuelto la siguiente vulnerabilidad: virtiofs: corrige pérdida de memoria en virtio_fs_probe() Al pasar accidentalmente dos veces la misma etiqueta a qemu, kmemleak terminó reportando una pérdida de memoria en virtiofs. Además, mirando el registro vi el siguiente error (fue entonces cuando me di cuenta de la etiqueta duplicada): virtiofs: la sonda de virtio5 falló con el error -17 Aquí está el registro kmemleak como referencia: objeto sin referencia 0xffff888103d47800 (tamaño 1024): comm "systemd- udevd", pid 118, jiffies 4294893780 (edad 18.340 s) volcado hexadecimal (primeros 32 bytes): 00 00 00 00 ad 4e ad de ff ff ff ff 00 00 00 00 ......N....... ... ff ff ff ff ff ff ff ff 80 90 02 a0 ff ff ff ff ................ rastreo: [&lt;000000000ebb87c1&gt;] virtio_fs_probe+0x171/0x7ae [virtiofs] [&lt;00000000f8aca419&gt;] virtio_dev_probe+0x15f/0x210 [&lt;000000004d6baf3c&gt;] very_probe+0xea/0x430 [&lt;00000000a6ceeac8&gt;] device_driver_attach+0xa8/0xb0 [&lt;00000000196f47a7 &gt;] __driver_attach+0x98/0x140 [&lt;000000000b20601d&gt;] bus_for_each_dev+0x7b/0xc0 [&lt;00000000399c7b7f&gt;] bus_add_driver+0x11b/0x1f0 [&lt;0000000032b09ba7&gt;] driver_register+0x8f/0xe0 [&lt;00000000cdd55998&gt;] 0xffffffffa002c013 [&lt;000000000ea196a2&gt; ] do_one_initcall+0x64/0x2e0 [&lt;0000000008f727ce&gt;] do_init_module+0x5c/0x260 [&lt;000000003cdedab6&gt; ] __do_sys_finit_module+0xb5/0x120 [&lt;00000000ad2f48c6&gt;] do_syscall_64+0x33/0x40 [&lt;00000000809526b5&gt;] Entry_SYSCALL_64_after_hwframe+0x44/0xae

27 Feb 2024, 19:04

Type Values Removed Values Added
New CVE

Information

Published : 2024-02-27 19:04

Updated : 2024-12-06 17:54


NVD link : CVE-2021-46956

Mitre link : CVE-2021-46956

CVE.ORG link : CVE-2021-46956


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-401

Missing Release of Memory after Effective Lifetime