First published: Mon Sep 25 2017(Updated: )
bio_map_user_iov and bio_unmap_user do unbalanced pages refcounting if IO vector has small consecutive buffers belonging to the same page. bio_add_pc_page merges them into one, but the page reference is never dropped, causing memory leak. References: <a href="http://seclists.org/oss-sec/2017/q4/52">http://seclists.org/oss-sec/2017/q4/52</a> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1062568">https://bugzilla.suse.com/show_bug.cgi?id=1062568</a> Discussion: <a href="https://marc.info/?t=150605752800001&r=1&w=2">https://marc.info/?t=150605752800001&r=1&w=2</a> Proposed patch and reproducer: <a href="https://www.mail-archive.com/linux-kernel@vger.kernel.org/msg1495884.html">https://www.mail-archive.com/linux-kernel@vger.kernel.org/msg1495884.html</a> <a href="https://www.mail-archive.com/linux-kernel@vger.kernel.org/msg1495887.html">https://www.mail-archive.com/linux-kernel@vger.kernel.org/msg1495887.html</a> Related upstream commits: <a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=95d78c28b5a85bacbc29b8dba7c04babb9b0d467">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=95d78c28b5a85bacbc29b8dba7c04babb9b0d467</a> <a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2b04e8f6bbb196cab4b232af0f8d48ff2c7a8058">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2b04e8f6bbb196cab4b232af0f8d48ff2c7a8058</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | <=4.13.7 | |
debian/linux | 5.10.223-1 5.10.234-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.17-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-12190 is a vulnerability in the Linux kernel that allows for unbalanced refcounting when a SCSI I/O vector has small consecutive buffers belonging to the same page.
CVE-2017-12190 affects the Linux kernel versions before 4.13.8 and can result in a kernel crash or privilege escalation.
CVE-2017-12190 has a severity rating of medium.
To fix CVE-2017-12190, you need to update your Linux kernel to version 4.13.8 or later.
You can find more information about CVE-2017-12190 at the following references: [1] [2] [3].