CVE-2021-46956
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
27/02/2024
Last modified:
06/12/2024
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
virtiofs: fix memory leak in virtio_fs_probe()<br />
<br />
When accidentally passing twice the same tag to qemu, kmemleak ended up<br />
reporting a memory leak in virtiofs. Also, looking at the log I saw the<br />
following error (that&#39;s when I realised the duplicated tag):<br />
<br />
virtiofs: probe of virtio5 failed with error -17<br />
<br />
Here&#39;s the kmemleak log for reference:<br />
<br />
unreferenced object 0xffff888103d47800 (size 1024):<br />
comm "systemd-udevd", pid 118, jiffies 4294893780 (age 18.340s)<br />
hex dump (first 32 bytes):<br />
00 00 00 00 ad 4e ad de ff ff ff ff 00 00 00 00 .....N..........<br />
ff ff ff ff ff ff ff ff 80 90 02 a0 ff ff ff ff ................<br />
backtrace:<br />
[] virtio_fs_probe+0x171/0x7ae [virtiofs]<br />
[] virtio_dev_probe+0x15f/0x210<br />
[] really_probe+0xea/0x430<br />
[] device_driver_attach+0xa8/0xb0<br />
[] __driver_attach+0x98/0x140<br />
[] bus_for_each_dev+0x7b/0xc0<br />
[] bus_add_driver+0x11b/0x1f0<br />
[] driver_register+0x8f/0xe0<br />
[] 0xffffffffa002c013<br />
[] do_one_initcall+0x64/0x2e0<br />
[] do_init_module+0x5c/0x260<br />
[] __do_sys_finit_module+0xb5/0x120<br />
[] do_syscall_64+0x33/0x40<br />
[] entry_SYSCALL_64_after_hwframe+0x44/0xae
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.4 (including) | 5.4.118 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.5 (including) | 5.10.36 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.11.20 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.12 (including) | 5.12.3 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/310efc95c72c13faf855c692d19cd4d054d827c8
- https://git.kernel.org/stable/c/5116e79fc6e6725b8acdad8b7e928a83ab7b47e6
- https://git.kernel.org/stable/c/9b9d60c0eb8ada99cce2a9ab5c15dffc523b01ae
- https://git.kernel.org/stable/c/c79c5e0178922a9e092ec8fed026750f39dcaef4
- https://git.kernel.org/stable/c/d19555ff225d0896a33246a49279e6d578095f15
- https://git.kernel.org/stable/c/310efc95c72c13faf855c692d19cd4d054d827c8
- https://git.kernel.org/stable/c/5116e79fc6e6725b8acdad8b7e928a83ab7b47e6
- https://git.kernel.org/stable/c/9b9d60c0eb8ada99cce2a9ab5c15dffc523b01ae
- https://git.kernel.org/stable/c/c79c5e0178922a9e092ec8fed026750f39dcaef4
- https://git.kernel.org/stable/c/d19555ff225d0896a33246a49279e6d578095f15