CVE-2021-47162 (GCVE-0-2021-47162)
Vulnerability from cvelistv5
Published
2024-03-25 09:16
Modified
2025-05-04 12:41
Severity ?
Summary
In the Linux kernel, the following vulnerability has been resolved: tipc: skb_linearize the head skb when reassembling msgs It's not a good idea to append the frag skb to a skb's frag_list if the frag_list already has skbs from elsewhere, such as this skb was created by pskb_copy() where the frag_list was cloned (all the skbs in it were skb_get'ed) and shared by multiple skbs. However, the new appended frag skb should have been only seen by the current skb. Otherwise, it will cause use after free crashes as this appended frag skb are seen by multiple skbs but it only got skb_get called once. The same thing happens with a skb updated by pskb_may_pull() with a skb_cloned skb. Li Shuang has reported quite a few crashes caused by this when doing testing over macvlan devices: [] kernel BUG at net/core/skbuff.c:1970! [] Call Trace: [] skb_clone+0x4d/0xb0 [] macvlan_broadcast+0xd8/0x160 [macvlan] [] macvlan_process_broadcast+0x148/0x150 [macvlan] [] process_one_work+0x1a7/0x360 [] worker_thread+0x30/0x390 [] kernel BUG at mm/usercopy.c:102! [] Call Trace: [] __check_heap_object+0xd3/0x100 [] __check_object_size+0xff/0x16b [] simple_copy_to_iter+0x1c/0x30 [] __skb_datagram_iter+0x7d/0x310 [] __skb_datagram_iter+0x2a5/0x310 [] skb_copy_datagram_iter+0x3b/0x90 [] tipc_recvmsg+0x14a/0x3a0 [tipc] [] ____sys_recvmsg+0x91/0x150 [] ___sys_recvmsg+0x7b/0xc0 [] kernel BUG at mm/slub.c:305! [] Call Trace: [] <IRQ> [] kmem_cache_free+0x3ff/0x400 [] __netif_receive_skb_core+0x12c/0xc40 [] ? kmem_cache_alloc+0x12e/0x270 [] netif_receive_skb_internal+0x3d/0xb0 [] ? get_rx_page_info+0x8e/0xa0 [be2net] [] be_poll+0x6ef/0xd00 [be2net] [] ? irq_exit+0x4f/0x100 [] net_rx_action+0x149/0x3b0 ... This patch is to fix it by linearizing the head skb if it has frag_list set in tipc_buf_append(). Note that we choose to do this before calling skb_unshare(), as __skb_linearize() will avoid skb_copy(). Also, we can not just drop the frag_list either as the early time.
References
416baaa9-dc9f-4396-8d5f-8c081fb06d67 https://git.kernel.org/stable/c/436d650d374329a591c30339a91fa5078052ed1e Patch
416baaa9-dc9f-4396-8d5f-8c081fb06d67 https://git.kernel.org/stable/c/4b1761898861117c97066aea6c58f68a7787f0bf Patch
416baaa9-dc9f-4396-8d5f-8c081fb06d67 https://git.kernel.org/stable/c/5489f30bb78ff0dafb4229a69632afc2ba20765c Patch
416baaa9-dc9f-4396-8d5f-8c081fb06d67 https://git.kernel.org/stable/c/64d17ec9f1ded042c4b188d15734f33486ed9966 Patch
416baaa9-dc9f-4396-8d5f-8c081fb06d67 https://git.kernel.org/stable/c/6da24cfc83ba4f97ea44fc7ae9999a006101755c Patch
416baaa9-dc9f-4396-8d5f-8c081fb06d67 https://git.kernel.org/stable/c/ace300eecbccaa698e2b472843c74a5f33f7dce8 Patch
416baaa9-dc9f-4396-8d5f-8c081fb06d67 https://git.kernel.org/stable/c/b2c8d28c34b3070407cb1741f9ba3f15d0284b8b Patch
416baaa9-dc9f-4396-8d5f-8c081fb06d67 https://git.kernel.org/stable/c/b7df21cf1b79ab7026f545e7bf837bd5750ac026 Patch
af854a3a-2127-422b-91ae-364da2661108 https://git.kernel.org/stable/c/436d650d374329a591c30339a91fa5078052ed1e Patch
af854a3a-2127-422b-91ae-364da2661108 https://git.kernel.org/stable/c/4b1761898861117c97066aea6c58f68a7787f0bf Patch
af854a3a-2127-422b-91ae-364da2661108 https://git.kernel.org/stable/c/5489f30bb78ff0dafb4229a69632afc2ba20765c Patch
af854a3a-2127-422b-91ae-364da2661108 https://git.kernel.org/stable/c/64d17ec9f1ded042c4b188d15734f33486ed9966 Patch
af854a3a-2127-422b-91ae-364da2661108 https://git.kernel.org/stable/c/6da24cfc83ba4f97ea44fc7ae9999a006101755c Patch
af854a3a-2127-422b-91ae-364da2661108 https://git.kernel.org/stable/c/ace300eecbccaa698e2b472843c74a5f33f7dce8 Patch
af854a3a-2127-422b-91ae-364da2661108 https://git.kernel.org/stable/c/b2c8d28c34b3070407cb1741f9ba3f15d0284b8b Patch
af854a3a-2127-422b-91ae-364da2661108 https://git.kernel.org/stable/c/b7df21cf1b79ab7026f545e7bf837bd5750ac026 Patch
Impacted products
Vendor Product Version
Linux Linux Version: 45c8b7b175ceb2d542e0fe15247377bf3bce29ec
Version: 45c8b7b175ceb2d542e0fe15247377bf3bce29ec
Version: 45c8b7b175ceb2d542e0fe15247377bf3bce29ec
Version: 45c8b7b175ceb2d542e0fe15247377bf3bce29ec
Version: 45c8b7b175ceb2d542e0fe15247377bf3bce29ec
Version: 45c8b7b175ceb2d542e0fe15247377bf3bce29ec
Version: 45c8b7b175ceb2d542e0fe15247377bf3bce29ec
Version: 45c8b7b175ceb2d542e0fe15247377bf3bce29ec
Version: d45ed6c1ff20d3640a31f03816ca2d48fb7d6f22
Version: c19282fd54a19e4651a4e67836cd842082546677
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2021-47162",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-06-26T20:36:04.317335Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-06-26T20:36:12.629Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T05:24:39.945Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/b2c8d28c34b3070407cb1741f9ba3f15d0284b8b"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/5489f30bb78ff0dafb4229a69632afc2ba20765c"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/436d650d374329a591c30339a91fa5078052ed1e"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/4b1761898861117c97066aea6c58f68a7787f0bf"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/64d17ec9f1ded042c4b188d15734f33486ed9966"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/6da24cfc83ba4f97ea44fc7ae9999a006101755c"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/ace300eecbccaa698e2b472843c74a5f33f7dce8"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/b7df21cf1b79ab7026f545e7bf837bd5750ac026"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "net/tipc/msg.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "b2c8d28c34b3070407cb1741f9ba3f15d0284b8b",
              "status": "affected",
              "version": "45c8b7b175ceb2d542e0fe15247377bf3bce29ec",
              "versionType": "git"
            },
            {
              "lessThan": "5489f30bb78ff0dafb4229a69632afc2ba20765c",
              "status": "affected",
              "version": "45c8b7b175ceb2d542e0fe15247377bf3bce29ec",
              "versionType": "git"
            },
            {
              "lessThan": "436d650d374329a591c30339a91fa5078052ed1e",
              "status": "affected",
              "version": "45c8b7b175ceb2d542e0fe15247377bf3bce29ec",
              "versionType": "git"
            },
            {
              "lessThan": "4b1761898861117c97066aea6c58f68a7787f0bf",
              "status": "affected",
              "version": "45c8b7b175ceb2d542e0fe15247377bf3bce29ec",
              "versionType": "git"
            },
            {
              "lessThan": "64d17ec9f1ded042c4b188d15734f33486ed9966",
              "status": "affected",
              "version": "45c8b7b175ceb2d542e0fe15247377bf3bce29ec",
              "versionType": "git"
            },
            {
              "lessThan": "6da24cfc83ba4f97ea44fc7ae9999a006101755c",
              "status": "affected",
              "version": "45c8b7b175ceb2d542e0fe15247377bf3bce29ec",
              "versionType": "git"
            },
            {
              "lessThan": "ace300eecbccaa698e2b472843c74a5f33f7dce8",
              "status": "affected",
              "version": "45c8b7b175ceb2d542e0fe15247377bf3bce29ec",
              "versionType": "git"
            },
            {
              "lessThan": "b7df21cf1b79ab7026f545e7bf837bd5750ac026",
              "status": "affected",
              "version": "45c8b7b175ceb2d542e0fe15247377bf3bce29ec",
              "versionType": "git"
            },
            {
              "status": "affected",
              "version": "d45ed6c1ff20d3640a31f03816ca2d48fb7d6f22",
              "versionType": "git"
            },
            {
              "status": "affected",
              "version": "c19282fd54a19e4651a4e67836cd842082546677",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "net/tipc/msg.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "4.3"
            },
            {
              "lessThan": "4.3",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.4.*",
              "status": "unaffected",
              "version": "4.4.271",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.9.*",
              "status": "unaffected",
              "version": "4.9.271",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.14.*",
              "status": "unaffected",
              "version": "4.14.235",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.19.*",
              "status": "unaffected",
              "version": "4.19.193",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.4.*",
              "status": "unaffected",
              "version": "5.4.124",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.10.*",
              "status": "unaffected",
              "version": "5.10.42",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.12.*",
              "status": "unaffected",
              "version": "5.12.9",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "5.13",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "4.4.271",
                  "versionStartIncluding": "4.3",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "4.9.271",
                  "versionStartIncluding": "4.3",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "4.14.235",
                  "versionStartIncluding": "4.3",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "4.19.193",
                  "versionStartIncluding": "4.3",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.4.124",
                  "versionStartIncluding": "4.3",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.10.42",
                  "versionStartIncluding": "4.3",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.12.9",
                  "versionStartIncluding": "4.3",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.13",
                  "versionStartIncluding": "4.3",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionStartIncluding": "4.1.14",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionStartIncluding": "4.2.7",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ntipc: skb_linearize the head skb when reassembling msgs\n\nIt\u0027s not a good idea to append the frag skb to a skb\u0027s frag_list if\nthe frag_list already has skbs from elsewhere, such as this skb was\ncreated by pskb_copy() where the frag_list was cloned (all the skbs\nin it were skb_get\u0027ed) and shared by multiple skbs.\n\nHowever, the new appended frag skb should have been only seen by the\ncurrent skb. Otherwise, it will cause use after free crashes as this\nappended frag skb are seen by multiple skbs but it only got skb_get\ncalled once.\n\nThe same thing happens with a skb updated by pskb_may_pull() with a\nskb_cloned skb. Li Shuang has reported quite a few crashes caused\nby this when doing testing over macvlan devices:\n\n  [] kernel BUG at net/core/skbuff.c:1970!\n  [] Call Trace:\n  []  skb_clone+0x4d/0xb0\n  []  macvlan_broadcast+0xd8/0x160 [macvlan]\n  []  macvlan_process_broadcast+0x148/0x150 [macvlan]\n  []  process_one_work+0x1a7/0x360\n  []  worker_thread+0x30/0x390\n\n  [] kernel BUG at mm/usercopy.c:102!\n  [] Call Trace:\n  []  __check_heap_object+0xd3/0x100\n  []  __check_object_size+0xff/0x16b\n  []  simple_copy_to_iter+0x1c/0x30\n  []  __skb_datagram_iter+0x7d/0x310\n  []  __skb_datagram_iter+0x2a5/0x310\n  []  skb_copy_datagram_iter+0x3b/0x90\n  []  tipc_recvmsg+0x14a/0x3a0 [tipc]\n  []  ____sys_recvmsg+0x91/0x150\n  []  ___sys_recvmsg+0x7b/0xc0\n\n  [] kernel BUG at mm/slub.c:305!\n  [] Call Trace:\n  []  \u003cIRQ\u003e\n  []  kmem_cache_free+0x3ff/0x400\n  []  __netif_receive_skb_core+0x12c/0xc40\n  []  ? kmem_cache_alloc+0x12e/0x270\n  []  netif_receive_skb_internal+0x3d/0xb0\n  []  ? get_rx_page_info+0x8e/0xa0 [be2net]\n  []  be_poll+0x6ef/0xd00 [be2net]\n  []  ? irq_exit+0x4f/0x100\n  []  net_rx_action+0x149/0x3b0\n\n  ...\n\nThis patch is to fix it by linearizing the head skb if it has frag_list\nset in tipc_buf_append(). Note that we choose to do this before calling\nskb_unshare(), as __skb_linearize() will avoid skb_copy(). Also, we can\nnot just drop the frag_list either as the early time."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-05-04T12:41:09.415Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/b2c8d28c34b3070407cb1741f9ba3f15d0284b8b"
        },
        {
          "url": "https://git.kernel.org/stable/c/5489f30bb78ff0dafb4229a69632afc2ba20765c"
        },
        {
          "url": "https://git.kernel.org/stable/c/436d650d374329a591c30339a91fa5078052ed1e"
        },
        {
          "url": "https://git.kernel.org/stable/c/4b1761898861117c97066aea6c58f68a7787f0bf"
        },
        {
          "url": "https://git.kernel.org/stable/c/64d17ec9f1ded042c4b188d15734f33486ed9966"
        },
        {
          "url": "https://git.kernel.org/stable/c/6da24cfc83ba4f97ea44fc7ae9999a006101755c"
        },
        {
          "url": "https://git.kernel.org/stable/c/ace300eecbccaa698e2b472843c74a5f33f7dce8"
        },
        {
          "url": "https://git.kernel.org/stable/c/b7df21cf1b79ab7026f545e7bf837bd5750ac026"
        }
      ],
      "title": "tipc: skb_linearize the head skb when reassembling msgs",
      "x_generator": {
        "engine": "bippy-1.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2021-47162",
    "datePublished": "2024-03-25T09:16:15.857Z",
    "dateReserved": "2024-03-25T09:12:14.109Z",
    "dateUpdated": "2025-05-04T12:41:09.415Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2021-47162\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2024-03-25T10:15:08.480\",\"lastModified\":\"2025-03-13T21:23:24.410\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\ntipc: skb_linearize the head skb when reassembling msgs\\n\\nIt\u0027s not a good idea to append the frag skb to a skb\u0027s frag_list if\\nthe frag_list already has skbs from elsewhere, such as this skb was\\ncreated by pskb_copy() where the frag_list was cloned (all the skbs\\nin it were skb_get\u0027ed) and shared by multiple skbs.\\n\\nHowever, the new appended frag skb should have been only seen by the\\ncurrent skb. Otherwise, it will cause use after free crashes as this\\nappended frag skb are seen by multiple skbs but it only got skb_get\\ncalled once.\\n\\nThe same thing happens with a skb updated by pskb_may_pull() with a\\nskb_cloned skb. Li Shuang has reported quite a few crashes caused\\nby this when doing testing over macvlan devices:\\n\\n  [] kernel BUG at net/core/skbuff.c:1970!\\n  [] Call Trace:\\n  []  skb_clone+0x4d/0xb0\\n  []  macvlan_broadcast+0xd8/0x160 [macvlan]\\n  []  macvlan_process_broadcast+0x148/0x150 [macvlan]\\n  []  process_one_work+0x1a7/0x360\\n  []  worker_thread+0x30/0x390\\n\\n  [] kernel BUG at mm/usercopy.c:102!\\n  [] Call Trace:\\n  []  __check_heap_object+0xd3/0x100\\n  []  __check_object_size+0xff/0x16b\\n  []  simple_copy_to_iter+0x1c/0x30\\n  []  __skb_datagram_iter+0x7d/0x310\\n  []  __skb_datagram_iter+0x2a5/0x310\\n  []  skb_copy_datagram_iter+0x3b/0x90\\n  []  tipc_recvmsg+0x14a/0x3a0 [tipc]\\n  []  ____sys_recvmsg+0x91/0x150\\n  []  ___sys_recvmsg+0x7b/0xc0\\n\\n  [] kernel BUG at mm/slub.c:305!\\n  [] Call Trace:\\n  []  \u003cIRQ\u003e\\n  []  kmem_cache_free+0x3ff/0x400\\n  []  __netif_receive_skb_core+0x12c/0xc40\\n  []  ? kmem_cache_alloc+0x12e/0x270\\n  []  netif_receive_skb_internal+0x3d/0xb0\\n  []  ? get_rx_page_info+0x8e/0xa0 [be2net]\\n  []  be_poll+0x6ef/0xd00 [be2net]\\n  []  ? irq_exit+0x4f/0x100\\n  []  net_rx_action+0x149/0x3b0\\n\\n  ...\\n\\nThis patch is to fix it by linearizing the head skb if it has frag_list\\nset in tipc_buf_append(). Note that we choose to do this before calling\\nskb_unshare(), as __skb_linearize() will avoid skb_copy(). Also, we can\\nnot just drop the frag_list either as the early time.\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: tipc: skb_linearize el skb principal al volver a ensamblar mensajes No es una buena idea agregar el frag skb a la frag_list de un skb si la frag_list ya tiene skbs de otro lugar, como por ejemplo este skb fue creado por pskb_copy() donde se clon\u00f3 frag_list (todos los skbs que conten\u00eda fueron skb_get\u0027ed) y se comparti\u00f3 con varios skbs. Sin embargo, el nuevo fragmento skb adjunto solo deber\u00eda haber sido visto por el skb actual. De lo contrario, causar\u00e1 uso despu\u00e9s de fallas gratuitas, ya que varios skbs ven este fragmento skb agregado, pero solo se llam\u00f3 a skb_get una vez. Lo mismo sucede con un skb actualizado por pskb_may_pull() con un skb skb_cloned. Li Shuang ha informado de bastantes fallos causados por esto al realizar pruebas en dispositivos macvlan: [] \u00a1ERROR del kernel en net/core/skbuff.c:1970! [] Seguimiento de llamadas: [] skb_clone+0x4d/0xb0 [] macvlan_broadcast+0xd8/0x160 [macvlan] [] macvlan_process_broadcast+0x148/0x150 [macvlan] [] Process_one_work+0x1a7/0x360 [] trabajador_thread+0x30/0x390 [] ERROR del kernel en mm/usercopy.c:102! [] Seguimiento de llamadas: [] __check_heap_object+0xd3/0x100 [] __check_object_size+0xff/0x16b [] simple_copy_to_iter+0x1c/0x30 [] __skb_datagram_iter+0x7d/0x310 [] __skb_datagram_iter+0x2a5/0x310 [] skb_copy_datagram _iter+0x3b/0x90 [] tipc_recvmsg +0x14a/0x3a0 [tipc] [] ____sys_recvmsg+0x91/0x150 [] ___sys_recvmsg+0x7b/0xc0 [] \u00a1ERROR del kernel en mm/slub.c:305! [] Seguimiento de llamadas: []  [] kmem_cache_free+0x3ff/0x400 [] __netif_receive_skb_core+0x12c/0xc40 [] ? kmem_cache_alloc+0x12e/0x270 [] netif_receive_skb_internal+0x3d/0xb0 [] ? get_rx_page_info+0x8e/0xa0 [be2net] [] be_poll+0x6ef/0xd00 [be2net] [] ? irq_exit+0x4f/0x100 [] net_rx_action+0x149/0x3b0 ... Este parche es para solucionarlo linealizando el skb principal si tiene frag_list configurado en tipc_buf_append(). Tenga en cuenta que elegimos hacer esto antes de llamar a skb_unshare(), ya que __skb_linearize() evitar\u00e1 skb_copy(). Adem\u00e1s, tampoco podemos simplemente eliminar frag_list desde el principio.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-416\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.3\",\"versionEndExcluding\":\"4.4.271\",\"matchCriteriaId\":\"48D6EB76-316E-412C-B3FF-6500D60AB68E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.5\",\"versionEndExcluding\":\"4.9.271\",\"matchCriteriaId\":\"1E7DAE3A-78E9-45DB-96D8-4541CD7DC26B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.10\",\"versionEndExcluding\":\"4.14.235\",\"matchCriteriaId\":\"03A23445-0C1A-42AB-AC5C-768360DDF32C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.15\",\"versionEndExcluding\":\"4.19.193\",\"matchCriteriaId\":\"C8DEF3EC-88D9-4B89-8CF9-64BD6C863C9D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.20\",\"versionEndExcluding\":\"5.4.124\",\"matchCriteriaId\":\"06FE0F99-F7A9-462A-8355-30E2EDA9826B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.5\",\"versionEndExcluding\":\"5.10.42\",\"matchCriteriaId\":\"C3E7E799-1C8A-45FB-9E07-4731996144C9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.11\",\"versionEndExcluding\":\"5.12.9\",\"matchCriteriaId\":\"2C8A1D02-81A7-44E5-ACFD-CC6A6694F930\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"0CBAD0FC-C281-4666-AB2F-F8E6E1165DF7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"96AC23B2-D46A-49D9-8203-8E1BEDCA8532\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:5.13:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA610E30-717C-4700-9F77-A3C9244F3BFD\"}]}]}],\"references\":[{\"url\":\"https://git.kernel.org/stable/c/436d650d374329a591c30339a91fa5078052ed1e\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/4b1761898861117c97066aea6c58f68a7787f0bf\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/5489f30bb78ff0dafb4229a69632afc2ba20765c\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/64d17ec9f1ded042c4b188d15734f33486ed9966\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/6da24cfc83ba4f97ea44fc7ae9999a006101755c\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/ace300eecbccaa698e2b472843c74a5f33f7dce8\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/b2c8d28c34b3070407cb1741f9ba3f15d0284b8b\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/b7df21cf1b79ab7026f545e7bf837bd5750ac026\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/436d650d374329a591c30339a91fa5078052ed1e\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/4b1761898861117c97066aea6c58f68a7787f0bf\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/5489f30bb78ff0dafb4229a69632afc2ba20765c\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/64d17ec9f1ded042c4b188d15734f33486ed9966\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/6da24cfc83ba4f97ea44fc7ae9999a006101755c\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/ace300eecbccaa698e2b472843c74a5f33f7dce8\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/b2c8d28c34b3070407cb1741f9ba3f15d0284b8b\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/b7df21cf1b79ab7026f545e7bf837bd5750ac026\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://git.kernel.org/stable/c/b2c8d28c34b3070407cb1741f9ba3f15d0284b8b\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/5489f30bb78ff0dafb4229a69632afc2ba20765c\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/436d650d374329a591c30339a91fa5078052ed1e\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/4b1761898861117c97066aea6c58f68a7787f0bf\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/64d17ec9f1ded042c4b188d15734f33486ed9966\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/6da24cfc83ba4f97ea44fc7ae9999a006101755c\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/ace300eecbccaa698e2b472843c74a5f33f7dce8\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/b7df21cf1b79ab7026f545e7bf837bd5750ac026\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-04T05:24:39.945Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2021-47162\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-06-26T20:36:04.317335Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-06-26T20:36:09.578Z\"}}], \"cna\": {\"title\": \"tipc: skb_linearize the head skb when reassembling msgs\", \"affected\": [{\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"45c8b7b175ceb2d542e0fe15247377bf3bce29ec\", \"lessThan\": \"b2c8d28c34b3070407cb1741f9ba3f15d0284b8b\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"45c8b7b175ceb2d542e0fe15247377bf3bce29ec\", \"lessThan\": \"5489f30bb78ff0dafb4229a69632afc2ba20765c\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"45c8b7b175ceb2d542e0fe15247377bf3bce29ec\", \"lessThan\": \"436d650d374329a591c30339a91fa5078052ed1e\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"45c8b7b175ceb2d542e0fe15247377bf3bce29ec\", \"lessThan\": \"4b1761898861117c97066aea6c58f68a7787f0bf\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"45c8b7b175ceb2d542e0fe15247377bf3bce29ec\", \"lessThan\": \"64d17ec9f1ded042c4b188d15734f33486ed9966\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"45c8b7b175ceb2d542e0fe15247377bf3bce29ec\", \"lessThan\": \"6da24cfc83ba4f97ea44fc7ae9999a006101755c\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"45c8b7b175ceb2d542e0fe15247377bf3bce29ec\", \"lessThan\": \"ace300eecbccaa698e2b472843c74a5f33f7dce8\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"45c8b7b175ceb2d542e0fe15247377bf3bce29ec\", \"lessThan\": \"b7df21cf1b79ab7026f545e7bf837bd5750ac026\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"d45ed6c1ff20d3640a31f03816ca2d48fb7d6f22\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"c19282fd54a19e4651a4e67836cd842082546677\", \"versionType\": \"git\"}], \"programFiles\": [\"net/tipc/msg.c\"], \"defaultStatus\": \"unaffected\"}, {\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"4.3\"}, {\"status\": \"unaffected\", \"version\": \"0\", \"lessThan\": \"4.3\", \"versionType\": \"semver\"}, {\"status\": \"unaffected\", \"version\": \"4.4.271\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"4.4.*\"}, {\"status\": \"unaffected\", \"version\": \"4.9.271\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"4.9.*\"}, {\"status\": \"unaffected\", \"version\": \"4.14.235\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"4.14.*\"}, {\"status\": \"unaffected\", \"version\": \"4.19.193\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"4.19.*\"}, {\"status\": \"unaffected\", \"version\": \"5.4.124\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.4.*\"}, {\"status\": \"unaffected\", \"version\": \"5.10.42\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.10.*\"}, {\"status\": \"unaffected\", \"version\": \"5.12.9\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.12.*\"}, {\"status\": \"unaffected\", \"version\": \"5.13\", \"versionType\": \"original_commit_for_fix\", \"lessThanOrEqual\": \"*\"}], \"programFiles\": [\"net/tipc/msg.c\"], \"defaultStatus\": \"affected\"}], \"references\": [{\"url\": \"https://git.kernel.org/stable/c/b2c8d28c34b3070407cb1741f9ba3f15d0284b8b\"}, {\"url\": \"https://git.kernel.org/stable/c/5489f30bb78ff0dafb4229a69632afc2ba20765c\"}, {\"url\": \"https://git.kernel.org/stable/c/436d650d374329a591c30339a91fa5078052ed1e\"}, {\"url\": \"https://git.kernel.org/stable/c/4b1761898861117c97066aea6c58f68a7787f0bf\"}, {\"url\": \"https://git.kernel.org/stable/c/64d17ec9f1ded042c4b188d15734f33486ed9966\"}, {\"url\": \"https://git.kernel.org/stable/c/6da24cfc83ba4f97ea44fc7ae9999a006101755c\"}, {\"url\": \"https://git.kernel.org/stable/c/ace300eecbccaa698e2b472843c74a5f33f7dce8\"}, {\"url\": \"https://git.kernel.org/stable/c/b7df21cf1b79ab7026f545e7bf837bd5750ac026\"}], \"x_generator\": {\"engine\": \"bippy-1.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\ntipc: skb_linearize the head skb when reassembling msgs\\n\\nIt\u0027s not a good idea to append the frag skb to a skb\u0027s frag_list if\\nthe frag_list already has skbs from elsewhere, such as this skb was\\ncreated by pskb_copy() where the frag_list was cloned (all the skbs\\nin it were skb_get\u0027ed) and shared by multiple skbs.\\n\\nHowever, the new appended frag skb should have been only seen by the\\ncurrent skb. Otherwise, it will cause use after free crashes as this\\nappended frag skb are seen by multiple skbs but it only got skb_get\\ncalled once.\\n\\nThe same thing happens with a skb updated by pskb_may_pull() with a\\nskb_cloned skb. Li Shuang has reported quite a few crashes caused\\nby this when doing testing over macvlan devices:\\n\\n  [] kernel BUG at net/core/skbuff.c:1970!\\n  [] Call Trace:\\n  []  skb_clone+0x4d/0xb0\\n  []  macvlan_broadcast+0xd8/0x160 [macvlan]\\n  []  macvlan_process_broadcast+0x148/0x150 [macvlan]\\n  []  process_one_work+0x1a7/0x360\\n  []  worker_thread+0x30/0x390\\n\\n  [] kernel BUG at mm/usercopy.c:102!\\n  [] Call Trace:\\n  []  __check_heap_object+0xd3/0x100\\n  []  __check_object_size+0xff/0x16b\\n  []  simple_copy_to_iter+0x1c/0x30\\n  []  __skb_datagram_iter+0x7d/0x310\\n  []  __skb_datagram_iter+0x2a5/0x310\\n  []  skb_copy_datagram_iter+0x3b/0x90\\n  []  tipc_recvmsg+0x14a/0x3a0 [tipc]\\n  []  ____sys_recvmsg+0x91/0x150\\n  []  ___sys_recvmsg+0x7b/0xc0\\n\\n  [] kernel BUG at mm/slub.c:305!\\n  [] Call Trace:\\n  []  \u003cIRQ\u003e\\n  []  kmem_cache_free+0x3ff/0x400\\n  []  __netif_receive_skb_core+0x12c/0xc40\\n  []  ? kmem_cache_alloc+0x12e/0x270\\n  []  netif_receive_skb_internal+0x3d/0xb0\\n  []  ? get_rx_page_info+0x8e/0xa0 [be2net]\\n  []  be_poll+0x6ef/0xd00 [be2net]\\n  []  ? irq_exit+0x4f/0x100\\n  []  net_rx_action+0x149/0x3b0\\n\\n  ...\\n\\nThis patch is to fix it by linearizing the head skb if it has frag_list\\nset in tipc_buf_append(). Note that we choose to do this before calling\\nskb_unshare(), as __skb_linearize() will avoid skb_copy(). Also, we can\\nnot just drop the frag_list either as the early time.\"}], \"cpeApplicability\": [{\"nodes\": [{\"negate\": false, \"cpeMatch\": [{\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"4.4.271\", \"versionStartIncluding\": \"4.3\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"4.9.271\", \"versionStartIncluding\": \"4.3\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"4.14.235\", \"versionStartIncluding\": \"4.3\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"4.19.193\", \"versionStartIncluding\": \"4.3\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.4.124\", \"versionStartIncluding\": \"4.3\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.10.42\", \"versionStartIncluding\": \"4.3\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.12.9\", \"versionStartIncluding\": \"4.3\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.13\", \"versionStartIncluding\": \"4.3\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionStartIncluding\": \"4.1.14\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionStartIncluding\": \"4.2.7\"}], \"operator\": \"OR\"}]}], \"providerMetadata\": {\"orgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"shortName\": \"Linux\", \"dateUpdated\": \"2025-05-04T12:41:09.415Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2021-47162\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-05-04T12:41:09.415Z\", \"dateReserved\": \"2024-03-25T09:12:14.109Z\", \"assignerOrgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"datePublished\": \"2024-03-25T09:16:15.857Z\", \"assignerShortName\": \"Linux\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…