CVE-2021-47340
Severity CVSS v4.0:
Pending analysis
Type:
CWE-476
NULL Pointer Dereference
Publication date:
21/05/2024
Last modified:
10/12/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
jfs: fix GPF in diFree<br />
<br />
Avoid passing inode with<br />
JFS_SBI(inode->i_sb)->ipimap == NULL to<br />
diFree()[1]. GFP will appear:<br />
<br />
struct inode *ipimap = JFS_SBI(ip->i_sb)->ipimap;<br />
struct inomap *imap = JFS_IP(ipimap)->i_imap;<br />
<br />
JFS_IP() will return invalid pointer when ipimap == NULL<br />
<br />
Call Trace:<br />
diFree+0x13d/0x2dc0 fs/jfs/jfs_imap.c:853 [1]<br />
jfs_evict_inode+0x2c9/0x370 fs/jfs/inode.c:154<br />
evict+0x2ed/0x750 fs/inode.c:578<br />
iput_final fs/inode.c:1654 [inline]<br />
iput.part.0+0x3fe/0x820 fs/inode.c:1680<br />
iput+0x58/0x70 fs/inode.c:1670
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.4.276 (excluding) | |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.5 (including) | 4.9.276 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.10 (including) | 4.14.240 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.15 (including) | 4.19.198 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.20 (including) | 5.4.133 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.5 (including) | 5.10.51 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.12.18 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.13 (including) | 5.13.3 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/3bb27e27240289b47d3466f647a55c567adbdc3a
- https://git.kernel.org/stable/c/42f102ea1943ecb10a0756bf75424de5d1d5beed
- https://git.kernel.org/stable/c/49def1b0644892e3b113673c13d650c3060b43bc
- https://git.kernel.org/stable/c/745c9a59422c63f661f4374ed5181740db4130a1
- https://git.kernel.org/stable/c/7bde24bde490f3139eee147efc6d60d6040fe975
- https://git.kernel.org/stable/c/8018936950360f1c503bb385e158cfc5e4945d18
- https://git.kernel.org/stable/c/9d574f985fe33efd6911f4d752de6f485a1ea732
- https://git.kernel.org/stable/c/a21e5cb1a64c904f1f0ef7b2d386fc7d2b1d2ce2
- https://git.kernel.org/stable/c/aff8d95b69051d0cf4acc3d91f22299fdbb9dfb3
- https://git.kernel.org/stable/c/3bb27e27240289b47d3466f647a55c567adbdc3a
- https://git.kernel.org/stable/c/42f102ea1943ecb10a0756bf75424de5d1d5beed
- https://git.kernel.org/stable/c/49def1b0644892e3b113673c13d650c3060b43bc
- https://git.kernel.org/stable/c/745c9a59422c63f661f4374ed5181740db4130a1
- https://git.kernel.org/stable/c/7bde24bde490f3139eee147efc6d60d6040fe975
- https://git.kernel.org/stable/c/8018936950360f1c503bb385e158cfc5e4945d18
- https://git.kernel.org/stable/c/9d574f985fe33efd6911f4d752de6f485a1ea732
- https://git.kernel.org/stable/c/a21e5cb1a64c904f1f0ef7b2d386fc7d2b1d2ce2
- https://git.kernel.org/stable/c/aff8d95b69051d0cf4acc3d91f22299fdbb9dfb3



