[<prev] [next>] [day] [month] [year] [list]
Message-ID: <2024052138-CVE-2021-47342-bfd5@gregkh>
Date: Tue, 21 May 2024 16:36:16 +0200
From: Greg Kroah-Hartman <gregkh@...uxfoundation.org>
To: linux-cve-announce@...r.kernel.org
Cc: Greg Kroah-Hartman <gregkh@...uxfoundation.org>
Subject: CVE-2021-47342: ext4: fix possible UAF when remounting r/o a mmp-protected file system
Description
===========
In the Linux kernel, the following vulnerability has been resolved:
ext4: fix possible UAF when remounting r/o a mmp-protected file system
After commit 618f003199c6 ("ext4: fix memory leak in
ext4_fill_super"), after the file system is remounted read-only, there
is a race where the kmmpd thread can exit, causing sbi->s_mmp_tsk to
point at freed memory, which the call to ext4_stop_mmpd() can trip
over.
Fix this by only allowing kmmpd() to exit when it is stopped via
ext4_stop_mmpd().
Bug-Report-Link: <20210629143603.2166962-1-yebin10@...wei.com>
The Linux kernel CVE team has assigned CVE-2021-47342 to this issue.
Affected and fixed versions
===========================
Fixed in 5.10.77 with commit b663890d8544
Fixed in 5.13.3 with commit 7ed572cdf110
Fixed in 5.14 with commit 61bb4a1c417e
Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
older supported kernel versions. The official CVE entry at
https://cve.org/CVERecord/?id=CVE-2021-47342
will be updated if fixes are backported, please check that for the most
up to date information about this issue.
Affected files
==============
The file(s) affected by this issue are:
fs/ext4/mmp.c
fs/ext4/super.c
Mitigation
==========
The Linux kernel CVE team recommends that you update to the latest
stable kernel version for this, and many other bugfixes. Individual
changes are never tested alone, but rather are part of a larger kernel
release. Cherry-picking individual commits is not recommended or
supported by the Linux kernel community at all. If however, updating to
the latest release is impossible, the individual changes to resolve this
issue can be found at these commits:
https://git.kernel.org/stable/c/b663890d854403e566169f7e90aed5cd6ff64f6b
https://git.kernel.org/stable/c/7ed572cdf11081f8f9e07abd4bea56a3f2c4edbd
https://git.kernel.org/stable/c/61bb4a1c417e5b95d9edb4f887f131de32e419cb
Powered by blists - more mailing lists