[<prev] [next>] [day] [month] [year] [list]
Message-ID: <2024052137-CVE-2021-47340-059b@gregkh>
Date: Tue, 21 May 2024 16:36:14 +0200
From: Greg Kroah-Hartman <gregkh@...uxfoundation.org>
To: linux-cve-announce@...r.kernel.org
Cc: Greg Kroah-Hartman <gregkh@...uxfoundation.org>
Subject: CVE-2021-47340: jfs: fix GPF in diFree
Description
===========
In the Linux kernel, the following vulnerability has been resolved:
jfs: fix GPF in diFree
Avoid passing inode with
JFS_SBI(inode->i_sb)->ipimap == NULL to
diFree()[1]. GFP will appear:
struct inode *ipimap = JFS_SBI(ip->i_sb)->ipimap;
struct inomap *imap = JFS_IP(ipimap)->i_imap;
JFS_IP() will return invalid pointer when ipimap == NULL
Call Trace:
diFree+0x13d/0x2dc0 fs/jfs/jfs_imap.c:853 [1]
jfs_evict_inode+0x2c9/0x370 fs/jfs/inode.c:154
evict+0x2ed/0x750 fs/inode.c:578
iput_final fs/inode.c:1654 [inline]
iput.part.0+0x3fe/0x820 fs/inode.c:1680
iput+0x58/0x70 fs/inode.c:1670
The Linux kernel CVE team has assigned CVE-2021-47340 to this issue.
Affected and fixed versions
===========================
Fixed in 4.4.276 with commit 7bde24bde490
Fixed in 4.9.276 with commit 745c9a59422c
Fixed in 4.14.240 with commit 49def1b06448
Fixed in 4.19.198 with commit aff8d95b6905
Fixed in 5.4.133 with commit a21e5cb1a64c
Fixed in 5.10.51 with commit 801893695036
Fixed in 5.12.18 with commit 3bb27e272402
Fixed in 5.13.3 with commit 42f102ea1943
Fixed in 5.14 with commit 9d574f985fe3
Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
older supported kernel versions. The official CVE entry at
https://cve.org/CVERecord/?id=CVE-2021-47340
will be updated if fixes are backported, please check that for the most
up to date information about this issue.
Affected files
==============
The file(s) affected by this issue are:
fs/jfs/inode.c
Mitigation
==========
The Linux kernel CVE team recommends that you update to the latest
stable kernel version for this, and many other bugfixes. Individual
changes are never tested alone, but rather are part of a larger kernel
release. Cherry-picking individual commits is not recommended or
supported by the Linux kernel community at all. If however, updating to
the latest release is impossible, the individual changes to resolve this
issue can be found at these commits:
https://git.kernel.org/stable/c/7bde24bde490f3139eee147efc6d60d6040fe975
https://git.kernel.org/stable/c/745c9a59422c63f661f4374ed5181740db4130a1
https://git.kernel.org/stable/c/49def1b0644892e3b113673c13d650c3060b43bc
https://git.kernel.org/stable/c/aff8d95b69051d0cf4acc3d91f22299fdbb9dfb3
https://git.kernel.org/stable/c/a21e5cb1a64c904f1f0ef7b2d386fc7d2b1d2ce2
https://git.kernel.org/stable/c/8018936950360f1c503bb385e158cfc5e4945d18
https://git.kernel.org/stable/c/3bb27e27240289b47d3466f647a55c567adbdc3a
https://git.kernel.org/stable/c/42f102ea1943ecb10a0756bf75424de5d1d5beed
https://git.kernel.org/stable/c/9d574f985fe33efd6911f4d752de6f485a1ea732
Powered by blists - more mailing lists