cve-2021-47488
Vulnerability from cvelistv5
Published
2024-05-22 08:19
Modified
2024-11-04 12:06
Severity ?
Summary
cgroup: Fix memory leak caused by missing cgroup_bpf_offline
Impacted products
LinuxLinux
LinuxLinux
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T05:39:59.588Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/01599bf7cc2b49c3d2be886cb438647dc25446ed"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/b529f88d93884cf8ccafda793ee3d27b82fa578d"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/04f8ef5643bcd8bcde25dfdebef998aea480b2ba"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2021-47488",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-09-10T15:35:55.494242Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-09-11T17:32:53.086Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "kernel/cgroup/cgroup.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "01599bf7cc2b",
              "status": "affected",
              "version": "4bfc0bb2c60e",
              "versionType": "git"
            },
            {
              "lessThan": "b529f88d9388",
              "status": "affected",
              "version": "4bfc0bb2c60e",
              "versionType": "git"
            },
            {
              "lessThan": "04f8ef5643bc",
              "status": "affected",
              "version": "4bfc0bb2c60e",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "kernel/cgroup/cgroup.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "5.3"
            },
            {
              "lessThan": "5.3",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.10.*",
              "status": "unaffected",
              "version": "5.10.77",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.14.*",
              "status": "unaffected",
              "version": "5.14.16",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "5.15",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ncgroup: Fix memory leak caused by missing cgroup_bpf_offline\n\nWhen enabling CONFIG_CGROUP_BPF, kmemleak can be observed by running\nthe command as below:\n\n    $mount -t cgroup -o none,name=foo cgroup cgroup/\n    $umount cgroup/\n\nunreferenced object 0xc3585c40 (size 64):\n  comm \"mount\", pid 425, jiffies 4294959825 (age 31.990s)\n  hex dump (first 32 bytes):\n    01 00 00 80 84 8c 28 c0 00 00 00 00 00 00 00 00  ......(.........\n    00 00 00 00 00 00 00 00 6c 43 a0 c3 00 00 00 00  ........lC......\n  backtrace:\n    [\u003ce95a2f9e\u003e] cgroup_bpf_inherit+0x44/0x24c\n    [\u003c1f03679c\u003e] cgroup_setup_root+0x174/0x37c\n    [\u003ced4b0ac5\u003e] cgroup1_get_tree+0x2c0/0x4a0\n    [\u003cf85b12fd\u003e] vfs_get_tree+0x24/0x108\n    [\u003cf55aec5c\u003e] path_mount+0x384/0x988\n    [\u003ce2d5e9cd\u003e] do_mount+0x64/0x9c\n    [\u003c208c9cfe\u003e] sys_mount+0xfc/0x1f4\n    [\u003c06dd06e0\u003e] ret_fast_syscall+0x0/0x48\n    [\u003ca8308cb3\u003e] 0xbeb4daa8\n\nThis is because that since the commit 2b0d3d3e4fcf (\"percpu_ref: reduce\nmemory footprint of percpu_ref in fast path\") root_cgrp-\u003ebpf.refcnt.data\nis allocated by the function percpu_ref_init in cgroup_bpf_inherit which\nis called by cgroup_setup_root when mounting, but not freed along with\nroot_cgrp when umounting. Adding cgroup_bpf_offline which calls\npercpu_ref_kill to cgroup_kill_sb can free root_cgrp-\u003ebpf.refcnt.data in\numount path.\n\nThis patch also fixes the commit 4bfc0bb2c60e (\"bpf: decouple the lifetime\nof cgroup_bpf from cgroup itself\"). A cgroup_bpf_offline is needed to do a\ncleanup that frees the resources which are allocated by cgroup_bpf_inherit\nin cgroup_setup_root.\n\nAnd inside cgroup_bpf_offline, cgroup_get() is at the beginning and\ncgroup_put is at the end of cgroup_bpf_release which is called by\ncgroup_bpf_offline. So cgroup_bpf_offline can keep the balance of\ncgroup\u0027s refcount."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-11-04T12:06:53.179Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/01599bf7cc2b49c3d2be886cb438647dc25446ed"
        },
        {
          "url": "https://git.kernel.org/stable/c/b529f88d93884cf8ccafda793ee3d27b82fa578d"
        },
        {
          "url": "https://git.kernel.org/stable/c/04f8ef5643bcd8bcde25dfdebef998aea480b2ba"
        }
      ],
      "title": "cgroup: Fix memory leak caused by missing cgroup_bpf_offline",
      "x_generator": {
        "engine": "bippy-9e1c9544281a"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2021-47488",
    "datePublished": "2024-05-22T08:19:38.117Z",
    "dateReserved": "2024-05-22T06:20:56.201Z",
    "dateUpdated": "2024-11-04T12:06:53.179Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2021-47488\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2024-05-22T09:15:10.700\",\"lastModified\":\"2024-05-22T12:46:53.887\",\"vulnStatus\":\"Awaiting Analysis\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\ncgroup: Fix memory leak caused by missing cgroup_bpf_offline\\n\\nWhen enabling CONFIG_CGROUP_BPF, kmemleak can be observed by running\\nthe command as below:\\n\\n    $mount -t cgroup -o none,name=foo cgroup cgroup/\\n    $umount cgroup/\\n\\nunreferenced object 0xc3585c40 (size 64):\\n  comm \\\"mount\\\", pid 425, jiffies 4294959825 (age 31.990s)\\n  hex dump (first 32 bytes):\\n    01 00 00 80 84 8c 28 c0 00 00 00 00 00 00 00 00  ......(.........\\n    00 00 00 00 00 00 00 00 6c 43 a0 c3 00 00 00 00  ........lC......\\n  backtrace:\\n    [\u003ce95a2f9e\u003e] cgroup_bpf_inherit+0x44/0x24c\\n    [\u003c1f03679c\u003e] cgroup_setup_root+0x174/0x37c\\n    [\u003ced4b0ac5\u003e] cgroup1_get_tree+0x2c0/0x4a0\\n    [\u003cf85b12fd\u003e] vfs_get_tree+0x24/0x108\\n    [\u003cf55aec5c\u003e] path_mount+0x384/0x988\\n    [\u003ce2d5e9cd\u003e] do_mount+0x64/0x9c\\n    [\u003c208c9cfe\u003e] sys_mount+0xfc/0x1f4\\n    [\u003c06dd06e0\u003e] ret_fast_syscall+0x0/0x48\\n    [\u003ca8308cb3\u003e] 0xbeb4daa8\\n\\nThis is because that since the commit 2b0d3d3e4fcf (\\\"percpu_ref: reduce\\nmemory footprint of percpu_ref in fast path\\\") root_cgrp-\u003ebpf.refcnt.data\\nis allocated by the function percpu_ref_init in cgroup_bpf_inherit which\\nis called by cgroup_setup_root when mounting, but not freed along with\\nroot_cgrp when umounting. Adding cgroup_bpf_offline which calls\\npercpu_ref_kill to cgroup_kill_sb can free root_cgrp-\u003ebpf.refcnt.data in\\numount path.\\n\\nThis patch also fixes the commit 4bfc0bb2c60e (\\\"bpf: decouple the lifetime\\nof cgroup_bpf from cgroup itself\\\"). A cgroup_bpf_offline is needed to do a\\ncleanup that frees the resources which are allocated by cgroup_bpf_inherit\\nin cgroup_setup_root.\\n\\nAnd inside cgroup_bpf_offline, cgroup_get() is at the beginning and\\ncgroup_put is at the end of cgroup_bpf_release which is called by\\ncgroup_bpf_offline. So cgroup_bpf_offline can keep the balance of\\ncgroup\u0027s refcount.\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: cgroup: corrige la p\u00e9rdida de memoria causada por la falta de cgroup_bpf_offline Al habilitar CONFIG_CGROUP_BPF, se puede observar kmemleak ejecutando el siguiente comando: $mount -t cgroup -o none,name=foo cgroup cgroup / $umount cgroup/ objeto sin referencia 0xc3585c40 (tama\u00f1o 64): comm \\\"mount\\\", pid 425, sjiffies 4294959825 (edad 31.990s) volcado hexadecimal (primeros 32 bytes): 01 00 00 80 84 8c 28 c0 00 00 00 00 00 00 00 00 ......(....... 00 00 00 00 00 00 00 00 6c 43 a0 c3 00 00 00 00 ........lC...... retroceso : [] cgroup_bpf_inherit+0x44/0x24c [\u0026lt;1f03679c\u0026gt;] cgroup_setup_root+0x174/0x37c [] cgroup1_get_tree+0x2c0/0x4a0 [] 8 [] ruta_montaje+0x384/ 0x988 [] do_mount+0x64/0x9c [\u0026lt;208c9cfe\u0026gt;] sys_mount+0xfc/0x1f4 [\u0026lt;06dd06e0\u0026gt;] ret_fast_syscall+0x0/0x48 [] 0xbeb4daa8 Esto se debe a que desde El commit 2b0d3d3e4f cf (\\\"percpu_ref: reducir huella de memoria de percpu_ref en la ruta r\u00e1pida\\\") root_cgrp-\u0026gt;bpf.refcnt.data es asignada por la funci\u00f3n percpu_ref_init en cgroup_bpf_inherit, que es llamada por cgroup_setup_root al montar, pero no se libera junto con root_cgrp al desmontar. Agregar cgroup_bpf_offline que llama a percpu_ref_kill a cgroup_kill_sb puede liberar root_cgrp-\u0026gt;bpf.refcnt.data en la ruta de montaje. Este parche tambi\u00e9n corrige el commit 4bfc0bb2c60e (\\\"bpf: desacople la vida \u00fatil de cgroup_bpf del propio cgroup\\\"). Se necesita cgroup_bpf_offline para realizar una sanitizaci\u00f3n que libere los recursos asignados por cgroup_bpf_inherit en cgroup_setup_root. Y dentro de cgroup_bpf_offline, cgroup_get() est\u00e1 al principio y cgroup_put est\u00e1 al final de cgroup_bpf_release, que es llamado por cgroup_bpf_offline. Entonces cgroup_bpf_offline puede mantener el saldo del recuento de cgroup.\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/01599bf7cc2b49c3d2be886cb438647dc25446ed\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/04f8ef5643bcd8bcde25dfdebef998aea480b2ba\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/b529f88d93884cf8ccafda793ee3d27b82fa578d\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading...

Loading...

Loading...

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.