Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-46929— sctp: use call_rcu to free endpoint

EPSS 0.01% · P2
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2021-46929

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
sctp: use call_rcu to free endpoint
Source: NVD (National Vulnerability Database)
Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: sctp: use call_rcu to free endpoint This patch is to delay the endpoint free by calling call_rcu() to fix another use-after-free issue in sctp_sock_dump(): BUG: KASAN: use-after-free in __lock_acquire+0x36d9/0x4c20 Call Trace: __lock_acquire+0x36d9/0x4c20 kernel/locking/lockdep.c:3218 lock_acquire+0x1ed/0x520 kernel/locking/lockdep.c:3844 __raw_spin_lock_bh include/linux/spinlock_api_smp.h:135 [inline] _raw_spin_lock_bh+0x31/0x40 kernel/locking/spinlock.c:168 spin_lock_bh include/linux/spinlock.h:334 [inline] __lock_sock+0x203/0x350 net/core/sock.c:2253 lock_sock_nested+0xfe/0x120 net/core/sock.c:2774 lock_sock include/net/sock.h:1492 [inline] sctp_sock_dump+0x122/0xb20 net/sctp/diag.c:324 sctp_for_each_transport+0x2b5/0x370 net/sctp/socket.c:5091 sctp_diag_dump+0x3ac/0x660 net/sctp/diag.c:527 __inet_diag_dump+0xa8/0x140 net/ipv4/inet_diag.c:1049 inet_diag_dump+0x9b/0x110 net/ipv4/inet_diag.c:1065 netlink_dump+0x606/0x1080 net/netlink/af_netlink.c:2244 __netlink_dump_start+0x59a/0x7c0 net/netlink/af_netlink.c:2352 netlink_dump_start include/linux/netlink.h:216 [inline] inet_diag_handler_cmd+0x2ce/0x3f0 net/ipv4/inet_diag.c:1170 __sock_diag_cmd net/core/sock_diag.c:232 [inline] sock_diag_rcv_msg+0x31d/0x410 net/core/sock_diag.c:263 netlink_rcv_skb+0x172/0x440 net/netlink/af_netlink.c:2477 sock_diag_rcv+0x2a/0x40 net/core/sock_diag.c:274 This issue occurs when asoc is peeled off and the old sk is freed after getting it by asoc->base.sk and before calling lock_sock(sk). To prevent the sk free, as a holder of the sk, ep should be alive when calling lock_sock(). This patch uses call_rcu() and moves sock_put and ep free into sctp_endpoint_destroy_rcu(), so that it's safe to try to hold the ep under rcu_read_lock in sctp_transport_traverse_process(). If sctp_endpoint_hold() returns true, it means this ep is still alive and we have held it and can continue to dump it; If it returns false, it means this ep is dead and can be freed after rcu_read_unlock, and we should skip it. In sctp_sock_dump(), after locking the sk, if this ep is different from tsp->asoc->ep, it means during this dumping, this asoc was peeled off before calling lock_sock(), and the sk should be skipped; If this ep is the same with tsp->asoc->ep, it means no peeloff happens on this asoc, and due to lock_sock, no peeloff will happen either until release_sock. Note that delaying endpoint free won't delay the port release, as the port release happens in sctp_endpoint_destroy() before calling call_rcu(). Also, freeing endpoint by call_rcu() makes it safe to access the sk by asoc->base.sk in sctp_assocs_seq_show() and sctp_rcv(). Thanks Jones to bring this issue up. v1->v2: - improve the changelog. - add kfree(ep) into sctp_endpoint_destroy_rcu(), as Jakub noticed.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Linux kernel 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel 存在安全漏洞,该漏洞源于使用call_rcu释放端点。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
LinuxLinux d25adbeb0cdb860fb39e09cdd025e9cfc954c5ab ~ 8873140f95d4977bf37e4cf0d5c5e3f6e34cdd3e -
LinuxLinux 4.14 -

II. Public POCs for CVE-2021-46929

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2021-46929

登录查看更多情报信息。

Same Patch Batch · Linux · 2024-02-27 · 67 CVEs total

CVE-2021-46951tpm: efi: Use local variable for calculating final log size
CVE-2021-46971perf/core: Fix unconditional security_locked_down() call
CVE-2021-46970bus: mhi: pci_generic: Remove WQ_MEM_RECLAIM flag from state workqueue
CVE-2021-46969bus: mhi: core: Fix invalid error returning in mhi_queue
CVE-2021-46957riscv/kprobe: fix kernel panic when invoking sys_read traced by kprobe
CVE-2021-46956virtiofs: fix memory leak in virtio_fs_probe()
CVE-2021-46955openvswitch: fix stack OOB read while fragmenting IPv4 packets
CVE-2021-46954net/sched: sch_frag: fix stack OOB read while fragmenting IPv4 packets
CVE-2021-46953ACPI: GTDT: Don't corrupt interrupt mappings on watchdow probe failure
CVE-2021-46952NFS: fs_context: validate UDP retrans to prevent shift out-of-bounds
CVE-2021-46958btrfs: fix race between transaction aborts and fsyncs leading to use-after-free
CVE-2021-46950md/raid1: properly indicate failure when ending a failed write request
CVE-2021-46949sfc: farch: fix TX queue lookup in TX flush done handling
CVE-2021-46948sfc: farch: fix TX queue lookup in TX event handling
CVE-2021-46947sfc: adjust efx->xdp_tx_queue_count with the real number of initialized queues
CVE-2021-46945ext4: always panic when errors=panic is specified
CVE-2021-46944media: staging/intel-ipu3: Fix memory leak in imu_fmt
CVE-2021-46943media: staging/intel-ipu3: Fix set_fmt error handling
CVE-2021-46942io_uring: fix shared sqpoll cancellation hangs
CVE-2021-46941usb: dwc3: core: Do core softreset when switch mode

Showing top 20 of 67 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2021-46929

No comments yet


Leave a comment