CVE-2021-47162 (GCVE-0-2021-47162)
Vulnerability from cvelistv5
Published
2024-03-25 09:16
Modified
2025-05-04 12:41
Severity ?
Summary
In the Linux kernel, the following vulnerability has been resolved: tipc: skb_linearize the head skb when reassembling msgs It's not a good idea to append the frag skb to a skb's frag_list if the frag_list already has skbs from elsewhere, such as this skb was created by pskb_copy() where the frag_list was cloned (all the skbs in it were skb_get'ed) and shared by multiple skbs. However, the new appended frag skb should have been only seen by the current skb. Otherwise, it will cause use after free crashes as this appended frag skb are seen by multiple skbs but it only got skb_get called once. The same thing happens with a skb updated by pskb_may_pull() with a skb_cloned skb. Li Shuang has reported quite a few crashes caused by this when doing testing over macvlan devices: [] kernel BUG at net/core/skbuff.c:1970! [] Call Trace: [] skb_clone+0x4d/0xb0 [] macvlan_broadcast+0xd8/0x160 [macvlan] [] macvlan_process_broadcast+0x148/0x150 [macvlan] [] process_one_work+0x1a7/0x360 [] worker_thread+0x30/0x390 [] kernel BUG at mm/usercopy.c:102! [] Call Trace: [] __check_heap_object+0xd3/0x100 [] __check_object_size+0xff/0x16b [] simple_copy_to_iter+0x1c/0x30 [] __skb_datagram_iter+0x7d/0x310 [] __skb_datagram_iter+0x2a5/0x310 [] skb_copy_datagram_iter+0x3b/0x90 [] tipc_recvmsg+0x14a/0x3a0 [tipc] [] ____sys_recvmsg+0x91/0x150 [] ___sys_recvmsg+0x7b/0xc0 [] kernel BUG at mm/slub.c:305! [] Call Trace: [] <IRQ> [] kmem_cache_free+0x3ff/0x400 [] __netif_receive_skb_core+0x12c/0xc40 [] ? kmem_cache_alloc+0x12e/0x270 [] netif_receive_skb_internal+0x3d/0xb0 [] ? get_rx_page_info+0x8e/0xa0 [be2net] [] be_poll+0x6ef/0xd00 [be2net] [] ? irq_exit+0x4f/0x100 [] net_rx_action+0x149/0x3b0 ... This patch is to fix it by linearizing the head skb if it has frag_list set in tipc_buf_append(). Note that we choose to do this before calling skb_unshare(), as __skb_linearize() will avoid skb_copy(). Also, we can not just drop the frag_list either as the early time.
Impacted products
Vendor Product Version
Linux Linux Version: 45c8b7b175ceb2d542e0fe15247377bf3bce29ec
Version: 45c8b7b175ceb2d542e0fe15247377bf3bce29ec
Version: 45c8b7b175ceb2d542e0fe15247377bf3bce29ec
Version: 45c8b7b175ceb2d542e0fe15247377bf3bce29ec
Version: 45c8b7b175ceb2d542e0fe15247377bf3bce29ec
Version: 45c8b7b175ceb2d542e0fe15247377bf3bce29ec
Version: 45c8b7b175ceb2d542e0fe15247377bf3bce29ec
Version: 45c8b7b175ceb2d542e0fe15247377bf3bce29ec
Version: d45ed6c1ff20d3640a31f03816ca2d48fb7d6f22
Version: c19282fd54a19e4651a4e67836cd842082546677
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2021-47162",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-06-26T20:36:04.317335Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-06-26T20:36:12.629Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T05:24:39.945Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/b2c8d28c34b3070407cb1741f9ba3f15d0284b8b"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/5489f30bb78ff0dafb4229a69632afc2ba20765c"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/436d650d374329a591c30339a91fa5078052ed1e"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/4b1761898861117c97066aea6c58f68a7787f0bf"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/64d17ec9f1ded042c4b188d15734f33486ed9966"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/6da24cfc83ba4f97ea44fc7ae9999a006101755c"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/ace300eecbccaa698e2b472843c74a5f33f7dce8"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/b7df21cf1b79ab7026f545e7bf837bd5750ac026"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "net/tipc/msg.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "b2c8d28c34b3070407cb1741f9ba3f15d0284b8b",
              "status": "affected",
              "version": "45c8b7b175ceb2d542e0fe15247377bf3bce29ec",
              "versionType": "git"
            },
            {
              "lessThan": "5489f30bb78ff0dafb4229a69632afc2ba20765c",
              "status": "affected",
              "version": "45c8b7b175ceb2d542e0fe15247377bf3bce29ec",
              "versionType": "git"
            },
            {
              "lessThan": "436d650d374329a591c30339a91fa5078052ed1e",
              "status": "affected",
              "version": "45c8b7b175ceb2d542e0fe15247377bf3bce29ec",
              "versionType": "git"
            },
            {
              "lessThan": "4b1761898861117c97066aea6c58f68a7787f0bf",
              "status": "affected",
              "version": "45c8b7b175ceb2d542e0fe15247377bf3bce29ec",
              "versionType": "git"
            },
            {
              "lessThan": "64d17ec9f1ded042c4b188d15734f33486ed9966",
              "status": "affected",
              "version": "45c8b7b175ceb2d542e0fe15247377bf3bce29ec",
              "versionType": "git"
            },
            {
              "lessThan": "6da24cfc83ba4f97ea44fc7ae9999a006101755c",
              "status": "affected",
              "version": "45c8b7b175ceb2d542e0fe15247377bf3bce29ec",
              "versionType": "git"
            },
            {
              "lessThan": "ace300eecbccaa698e2b472843c74a5f33f7dce8",
              "status": "affected",
              "version": "45c8b7b175ceb2d542e0fe15247377bf3bce29ec",
              "versionType": "git"
            },
            {
              "lessThan": "b7df21cf1b79ab7026f545e7bf837bd5750ac026",
              "status": "affected",
              "version": "45c8b7b175ceb2d542e0fe15247377bf3bce29ec",
              "versionType": "git"
            },
            {
              "status": "affected",
              "version": "d45ed6c1ff20d3640a31f03816ca2d48fb7d6f22",
              "versionType": "git"
            },
            {
              "status": "affected",
              "version": "c19282fd54a19e4651a4e67836cd842082546677",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "net/tipc/msg.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "4.3"
            },
            {
              "lessThan": "4.3",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.4.*",
              "status": "unaffected",
              "version": "4.4.271",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.9.*",
              "status": "unaffected",
              "version": "4.9.271",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.14.*",
              "status": "unaffected",
              "version": "4.14.235",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.19.*",
              "status": "unaffected",
              "version": "4.19.193",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.4.*",
              "status": "unaffected",
              "version": "5.4.124",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.10.*",
              "status": "unaffected",
              "version": "5.10.42",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.12.*",
              "status": "unaffected",
              "version": "5.12.9",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "5.13",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "4.4.271",
                  "versionStartIncluding": "4.3",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "4.9.271",
                  "versionStartIncluding": "4.3",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "4.14.235",
                  "versionStartIncluding": "4.3",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "4.19.193",
                  "versionStartIncluding": "4.3",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.4.124",
                  "versionStartIncluding": "4.3",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.10.42",
                  "versionStartIncluding": "4.3",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.12.9",
                  "versionStartIncluding": "4.3",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.13",
                  "versionStartIncluding": "4.3",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionStartIncluding": "4.1.14",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionStartIncluding": "4.2.7",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ntipc: skb_linearize the head skb when reassembling msgs\n\nIt\u0027s not a good idea to append the frag skb to a skb\u0027s frag_list if\nthe frag_list already has skbs from elsewhere, such as this skb was\ncreated by pskb_copy() where the frag_list was cloned (all the skbs\nin it were skb_get\u0027ed) and shared by multiple skbs.\n\nHowever, the new appended frag skb should have been only seen by the\ncurrent skb. Otherwise, it will cause use after free crashes as this\nappended frag skb are seen by multiple skbs but it only got skb_get\ncalled once.\n\nThe same thing happens with a skb updated by pskb_may_pull() with a\nskb_cloned skb. Li Shuang has reported quite a few crashes caused\nby this when doing testing over macvlan devices:\n\n  [] kernel BUG at net/core/skbuff.c:1970!\n  [] Call Trace:\n  []  skb_clone+0x4d/0xb0\n  []  macvlan_broadcast+0xd8/0x160 [macvlan]\n  []  macvlan_process_broadcast+0x148/0x150 [macvlan]\n  []  process_one_work+0x1a7/0x360\n  []  worker_thread+0x30/0x390\n\n  [] kernel BUG at mm/usercopy.c:102!\n  [] Call Trace:\n  []  __check_heap_object+0xd3/0x100\n  []  __check_object_size+0xff/0x16b\n  []  simple_copy_to_iter+0x1c/0x30\n  []  __skb_datagram_iter+0x7d/0x310\n  []  __skb_datagram_iter+0x2a5/0x310\n  []  skb_copy_datagram_iter+0x3b/0x90\n  []  tipc_recvmsg+0x14a/0x3a0 [tipc]\n  []  ____sys_recvmsg+0x91/0x150\n  []  ___sys_recvmsg+0x7b/0xc0\n\n  [] kernel BUG at mm/slub.c:305!\n  [] Call Trace:\n  []  \u003cIRQ\u003e\n  []  kmem_cache_free+0x3ff/0x400\n  []  __netif_receive_skb_core+0x12c/0xc40\n  []  ? kmem_cache_alloc+0x12e/0x270\n  []  netif_receive_skb_internal+0x3d/0xb0\n  []  ? get_rx_page_info+0x8e/0xa0 [be2net]\n  []  be_poll+0x6ef/0xd00 [be2net]\n  []  ? irq_exit+0x4f/0x100\n  []  net_rx_action+0x149/0x3b0\n\n  ...\n\nThis patch is to fix it by linearizing the head skb if it has frag_list\nset in tipc_buf_append(). Note that we choose to do this before calling\nskb_unshare(), as __skb_linearize() will avoid skb_copy(). Also, we can\nnot just drop the frag_list either as the early time."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-05-04T12:41:09.415Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/b2c8d28c34b3070407cb1741f9ba3f15d0284b8b"
        },
        {
          "url": "https://git.kernel.org/stable/c/5489f30bb78ff0dafb4229a69632afc2ba20765c"
        },
        {
          "url": "https://git.kernel.org/stable/c/436d650d374329a591c30339a91fa5078052ed1e"
        },
        {
          "url": "https://git.kernel.org/stable/c/4b1761898861117c97066aea6c58f68a7787f0bf"
        },
        {
          "url": "https://git.kernel.org/stable/c/64d17ec9f1ded042c4b188d15734f33486ed9966"
        },
        {
          "url": "https://git.kernel.org/stable/c/6da24cfc83ba4f97ea44fc7ae9999a006101755c"
        },
        {
          "url": "https://git.kernel.org/stable/c/ace300eecbccaa698e2b472843c74a5f33f7dce8"
        },
        {
          "url": "https://git.kernel.org/stable/c/b7df21cf1b79ab7026f545e7bf837bd5750ac026"
        }
      ],
      "title": "tipc: skb_linearize the head skb when reassembling msgs",
      "x_generator": {
        "engine": "bippy-1.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2021-47162",
    "datePublished": "2024-03-25T09:16:15.857Z",
    "dateReserved": "2024-03-25T09:12:14.109Z",
    "dateUpdated": "2025-05-04T12:41:09.415Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://git.kernel.org/stable/c/b2c8d28c34b3070407cb1741f9ba3f15d0284b8b\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/5489f30bb78ff0dafb4229a69632afc2ba20765c\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/436d650d374329a591c30339a91fa5078052ed1e\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/4b1761898861117c97066aea6c58f68a7787f0bf\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/64d17ec9f1ded042c4b188d15734f33486ed9966\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/6da24cfc83ba4f97ea44fc7ae9999a006101755c\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/ace300eecbccaa698e2b472843c74a5f33f7dce8\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/b7df21cf1b79ab7026f545e7bf837bd5750ac026\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-04T05:24:39.945Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2021-47162\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-06-26T20:36:04.317335Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-06-26T20:36:09.578Z\"}}], \"cna\": {\"title\": \"tipc: skb_linearize the head skb when reassembling msgs\", \"affected\": [{\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"45c8b7b175ceb2d542e0fe15247377bf3bce29ec\", \"lessThan\": \"b2c8d28c34b3070407cb1741f9ba3f15d0284b8b\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"45c8b7b175ceb2d542e0fe15247377bf3bce29ec\", \"lessThan\": \"5489f30bb78ff0dafb4229a69632afc2ba20765c\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"45c8b7b175ceb2d542e0fe15247377bf3bce29ec\", \"lessThan\": \"436d650d374329a591c30339a91fa5078052ed1e\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"45c8b7b175ceb2d542e0fe15247377bf3bce29ec\", \"lessThan\": \"4b1761898861117c97066aea6c58f68a7787f0bf\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"45c8b7b175ceb2d542e0fe15247377bf3bce29ec\", \"lessThan\": \"64d17ec9f1ded042c4b188d15734f33486ed9966\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"45c8b7b175ceb2d542e0fe15247377bf3bce29ec\", \"lessThan\": \"6da24cfc83ba4f97ea44fc7ae9999a006101755c\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"45c8b7b175ceb2d542e0fe15247377bf3bce29ec\", \"lessThan\": \"ace300eecbccaa698e2b472843c74a5f33f7dce8\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"45c8b7b175ceb2d542e0fe15247377bf3bce29ec\", \"lessThan\": \"b7df21cf1b79ab7026f545e7bf837bd5750ac026\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"d45ed6c1ff20d3640a31f03816ca2d48fb7d6f22\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"c19282fd54a19e4651a4e67836cd842082546677\", \"versionType\": \"git\"}], \"programFiles\": [\"net/tipc/msg.c\"], \"defaultStatus\": \"unaffected\"}, {\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"4.3\"}, {\"status\": \"unaffected\", \"version\": \"0\", \"lessThan\": \"4.3\", \"versionType\": \"semver\"}, {\"status\": \"unaffected\", \"version\": \"4.4.271\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"4.4.*\"}, {\"status\": \"unaffected\", \"version\": \"4.9.271\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"4.9.*\"}, {\"status\": \"unaffected\", \"version\": \"4.14.235\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"4.14.*\"}, {\"status\": \"unaffected\", \"version\": \"4.19.193\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"4.19.*\"}, {\"status\": \"unaffected\", \"version\": \"5.4.124\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.4.*\"}, {\"status\": \"unaffected\", \"version\": \"5.10.42\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.10.*\"}, {\"status\": \"unaffected\", \"version\": \"5.12.9\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.12.*\"}, {\"status\": \"unaffected\", \"version\": \"5.13\", \"versionType\": \"original_commit_for_fix\", \"lessThanOrEqual\": \"*\"}], \"programFiles\": [\"net/tipc/msg.c\"], \"defaultStatus\": \"affected\"}], \"references\": [{\"url\": \"https://git.kernel.org/stable/c/b2c8d28c34b3070407cb1741f9ba3f15d0284b8b\"}, {\"url\": \"https://git.kernel.org/stable/c/5489f30bb78ff0dafb4229a69632afc2ba20765c\"}, {\"url\": \"https://git.kernel.org/stable/c/436d650d374329a591c30339a91fa5078052ed1e\"}, {\"url\": \"https://git.kernel.org/stable/c/4b1761898861117c97066aea6c58f68a7787f0bf\"}, {\"url\": \"https://git.kernel.org/stable/c/64d17ec9f1ded042c4b188d15734f33486ed9966\"}, {\"url\": \"https://git.kernel.org/stable/c/6da24cfc83ba4f97ea44fc7ae9999a006101755c\"}, {\"url\": \"https://git.kernel.org/stable/c/ace300eecbccaa698e2b472843c74a5f33f7dce8\"}, {\"url\": \"https://git.kernel.org/stable/c/b7df21cf1b79ab7026f545e7bf837bd5750ac026\"}], \"x_generator\": {\"engine\": \"bippy-1.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\ntipc: skb_linearize the head skb when reassembling msgs\\n\\nIt\u0027s not a good idea to append the frag skb to a skb\u0027s frag_list if\\nthe frag_list already has skbs from elsewhere, such as this skb was\\ncreated by pskb_copy() where the frag_list was cloned (all the skbs\\nin it were skb_get\u0027ed) and shared by multiple skbs.\\n\\nHowever, the new appended frag skb should have been only seen by the\\ncurrent skb. Otherwise, it will cause use after free crashes as this\\nappended frag skb are seen by multiple skbs but it only got skb_get\\ncalled once.\\n\\nThe same thing happens with a skb updated by pskb_may_pull() with a\\nskb_cloned skb. Li Shuang has reported quite a few crashes caused\\nby this when doing testing over macvlan devices:\\n\\n  [] kernel BUG at net/core/skbuff.c:1970!\\n  [] Call Trace:\\n  []  skb_clone+0x4d/0xb0\\n  []  macvlan_broadcast+0xd8/0x160 [macvlan]\\n  []  macvlan_process_broadcast+0x148/0x150 [macvlan]\\n  []  process_one_work+0x1a7/0x360\\n  []  worker_thread+0x30/0x390\\n\\n  [] kernel BUG at mm/usercopy.c:102!\\n  [] Call Trace:\\n  []  __check_heap_object+0xd3/0x100\\n  []  __check_object_size+0xff/0x16b\\n  []  simple_copy_to_iter+0x1c/0x30\\n  []  __skb_datagram_iter+0x7d/0x310\\n  []  __skb_datagram_iter+0x2a5/0x310\\n  []  skb_copy_datagram_iter+0x3b/0x90\\n  []  tipc_recvmsg+0x14a/0x3a0 [tipc]\\n  []  ____sys_recvmsg+0x91/0x150\\n  []  ___sys_recvmsg+0x7b/0xc0\\n\\n  [] kernel BUG at mm/slub.c:305!\\n  [] Call Trace:\\n  []  \u003cIRQ\u003e\\n  []  kmem_cache_free+0x3ff/0x400\\n  []  __netif_receive_skb_core+0x12c/0xc40\\n  []  ? kmem_cache_alloc+0x12e/0x270\\n  []  netif_receive_skb_internal+0x3d/0xb0\\n  []  ? get_rx_page_info+0x8e/0xa0 [be2net]\\n  []  be_poll+0x6ef/0xd00 [be2net]\\n  []  ? irq_exit+0x4f/0x100\\n  []  net_rx_action+0x149/0x3b0\\n\\n  ...\\n\\nThis patch is to fix it by linearizing the head skb if it has frag_list\\nset in tipc_buf_append(). Note that we choose to do this before calling\\nskb_unshare(), as __skb_linearize() will avoid skb_copy(). Also, we can\\nnot just drop the frag_list either as the early time.\"}], \"cpeApplicability\": [{\"nodes\": [{\"negate\": false, \"cpeMatch\": [{\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"4.4.271\", \"versionStartIncluding\": \"4.3\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"4.9.271\", \"versionStartIncluding\": \"4.3\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"4.14.235\", \"versionStartIncluding\": \"4.3\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"4.19.193\", \"versionStartIncluding\": \"4.3\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.4.124\", \"versionStartIncluding\": \"4.3\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.10.42\", \"versionStartIncluding\": \"4.3\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.12.9\", \"versionStartIncluding\": \"4.3\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.13\", \"versionStartIncluding\": \"4.3\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionStartIncluding\": \"4.1.14\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionStartIncluding\": \"4.2.7\"}], \"operator\": \"OR\"}]}], \"providerMetadata\": {\"orgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"shortName\": \"Linux\", \"dateUpdated\": \"2025-05-04T12:41:09.415Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2021-47162\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-05-04T12:41:09.415Z\", \"dateReserved\": \"2024-03-25T09:12:14.109Z\", \"assignerOrgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"datePublished\": \"2024-03-25T09:16:15.857Z\", \"assignerShortName\": \"Linux\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…