In the Linux kernel, the following vulnerability has been resolved: kunit:
fix reference count leak in kfree_at_end The reference counting issue
happens in the normal path of kfree_at_end(). When
kunit_alloc_and_get_resource() is invoked, the function forgets to handle
the returned resource object, whose refcount increased inside, causing a
refcount leak. Fix this issue by calling kunit_alloc_resource() instead of
kunit_alloc_and_get_resource(). Fixed the following when applying: Shuah
Khan <[email protected]> CHECK: Alignment should match open
parenthesis + kunit_alloc_resource(test, NULL, kfree_res_free, GFP_KERNEL,
(void *)to_free);
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 23.10 | noarch | linux | < any | UNKNOWN |
ubuntu | 24.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 14.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 16.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 18.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-aws | < any | UNKNOWN |
git.kernel.org/linus/f62314b1ced25c58b86e044fc951cd6a1ea234cf (5.15-rc6)
git.kernel.org/stable/c/bbdd158b40b66a9403391a517f24ef6613573446
git.kernel.org/stable/c/f62314b1ced25c58b86e044fc951cd6a1ea234cf
launchpad.net/bugs/cve/CVE-2021-47467
nvd.nist.gov/vuln/detail/CVE-2021-47467
security-tracker.debian.org/tracker/CVE-2021-47467
www.cve.org/CVERecord?id=CVE-2021-47467