CVE-2021-47342

In the Linux kernel, the following vulnerability has been resolved: ext4: fix possible UAF when remounting r/o a mmp-protected file system After commit 618f003199c6 ("ext4: fix memory leak in ext4_fill_super"), after the file system is remounted read-only, there is a race where the kmmpd thread can exit, causing sbi->s_mmp_tsk to point at freed memory, which the call to ext4_stop_mmpd() can trip over. Fix this by only allowing kmmpd() to exit when it is stopped via ext4_stop_mmpd(). Bug-Report-Link: <20210629143603.2166962-1-yebin10@huawei.com>
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

26 Dec 2024, 19:29

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/61bb4a1c417e5b95d9edb4f887f131de32e419cb - () https://git.kernel.org/stable/c/61bb4a1c417e5b95d9edb4f887f131de32e419cb - Patch
References () https://git.kernel.org/stable/c/7ed572cdf11081f8f9e07abd4bea56a3f2c4edbd - () https://git.kernel.org/stable/c/7ed572cdf11081f8f9e07abd4bea56a3f2c4edbd - Patch
References () https://git.kernel.org/stable/c/b663890d854403e566169f7e90aed5cd6ff64f6b - () https://git.kernel.org/stable/c/b663890d854403e566169f7e90aed5cd6ff64f6b - Patch
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
First Time Linux linux Kernel
Linux
CWE CWE-416
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

21 Nov 2024, 06:35

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ext4: corrige posible UAF al remontar el sistema de archivos protegido por r/oa mmp. Después del commit 618f003199c6 ("ext4: corrige la pérdida de memoria en ext4_fill_super"), después de que se vuelve a montar el sistema de archivos solo que hay una ejecución donde el hilo kmmpd puede salir, causando que sbi-&gt;s_mmp_tsk apunte a la memoria liberada, con la que la llamada a ext4_stop_mmpd() puede tropezar. Solucione este problema permitiendo que kmmpd() salga solo cuando se detiene a través de ext4_stop_mmpd(). Enlace de informe de error: &lt;20210629143603.2166962-1-yebin10@huawei.com&gt;
References () https://git.kernel.org/stable/c/61bb4a1c417e5b95d9edb4f887f131de32e419cb - () https://git.kernel.org/stable/c/61bb4a1c417e5b95d9edb4f887f131de32e419cb -
References () https://git.kernel.org/stable/c/7ed572cdf11081f8f9e07abd4bea56a3f2c4edbd - () https://git.kernel.org/stable/c/7ed572cdf11081f8f9e07abd4bea56a3f2c4edbd -
References () https://git.kernel.org/stable/c/b663890d854403e566169f7e90aed5cd6ff64f6b - () https://git.kernel.org/stable/c/b663890d854403e566169f7e90aed5cd6ff64f6b -

21 May 2024, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-21 15:15

Updated : 2024-12-26 19:29


NVD link : CVE-2021-47342

Mitre link : CVE-2021-47342

CVE.ORG link : CVE-2021-47342


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-416

Use After Free