![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
CVE ID: | CVE-2021-47598 |
Description: | In the Linux kernel, the following vulnerability has been resolved:
sch_cake: do not call cake_destroy() from cake_init() qdiscs are not
supposed to call their own destroy() method from init(), because core
stack already does that. syzbot was able to trigger use after free:
DEBUG_LOCKS_WARN_ON(lock->magic != lock) WARNING: CPU: 0 PID: 21902 at
kernel/locking/mutex.c:586 __mutex_lock_common
kernel/locking/mutex.c:586 [inline] WARNING: CPU: 0 PID: 21902 at
kernel/locking/mutex.c:586 __mutex_lock+0x9ec/0x12f0
kernel/locking/mutex.c:740 Modules linked in: CPU: 0 PID: 21902 Comm:
syz-executor189 Not tainted 5.16.0-rc4-syzkaller #0 Hardware name:
Google Google Compute Engine/Google Compute Engine, BIOS Google
01/01/2011 RIP: 0010:__mutex_lock_common kernel/locking/mutex.c:586
[inline] RIP: 0010:__mutex_lock+0x9ec/0x12f0
kernel/locking/mutex.c:740 Code: 08 84 d2 0f 85 19 08 00 00 8b 05 97
38 4b 04 85 c0 0f 85 27 f7 ff ff 48 c7 c6 20 00 ac 89 48 c7 c7 a0 fe
ab 89 e8 bf 76 ba ff <0f> 0b e9 0d f7 ff ff 48 8b 44 24 40 48 8d b8 c8
08 00 00 48 89 f8 RSP: 0018:ffffc9000627f290 EFLAGS: 00010282 RAX:
0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000 RDX:
ffff88802315d700 RSI: ffffffff815f1db8 RDI: fffff52000c4fe44 RBP:
ffff88818f28e000 R08: 0000000000000000 R09: 0000000000000000 R10:
ffffffff815ebb5e R11: 0000000000000000 R12: 0000000000000000 R13:
dffffc0000000000 R14: ffffc9000627f458 R15: 0000000093c30000 FS:
0000555556abc400(0000) GS:ffff8880b9c00000(0000)
knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0:
0000000080050033 CR2: 00007fda689c3303 CR3: 000000001cfbb000 CR4:
0000000000350ef0 Call Trace: |
Test IDs: | None available |
Cross References: |
Common Vulnerability Exposure (CVE) ID: CVE-2021-47598 https://git.kernel.org/stable/c/0d80462fbdcafd536dcad7569e65d3d14a7e9f2f https://git.kernel.org/stable/c/0d80462fbdcafd536dcad7569e65d3d14a7e9f2f https://git.kernel.org/stable/c/20ad1ef02f9ad5e1dda9eeb113e4c158b4806986 https://git.kernel.org/stable/c/20ad1ef02f9ad5e1dda9eeb113e4c158b4806986 https://git.kernel.org/stable/c/4e388232e630ebe4f94b4a0715ec98c0e2b314a3 https://git.kernel.org/stable/c/4e388232e630ebe4f94b4a0715ec98c0e2b314a3 https://git.kernel.org/stable/c/ab443c53916730862cec202078d36fd4008bea79 https://git.kernel.org/stable/c/ab443c53916730862cec202078d36fd4008bea79 https://git.kernel.org/stable/c/f6deae2e2d83bd267e1986f5d71d8c458e18fd99 https://git.kernel.org/stable/c/f6deae2e2d83bd267e1986f5d71d8c458e18fd99 |