In the Linux kernel, the following vulnerability has been resolved: ext4:
fix possible UAF when remounting r/o a mmp-protected file system After
commit 618f003199c6 (“ext4: fix memory leak in ext4_fill_super”), after the
file system is remounted read-only, there is a race where the kmmpd thread
can exit, causing sbi->s_mmp_tsk to point at freed memory, which the call
to ext4_stop_mmpd() can trip over. Fix this by only allowing kmmpd() to
exit when it is stopped via ext4_stop_mmpd(). Bug-Report-Link:
<[email protected]>
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 20.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-azure | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-bluefield | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-gcp | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-gkeop | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-ibm | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-iot | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-kvm | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-oracle | < any | UNKNOWN |
git.kernel.org/linus/61bb4a1c417e5b95d9edb4f887f131de32e419cb (5.14-rc1)
git.kernel.org/stable/c/61bb4a1c417e5b95d9edb4f887f131de32e419cb
git.kernel.org/stable/c/7ed572cdf11081f8f9e07abd4bea56a3f2c4edbd
git.kernel.org/stable/c/b663890d854403e566169f7e90aed5cd6ff64f6b
launchpad.net/bugs/cve/CVE-2021-47342
nvd.nist.gov/vuln/detail/CVE-2021-47342
security-tracker.debian.org/tracker/CVE-2021-47342
www.cve.org/CVERecord?id=CVE-2021-47342