CVE-2021-47119

In the Linux kernel, the following vulnerability has been resolved: ext4: fix memory leak in ext4_fill_super Buffer head references must be released before calling kill_bdev(); otherwise the buffer head (and its page referenced by b_data) will not be freed by kill_bdev, and subsequently that bh will be leaked. If blocksizes differ, sb_set_blocksize() will kill current buffers and page cache by using kill_bdev(). And then super block will be reread again but using correct blocksize this time. sb_set_blocksize() didn't fully free superblock page and buffer head, and being busy, they were not freed and instead leaked. This can easily be reproduced by calling an infinite loop of: systemctl start <ext4_on_lvm>.mount, and systemctl stop <ext4_on_lvm>.mount ... since systemd creates a cgroup for each slice which it mounts, and the bh leak get amplified by a dying memory cgroup that also never gets freed, and memory consumption is much more easily noticed.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc4:*:*:*:*:*:*

History

07 Jan 2025, 17:31

Type Values Removed Values Added
CWE CWE-401
CPE cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc4:*:*:*:*:*:*
First Time Linux
Linux linux Kernel
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
References () https://git.kernel.org/stable/c/01d349a481f0591230300a9171330136f9159bcd - () https://git.kernel.org/stable/c/01d349a481f0591230300a9171330136f9159bcd - Patch
References () https://git.kernel.org/stable/c/1385b23396d511d5233b8b921ac3058b3f86a5e1 - () https://git.kernel.org/stable/c/1385b23396d511d5233b8b921ac3058b3f86a5e1 - Patch
References () https://git.kernel.org/stable/c/afd09b617db3786b6ef3dc43e28fe728cfea84df - () https://git.kernel.org/stable/c/afd09b617db3786b6ef3dc43e28fe728cfea84df - Patch

21 Nov 2024, 06:35

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ext4: corrige la pérdida de memoria en ext4_fill_super Las referencias del encabezado del búfer deben liberarse antes de llamar a kill_bdev(); de lo contrario, kill_bdev no liberará el encabezado del búfer (y su página a la que hace referencia b_data) y, posteriormente, se filtrará ese bh. Si los tamaños de los bloques difieren, sb_set_blocksize() eliminará los búferes actuales y el caché de la página usando kill_bdev(). Y luego el superbloque se volverá a leer, pero esta vez utilizando el tamaño de bloque correcto. sb_set_blocksize() no liberó completamente la página del superbloque y el encabezado del búfer y, al estar ocupados, no se liberaron y en su lugar se filtraron. Esto se puede reproducir fácilmente llamando a un bucle infinito de: systemctl start .mount, y systemctl stop .mount... ya que systemd crea un cgroup para cada segmento que monta, y la fuga de bh se amplifica con un grupo de memoria moribundo que tampoco se libera nunca, y el consumo de memoria se nota mucho más fácilmente.
References () https://git.kernel.org/stable/c/01d349a481f0591230300a9171330136f9159bcd - () https://git.kernel.org/stable/c/01d349a481f0591230300a9171330136f9159bcd -
References () https://git.kernel.org/stable/c/1385b23396d511d5233b8b921ac3058b3f86a5e1 - () https://git.kernel.org/stable/c/1385b23396d511d5233b8b921ac3058b3f86a5e1 -
References () https://git.kernel.org/stable/c/afd09b617db3786b6ef3dc43e28fe728cfea84df - () https://git.kernel.org/stable/c/afd09b617db3786b6ef3dc43e28fe728cfea84df -

15 Mar 2024, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-03-15 21:15

Updated : 2025-01-07 17:31


NVD link : CVE-2021-47119

Mitre link : CVE-2021-47119

CVE.ORG link : CVE-2021-47119


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-401

Missing Release of Memory after Effective Lifetime