CVE-2021-47624

In the Linux kernel, the following vulnerability has been resolved: net/sunrpc: fix reference count leaks in rpc_sysfs_xprt_state_change The refcount leak issues take place in an error handling path. When the 3rd argument buf doesn't match with "offline", "online" or "remove", the function simply returns -EINVAL and forgets to decrease the reference count of a rpc_xprt object and a rpc_xprt_switch object increased by rpc_sysfs_xprt_kobj_get_xprt() and rpc_sysfs_xprt_kobj_get_xprt_switch(), causing reference count leaks of both unused objects. Fix this issue by jumping to the error handling path labelled with out_put when buf matches none of "offline", "online" or "remove".
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

21 Nov 2024, 06:36

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/4b22aa42bd4d2d630ef1854c139275c3532937cb - Mailing List, Patch () https://git.kernel.org/stable/c/4b22aa42bd4d2d630ef1854c139275c3532937cb - Mailing List, Patch
References () https://git.kernel.org/stable/c/5f6024c05a2c0fdd180b29395aaf686d25af3a0f - Mailing List, Patch () https://git.kernel.org/stable/c/5f6024c05a2c0fdd180b29395aaf686d25af3a0f - Mailing List, Patch
References () https://git.kernel.org/stable/c/776d794f28c95051bc70405a7b1fa40115658a18 - Mailing List, Patch () https://git.kernel.org/stable/c/776d794f28c95051bc70405a7b1fa40115658a18 - Mailing List, Patch

21 Aug 2024, 17:43

Type Values Removed Values Added
CWE NVD-CWE-Other
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.1
First Time Linux linux Kernel
Linux
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Summary
  • (es) En el kernel de Linux, se resolvió la siguiente vulnerabilidad: net/sunrpc: corrige fugas de recuento de referencias en rpc_sysfs_xprt_state_change Los problemas de fugas de recuento tienen lugar en una ruta de manejo de errores. Cuando el tercer argumento buf no coincide con "fuera de línea", "en línea" o "eliminar", la función simplemente devuelve -EINVAL y se olvida de disminuir el recuento de referencias de un objeto rpc_xprt y un objeto rpc_xprt_switch aumentado en rpc_sysfs_xprt_kobj_get_xprt() y rpc_sysfs_xprt_kobj_get_xprt_switch (), lo que provoca fugas en el recuento de referencias de ambos objetos no utilizados. Solucione este problema saltando a la ruta de manejo de errores etiquetada con out_put cuando buf no coincida con "fuera de línea", "en línea" o "eliminar".
References () https://git.kernel.org/stable/c/4b22aa42bd4d2d630ef1854c139275c3532937cb - () https://git.kernel.org/stable/c/4b22aa42bd4d2d630ef1854c139275c3532937cb - Mailing List, Patch
References () https://git.kernel.org/stable/c/5f6024c05a2c0fdd180b29395aaf686d25af3a0f - () https://git.kernel.org/stable/c/5f6024c05a2c0fdd180b29395aaf686d25af3a0f - Mailing List, Patch
References () https://git.kernel.org/stable/c/776d794f28c95051bc70405a7b1fa40115658a18 - () https://git.kernel.org/stable/c/776d794f28c95051bc70405a7b1fa40115658a18 - Mailing List, Patch

16 Jul 2024, 12:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-07-16 12:15

Updated : 2024-11-21 06:36


NVD link : CVE-2021-47624

Mitre link : CVE-2021-47624

CVE.ORG link : CVE-2021-47624


JSON object : View

Products Affected

linux

  • linux_kernel