CVE-2021-47345

In the Linux kernel, the following vulnerability has been resolved: RDMA/cma: Fix rdma_resolve_route() memory leak Fix a memory leak when "mda_resolve_route() is called more than once on the same "rdma_cm_id". This is possible if cma_query_handler() triggers the RDMA_CM_EVENT_ROUTE_ERROR flow which puts the state machine back and allows rdma_resolve_route() to be called again.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

24 Dec 2024, 16:12

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/032c68b4f5be128a2167f35b558b7cec88fe4972 - () https://git.kernel.org/stable/c/032c68b4f5be128a2167f35b558b7cec88fe4972 - Patch
References () https://git.kernel.org/stable/c/07583ba2e2d8947c3d365d97608cb436510885ac - () https://git.kernel.org/stable/c/07583ba2e2d8947c3d365d97608cb436510885ac - Patch
References () https://git.kernel.org/stable/c/3d08b5917984f737f32d5bee9737b9075c3895c6 - () https://git.kernel.org/stable/c/3d08b5917984f737f32d5bee9737b9075c3895c6 - Patch
References () https://git.kernel.org/stable/c/40b613db3a95bc27998e4097d74c2f7e5d083a0b - () https://git.kernel.org/stable/c/40b613db3a95bc27998e4097d74c2f7e5d083a0b - Patch
References () https://git.kernel.org/stable/c/4893c938f2a140a74be91779e45e4a7fa111198f - () https://git.kernel.org/stable/c/4893c938f2a140a74be91779e45e4a7fa111198f - Patch
References () https://git.kernel.org/stable/c/74f160ead74bfe5f2b38afb4fcf86189f9ff40c9 - () https://git.kernel.org/stable/c/74f160ead74bfe5f2b38afb4fcf86189f9ff40c9 - Patch
References () https://git.kernel.org/stable/c/e2da8ce2a9543f3ca5c93369bd1fe6eeb572101a - () https://git.kernel.org/stable/c/e2da8ce2a9543f3ca5c93369bd1fe6eeb572101a - Patch
References () https://git.kernel.org/stable/c/e4e062da082a199357ba4911145f331d40139ad8 - () https://git.kernel.org/stable/c/e4e062da082a199357ba4911145f331d40139ad8 - Patch
References () https://git.kernel.org/stable/c/f4f553d67236145fa5fd203ed7b35b9377e19939 - () https://git.kernel.org/stable/c/f4f553d67236145fa5fd203ed7b35b9377e19939 - Patch
First Time Linux
Linux linux Kernel
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CWE CWE-401
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5

21 Nov 2024, 06:35

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: RDMA/cma: Reparar pérdida de memoria rdma_resolve_route(). Reparar una pérdida de memoria cuando se llama a "mda_resolve_route() más de una vez en el mismo "rdma_cm_id". Esto es posible si cma_query_handler() desencadena el flujo RDMA_CM_EVENT_ROUTE_ERROR que devuelve la máquina de estado y permite volver a llamar a rdma_resolve_route().
References () https://git.kernel.org/stable/c/032c68b4f5be128a2167f35b558b7cec88fe4972 - () https://git.kernel.org/stable/c/032c68b4f5be128a2167f35b558b7cec88fe4972 -
References () https://git.kernel.org/stable/c/07583ba2e2d8947c3d365d97608cb436510885ac - () https://git.kernel.org/stable/c/07583ba2e2d8947c3d365d97608cb436510885ac -
References () https://git.kernel.org/stable/c/3d08b5917984f737f32d5bee9737b9075c3895c6 - () https://git.kernel.org/stable/c/3d08b5917984f737f32d5bee9737b9075c3895c6 -
References () https://git.kernel.org/stable/c/40b613db3a95bc27998e4097d74c2f7e5d083a0b - () https://git.kernel.org/stable/c/40b613db3a95bc27998e4097d74c2f7e5d083a0b -
References () https://git.kernel.org/stable/c/4893c938f2a140a74be91779e45e4a7fa111198f - () https://git.kernel.org/stable/c/4893c938f2a140a74be91779e45e4a7fa111198f -
References () https://git.kernel.org/stable/c/74f160ead74bfe5f2b38afb4fcf86189f9ff40c9 - () https://git.kernel.org/stable/c/74f160ead74bfe5f2b38afb4fcf86189f9ff40c9 -
References () https://git.kernel.org/stable/c/e2da8ce2a9543f3ca5c93369bd1fe6eeb572101a - () https://git.kernel.org/stable/c/e2da8ce2a9543f3ca5c93369bd1fe6eeb572101a -
References () https://git.kernel.org/stable/c/e4e062da082a199357ba4911145f331d40139ad8 - () https://git.kernel.org/stable/c/e4e062da082a199357ba4911145f331d40139ad8 -
References () https://git.kernel.org/stable/c/f4f553d67236145fa5fd203ed7b35b9377e19939 - () https://git.kernel.org/stable/c/f4f553d67236145fa5fd203ed7b35b9377e19939 -

21 May 2024, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-21 15:15

Updated : 2024-12-24 16:12


NVD link : CVE-2021-47345

Mitre link : CVE-2021-47345

CVE.ORG link : CVE-2021-47345


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-401

Missing Release of Memory after Effective Lifetime