Lucene search

K
cveLinuxCVE-2021-47391
HistoryMay 21, 2024 - 3:15 p.m.

CVE-2021-47391

2024-05-2115:15:24
Linux
web.nvd.nist.gov
39
linux kernel
vulnerability
rdma
cma
rdma_resolve_ip
id_priv
use-after-free
cancelation
req_list

AI Score

6.9

Confidence

High

EPSS

0

Percentile

15.5%

In the Linux kernel, the following vulnerability has been resolved:

RDMA/cma: Ensure rdma_addr_cancel() happens before issuing more requests

The FSM can run in a circle allowing rdma_resolve_ip() to be called twice
on the same id_priv. While this cannot happen without going through the
work, it violates the invariant that the same address resolution
background request cannot be active twice.

   CPU 1                                  CPU 2

rdma_resolve_addr():
RDMA_CM_IDLE -> RDMA_CM_ADDR_QUERY
rdma_resolve_ip(addr_handler) #1

		 process_one_req(): for #1
                      addr_handler():
                        RDMA_CM_ADDR_QUERY -> RDMA_CM_ADDR_BOUND
                        mutex_unlock(&id_priv->handler_mutex);
                        [.. handler still running ..]

rdma_resolve_addr():
RDMA_CM_ADDR_BOUND -> RDMA_CM_ADDR_QUERY
rdma_resolve_ip(addr_handler)
!! two requests are now on the req_list

rdma_destroy_id():
destroy_id_handler_unlock():
_destroy_id():
cma_cancel_operation():
rdma_addr_cancel()

                      // process_one_req() self removes it
	          spin_lock_bh(&lock);
                       cancel_delayed_work(&req->work);
                   if (!list_empty(&req->list)) == true

  ! rdma_addr_cancel() returns after process_on_req #1 is done

kfree(id_priv)

		 process_one_req(): for #2
                      addr_handler():
                    mutex_lock(&id_priv->handler_mutex);
                        !! Use after free on id_priv

rdma_addr_cancel() expects there to be one req on the list and only
cancels the first one. The self-removal behavior of the work only happens
after the handler has returned. This yields a situations where the
req_list can have two reqs for the same “handle” but rdma_addr_cancel()
only cancels the first one.

The second req remains active beyond rdma_destroy_id() and will
use-after-free id_priv once it inevitably triggers.

Fix this by remembering if the id_priv has called rdma_resolve_ip() and
always cancel before calling it again. This ensures the req_list never
gets more than one item in it and doesn’t cost anything in the normal flow
that never uses this strange error path.

Affected configurations

Vulners
Node
linuxlinux_kernelRange2.6.185.10.188
OR
linuxlinux_kernelRange5.11.05.14.10
OR
linuxlinux_kernelRange5.15.0
VendorProductVersionCPE
linuxlinux_kernel*cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "product": "Linux",
    "vendor": "Linux",
    "defaultStatus": "unaffected",
    "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
    "programFiles": [
      "drivers/infiniband/core/cma.c",
      "drivers/infiniband/core/cma_priv.h"
    ],
    "versions": [
      {
        "version": "e51060f08a61",
        "lessThan": "9a085fa9b7d6",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "e51060f08a61",
        "lessThan": "03d884671572",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "e51060f08a61",
        "lessThan": "305d568b72f1",
        "status": "affected",
        "versionType": "git"
      }
    ]
  },
  {
    "product": "Linux",
    "vendor": "Linux",
    "defaultStatus": "affected",
    "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
    "programFiles": [
      "drivers/infiniband/core/cma.c",
      "drivers/infiniband/core/cma_priv.h"
    ],
    "versions": [
      {
        "version": "2.6.18",
        "status": "affected"
      },
      {
        "version": "0",
        "lessThan": "2.6.18",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "5.10.188",
        "lessThanOrEqual": "5.10.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "5.14.10",
        "lessThanOrEqual": "5.14.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "5.15",
        "lessThanOrEqual": "*",
        "status": "unaffected",
        "versionType": "original_commit_for_fix"
      }
    ]
  }
]

AI Score

6.9

Confidence

High

EPSS

0

Percentile

15.5%