Bug 1760958 (CVE-2019-15921) - CVE-2019-15921 kernel: memory leak in genl_register_family() in net/netlink/genetlink.c
Summary: CVE-2019-15921 kernel: memory leak in genl_register_family() in net/netlink/g...
Keywords:
Status: CLOSED WONTFIX
Alias: CVE-2019-15921
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1760960
Blocks: 1760962
TreeView+ depends on / blocked
 
Reported: 2019-10-11 19:58 UTC by Guilherme de Almeida Suckevicz
Modified: 2021-02-16 21:16 UTC (History)
46 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in the genl_register_family function in the Linux kernel. An attacker able to induce the error conditions could use this flaw to crash the system. The highest threat from this vulnerability is to system availability.
Clone Of:
Environment:
Last Closed: 2020-04-30 17:47:13 UTC
Embargoed:


Attachments (Terms of Use)

Description Guilherme de Almeida Suckevicz 2019-10-11 19:58:47 UTC
An issue was discovered in the Linux kernel before 5.0.6. There is a memory leak issue when idr_alloc() fails in genl_register_family() in net/netlink/genetlink.c.

Reference:
https://github.com/torvalds/linux/commit/ceabee6c59943bdd5e1da1a6a20dc7ee5f8113a2

Comment 1 Guilherme de Almeida Suckevicz 2019-10-11 20:08:34 UTC
Created kernel tracking bugs for this issue:

Affects: fedora-all [bug 1760960]

Comment 2 Justin M. Forbes 2019-10-16 16:17:58 UTC
This was fixed for Fedora with the 5.0.6 stable kernel updates.

Comment 6 Petr Matousek 2020-04-30 17:39:45 UTC
Mitigation:

Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Comment 7 Petr Matousek 2020-04-30 17:45:06 UTC
Statement:

This issue is rated as having Low impact because of the preconditions needed to trigger the error/resource cleanup code path (system-wide out-of-memory condition, high privileges or physical access). The generic netlink is a way for kernel modues to easily communicate with userspace using netlink. genl_register_family is thus called by kernel modules (code) only and it's hard for an attacker to invoke (module reloads?) it let alone fail on the right place.


Note You need to log in before you can comment on or make changes to this bug.