lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <2024052138-CVE-2021-47344-ea37@gregkh>
Date: Tue, 21 May 2024 16:36:18 +0200
From: Greg Kroah-Hartman <gregkh@...uxfoundation.org>
To: linux-cve-announce@...r.kernel.org
Cc: Greg Kroah-Hartman <gregkh@...uxfoundation.org>
Subject: CVE-2021-47344: media: zr364xx: fix memory leak in zr364xx_start_readpipe

Description
===========

In the Linux kernel, the following vulnerability has been resolved:

media: zr364xx: fix memory leak in zr364xx_start_readpipe

syzbot reported memory leak in zr364xx driver.
The problem was in non-freed urb in case of
usb_submit_urb() fail.

backtrace:
  [<ffffffff82baedf6>] kmalloc include/linux/slab.h:561 [inline]
  [<ffffffff82baedf6>] usb_alloc_urb+0x66/0xe0 drivers/usb/core/urb.c:74
  [<ffffffff82f7cce8>] zr364xx_start_readpipe+0x78/0x130 drivers/media/usb/zr364xx/zr364xx.c:1022
  [<ffffffff84251dfc>] zr364xx_board_init drivers/media/usb/zr364xx/zr364xx.c:1383 [inline]
  [<ffffffff84251dfc>] zr364xx_probe+0x6a3/0x851 drivers/media/usb/zr364xx/zr364xx.c:1516
  [<ffffffff82bb6507>] usb_probe_interface+0x177/0x370 drivers/usb/core/driver.c:396
  [<ffffffff826018a9>] really_probe+0x159/0x500 drivers/base/dd.c:576

The Linux kernel CVE team has assigned CVE-2021-47344 to this issue.


Affected and fixed versions
===========================

	Issue introduced in 2.6.32 with commit ccbf035ae5de and fixed in 4.4.276 with commit c57b2bd32479
	Issue introduced in 2.6.32 with commit ccbf035ae5de and fixed in 4.9.276 with commit bbc80a972a3c
	Issue introduced in 2.6.32 with commit ccbf035ae5de and fixed in 4.14.240 with commit b0633051a6cb
	Issue introduced in 2.6.32 with commit ccbf035ae5de and fixed in 4.19.198 with commit 021c294dff03
	Issue introduced in 2.6.32 with commit ccbf035ae5de and fixed in 5.4.133 with commit 0edd67591672
	Issue introduced in 2.6.32 with commit ccbf035ae5de and fixed in 5.10.51 with commit c57bfd8000d7
	Issue introduced in 2.6.32 with commit ccbf035ae5de and fixed in 5.12.18 with commit 5f3f81f1c96b
	Issue introduced in 2.6.32 with commit ccbf035ae5de and fixed in 5.13.3 with commit d69b39d89f36
	Issue introduced in 2.6.32 with commit ccbf035ae5de and fixed in 5.14 with commit 0a045eac8d04

Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.

Unaffected versions might change over time as fixes are backported to
older supported kernel versions.  The official CVE entry at
	https://cve.org/CVERecord/?id=CVE-2021-47344
will be updated if fixes are backported, please check that for the most
up to date information about this issue.


Affected files
==============

The file(s) affected by this issue are:
	drivers/media/usb/zr364xx/zr364xx.c


Mitigation
==========

The Linux kernel CVE team recommends that you update to the latest
stable kernel version for this, and many other bugfixes.  Individual
changes are never tested alone, but rather are part of a larger kernel
release.  Cherry-picking individual commits is not recommended or
supported by the Linux kernel community at all.  If however, updating to
the latest release is impossible, the individual changes to resolve this
issue can be found at these commits:
	https://git.kernel.org/stable/c/c57b2bd3247925e253729dce283d6bf6abc9339d
	https://git.kernel.org/stable/c/bbc80a972a3c5d7eba3f6c9c07af8fea42f5c513
	https://git.kernel.org/stable/c/b0633051a6cb24186ff04ce1af99c7de18c1987e
	https://git.kernel.org/stable/c/021c294dff030f3ba38eb81e400ba123db32ecbc
	https://git.kernel.org/stable/c/0edd6759167295ea9969e89283b81017b4c688aa
	https://git.kernel.org/stable/c/c57bfd8000d7677bf435873b440eec0c47f73a08
	https://git.kernel.org/stable/c/5f3f81f1c96b501d180021c23c25e9f48eaab235
	https://git.kernel.org/stable/c/d69b39d89f362cfeeb54a68690768d0d257b2c8f
	https://git.kernel.org/stable/c/0a045eac8d0427b64577a24d74bb8347c905ac65

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ