CVE-2021-47119
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
15/03/2024
Last modified:
07/01/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
ext4: fix memory leak in ext4_fill_super<br />
<br />
Buffer head references must be released before calling kill_bdev();<br />
otherwise the buffer head (and its page referenced by b_data) will not<br />
be freed by kill_bdev, and subsequently that bh will be leaked.<br />
<br />
If blocksizes differ, sb_set_blocksize() will kill current buffers and<br />
page cache by using kill_bdev(). And then super block will be reread<br />
again but using correct blocksize this time. sb_set_blocksize() didn&#39;t<br />
fully free superblock page and buffer head, and being busy, they were<br />
not freed and instead leaked.<br />
<br />
This can easily be reproduced by calling an infinite loop of:<br />
<br />
systemctl start .mount, and<br />
systemctl stop .mount<br />
<br />
... since systemd creates a cgroup for each slice which it mounts, and<br />
the bh leak get amplified by a dying memory cgroup that also never<br />
gets freed, and memory consumption is much more easily noticed.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 2.6.19 (including) | 5.10.43 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.12.10 (excluding) |
| cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.13:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.13:rc4:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/01d349a481f0591230300a9171330136f9159bcd
- https://git.kernel.org/stable/c/1385b23396d511d5233b8b921ac3058b3f86a5e1
- https://git.kernel.org/stable/c/afd09b617db3786b6ef3dc43e28fe728cfea84df
- https://git.kernel.org/stable/c/01d349a481f0591230300a9171330136f9159bcd
- https://git.kernel.org/stable/c/1385b23396d511d5233b8b921ac3058b3f86a5e1
- https://git.kernel.org/stable/c/afd09b617db3786b6ef3dc43e28fe728cfea84df



