{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2021-46956","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2024-02-27T18:42:55.937Z","datePublished":"2024-02-27T18:46:58.101Z","dateUpdated":"2025-05-04T07:01:08.562Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2025-05-04T07:01:08.562Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nvirtiofs: fix memory leak in virtio_fs_probe()\n\nWhen accidentally passing twice the same tag to qemu, kmemleak ended up\nreporting a memory leak in virtiofs.  Also, looking at the log I saw the\nfollowing error (that's when I realised the duplicated tag):\n\n  virtiofs: probe of virtio5 failed with error -17\n\nHere's the kmemleak log for reference:\n\nunreferenced object 0xffff888103d47800 (size 1024):\n  comm \"systemd-udevd\", pid 118, jiffies 4294893780 (age 18.340s)\n  hex dump (first 32 bytes):\n    00 00 00 00 ad 4e ad de ff ff ff ff 00 00 00 00  .....N..........\n    ff ff ff ff ff ff ff ff 80 90 02 a0 ff ff ff ff  ................\n  backtrace:\n    [<000000000ebb87c1>] virtio_fs_probe+0x171/0x7ae [virtiofs]\n    [<00000000f8aca419>] virtio_dev_probe+0x15f/0x210\n    [<000000004d6baf3c>] really_probe+0xea/0x430\n    [<00000000a6ceeac8>] device_driver_attach+0xa8/0xb0\n    [<00000000196f47a7>] __driver_attach+0x98/0x140\n    [<000000000b20601d>] bus_for_each_dev+0x7b/0xc0\n    [<00000000399c7b7f>] bus_add_driver+0x11b/0x1f0\n    [<0000000032b09ba7>] driver_register+0x8f/0xe0\n    [<00000000cdd55998>] 0xffffffffa002c013\n    [<000000000ea196a2>] do_one_initcall+0x64/0x2e0\n    [<0000000008f727ce>] do_init_module+0x5c/0x260\n    [<000000003cdedab6>] __do_sys_finit_module+0xb5/0x120\n    [<00000000ad2f48c6>] do_syscall_64+0x33/0x40\n    [<00000000809526b5>] entry_SYSCALL_64_after_hwframe+0x44/0xae"}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["fs/fuse/virtio_fs.c"],"versions":[{"version":"a62a8ef9d97da23762a588592c8b8eb50a8deb6a","lessThan":"310efc95c72c13faf855c692d19cd4d054d827c8","status":"affected","versionType":"git"},{"version":"a62a8ef9d97da23762a588592c8b8eb50a8deb6a","lessThan":"d19555ff225d0896a33246a49279e6d578095f15","status":"affected","versionType":"git"},{"version":"a62a8ef9d97da23762a588592c8b8eb50a8deb6a","lessThan":"9b9d60c0eb8ada99cce2a9ab5c15dffc523b01ae","status":"affected","versionType":"git"},{"version":"a62a8ef9d97da23762a588592c8b8eb50a8deb6a","lessThan":"5116e79fc6e6725b8acdad8b7e928a83ab7b47e6","status":"affected","versionType":"git"},{"version":"a62a8ef9d97da23762a588592c8b8eb50a8deb6a","lessThan":"c79c5e0178922a9e092ec8fed026750f39dcaef4","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["fs/fuse/virtio_fs.c"],"versions":[{"version":"5.4","status":"affected"},{"version":"0","lessThan":"5.4","status":"unaffected","versionType":"semver"},{"version":"5.4.118","lessThanOrEqual":"5.4.*","status":"unaffected","versionType":"semver"},{"version":"5.10.36","lessThanOrEqual":"5.10.*","status":"unaffected","versionType":"semver"},{"version":"5.11.20","lessThanOrEqual":"5.11.*","status":"unaffected","versionType":"semver"},{"version":"5.12.3","lessThanOrEqual":"5.12.*","status":"unaffected","versionType":"semver"},{"version":"5.13","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.4","versionEndExcluding":"5.4.118"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.4","versionEndExcluding":"5.10.36"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.4","versionEndExcluding":"5.11.20"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.4","versionEndExcluding":"5.12.3"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.4","versionEndExcluding":"5.13"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/310efc95c72c13faf855c692d19cd4d054d827c8"},{"url":"https://git.kernel.org/stable/c/d19555ff225d0896a33246a49279e6d578095f15"},{"url":"https://git.kernel.org/stable/c/9b9d60c0eb8ada99cce2a9ab5c15dffc523b01ae"},{"url":"https://git.kernel.org/stable/c/5116e79fc6e6725b8acdad8b7e928a83ab7b47e6"},{"url":"https://git.kernel.org/stable/c/c79c5e0178922a9e092ec8fed026750f39dcaef4"}],"title":"virtiofs: fix memory leak in virtio_fs_probe()","x_generator":{"engine":"bippy-1.2.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"id":"CVE-2021-46956","role":"CISA Coordinator","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"version":"2.0.3","timestamp":"2024-02-27T19:29:39.801497Z"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-07-05T17:22:02.090Z"}},{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-04T05:17:42.907Z"},"title":"CVE Program Container","references":[{"url":"https://git.kernel.org/stable/c/310efc95c72c13faf855c692d19cd4d054d827c8","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/d19555ff225d0896a33246a49279e6d578095f15","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/9b9d60c0eb8ada99cce2a9ab5c15dffc523b01ae","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/5116e79fc6e6725b8acdad8b7e928a83ab7b47e6","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/c79c5e0178922a9e092ec8fed026750f39dcaef4","tags":["x_transferred"]}]}]}}