Bug 695173 - (CVE-2011-1576) CVE-2011-1576 kernel: net: Fix memory leak/corruption on VLAN GRO_DROP
CVE-2011-1576 kernel: net: Fix memory leak/corruption on VLAN GRO_DROP
Status: CLOSED ERRATA
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
public=20110606,reported=20110204,sou...
: Security
Depends On: 691565 695174 695175 695176 695177 713524
Blocks:
  Show dependency treegraph
 
Reported: 2011-04-10 23:07 EDT by Eugene Teo (Security Response)
Modified: 2016-03-04 07:03 EST (History)
17 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2015-07-29 08:35:38 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Eugene Teo (Security Response) 2011-04-10 23:07:39 EDT
net: Fix memory leak/corruption on VLAN GRO_DROP

The function napi_reuse_skb is only meant to be used for packets merged by GRO.  Using it on the VLAN path will lead to memory leaks/corruption.  This patch is based on Jay Vosburgh's patch, and it fixes the problem by calling kfree_skb on the VLAN GRO_DROP path instead of napi_reuse_skb.

The fix for CVE-2011-1478 unveiled this issue. Note, this is not a CVE-2011-1478 regression.

Acknowledgements:

Red Hat would like to thank Ryan Sweat for reporting this issue.
Comment 7 Petr Matousek 2011-06-06 12:06:41 EDT
This issue does not affect the upstream kernel as the code path in question is no longer reachable due to changes in the VLAN subsystem.
Comment 8 Petr Matousek 2011-06-06 18:07:15 EDT
Statement:

This issue did not affect the version of Linux kernel as shipped with Red Hat
Enterprise Linux 4 as it did not support Generic Receive Offload (GRO). This has been addressed in Red Hat Enterprise Linux 5, 6 and Red Hat Enterprise MRG via https://rhn.redhat.com/errata/RHSA-2011-0927.html and https://rhn.redhat.com/errata/RHSA-2011-1189.html, and https://rhn.redhat.com/errata/RHSA-2011-1253.html.
Comment 9 errata-xmlrpc 2011-07-15 02:08:37 EDT
This issue has been addressed in following products:

  Red Hat Enterprise Linux 5

Via RHSA-2011:0927 https://rhn.redhat.com/errata/RHSA-2011-0927.html
Comment 10 Eugene Teo (Security Response) 2011-07-21 23:59:47 EDT
Upstream commit:
http://git.kernel.org/linus/3701e51382a026cba10c60b03efabe534fba4ca4
Comment 11 errata-xmlrpc 2011-07-27 10:41:01 EDT
This issue has been addressed in following products:

  RHEV-H, V2V and Agents for RHEL-5

Via RHSA-2011:1090 https://rhn.redhat.com/errata/RHSA-2011-1090.html
Comment 12 errata-xmlrpc 2011-08-02 12:53:58 EDT
This issue has been addressed in following products:

  Red Hat Enterprise Linux 6.0.Z - Server Only

Via RHSA-2011:1106 https://rhn.redhat.com/errata/RHSA-2011-1106.html
Comment 13 errata-xmlrpc 2011-08-23 10:41:49 EDT
This issue has been addressed in following products:

  Red Hat Enterprise Linux 6

Via RHSA-2011:1189 https://rhn.redhat.com/errata/RHSA-2011-1189.html
Comment 14 errata-xmlrpc 2011-09-12 15:44:11 EDT
This issue has been addressed in following products:

  MRG for RHEL-6 v.2

Via RHSA-2011:1253 https://rhn.redhat.com/errata/RHSA-2011-1253.html

Note You need to log in before you can comment on or make changes to this bug.