CVE-2021-47256

In the Linux kernel, the following vulnerability has been resolved: mm/memory-failure: make sure wait for page writeback in memory_failure Our syzkaller trigger the "BUG_ON(!list_empty(&inode->i_wb_list))" in clear_inode: kernel BUG at fs/inode.c:519! Internal error: Oops - BUG: 0 [#1] SMP Modules linked in: Process syz-executor.0 (pid: 249, stack limit = 0x00000000a12409d7) CPU: 1 PID: 249 Comm: syz-executor.0 Not tainted 4.19.95 Hardware name: linux,dummy-virt (DT) pstate: 80000005 (Nzcv daif -PAN -UAO) pc : clear_inode+0x280/0x2a8 lr : clear_inode+0x280/0x2a8 Call trace: clear_inode+0x280/0x2a8 ext4_clear_inode+0x38/0xe8 ext4_free_inode+0x130/0xc68 ext4_evict_inode+0xb20/0xcb8 evict+0x1a8/0x3c0 iput+0x344/0x460 do_unlinkat+0x260/0x410 __arm64_sys_unlinkat+0x6c/0xc0 el0_svc_common+0xdc/0x3b0 el0_svc_handler+0xf8/0x160 el0_svc+0x10/0x218 Kernel panic - not syncing: Fatal exception A crash dump of this problem show that someone called __munlock_pagevec to clear page LRU without lock_page: do_mmap -> mmap_region -> do_munmap -> munlock_vma_pages_range -> __munlock_pagevec. As a result memory_failure will call identify_page_state without wait_on_page_writeback. And after truncate_error_page clear the mapping of this page. end_page_writeback won't call sb_clear_inode_writeback to clear inode->i_wb_list. That will trigger BUG_ON in clear_inode! Fix it by checking PageWriteback too to help determine should we skip wait_on_page_writeback.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc6:*:*:*:*:*:*

History

30 Apr 2025, 15:05

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/28788dc5c70597395b6b451dae4549bbaa8e2c56 - () https://git.kernel.org/stable/c/28788dc5c70597395b6b451dae4549bbaa8e2c56 - Patch
References () https://git.kernel.org/stable/c/566345aaabac853aa866f53a219c4b02a6beb527 - () https://git.kernel.org/stable/c/566345aaabac853aa866f53a219c4b02a6beb527 - Patch
References () https://git.kernel.org/stable/c/6d210d547adc2218ef8b5bcf23518c5f2f1fd872 - () https://git.kernel.org/stable/c/6d210d547adc2218ef8b5bcf23518c5f2f1fd872 - Patch
References () https://git.kernel.org/stable/c/9e379da727a7a031be9b877cde7b9c34a0fb8306 - () https://git.kernel.org/stable/c/9e379da727a7a031be9b877cde7b9c34a0fb8306 - Patch
References () https://git.kernel.org/stable/c/d05267fd27a5c4f54e06daefa3035995d765ca0c - () https://git.kernel.org/stable/c/d05267fd27a5c4f54e06daefa3035995d765ca0c - Patch
References () https://git.kernel.org/stable/c/e8675d291ac007e1c636870db880f837a9ea112a - () https://git.kernel.org/stable/c/e8675d291ac007e1c636870db880f837a9ea112a - Patch
CWE NVD-CWE-noinfo
CPE cpe:2.3:o:linux:linux_kernel:5.13:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc4:*:*:*:*:*:*
First Time Linux linux Kernel
Linux
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5

21 Nov 2024, 06:35

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mm/memory-failure: asegúrese de esperar la reescritura de la página en Memory_failure. Nuestro syzkaller activa el "BUG_ON(!list_empty(&inode->i_wb_list))" en clear_inode: kernel BUG en fs /inodo.c:519! Error interno: Oops - BUG: 0 [#1] Módulos SMP vinculados en: Proceso syz-executor.0 (pid: 249, límite de pila = 0x00000000a12409d7) CPU: 1 PID: 249 Comm: syz-executor.0 No contaminado 4.19. 95 Nombre de hardware: linux,dummy-virt (DT) pstate: 80000005 (Nzcv daif -PAN -UAO) pc: clear_inode+0x280/0x2a8 lr: clear_inode+0x280/0x2a8 Rastreo de llamadas: clear_inode+0x280/0x2a8 ext4_clear_inode+0x38/0xe8 ext4_free_inode+0x130/0xc68 ext4_evict_inode+0xb20/0xcb8 desalojar+0x1a8/0x3c0 iput+0x344/0x460 do_unlinkat+0x260/0x410 __arm64_sys_unlinkat+0x6c/0xc0 el0_svc_common+0xdc /0x3b0 el0_svc_handler+0xf8/0x160 el0_svc+0x10/0x218 Pánico del kernel: no se sincroniza : Excepción fatal Un volcado de memoria de este problema muestra que alguien llamó a __munlock_pagevec para borrar la página LRU sin lock_page: do_mmap -> mmap_region -> do_munmap -> munlock_vma_pages_range -> __munlock_pagevec. Como resultado, Memory_failure llamará a identify_page_state sin wait_on_page_writeback. Y después de truncate_error_page, borre el mapeo de esta página. end_page_writeback no llamará a sb_clear_inode_writeback para borrar inode->i_wb_list. ¡Eso activará BUG_ON en clear_inode! Solucionarlo marcando también PageWriteback para ayudar a determinar si debemos omitir wait_on_page_writeback.
References () https://git.kernel.org/stable/c/28788dc5c70597395b6b451dae4549bbaa8e2c56 - () https://git.kernel.org/stable/c/28788dc5c70597395b6b451dae4549bbaa8e2c56 -
References () https://git.kernel.org/stable/c/566345aaabac853aa866f53a219c4b02a6beb527 - () https://git.kernel.org/stable/c/566345aaabac853aa866f53a219c4b02a6beb527 -
References () https://git.kernel.org/stable/c/6d210d547adc2218ef8b5bcf23518c5f2f1fd872 - () https://git.kernel.org/stable/c/6d210d547adc2218ef8b5bcf23518c5f2f1fd872 -
References () https://git.kernel.org/stable/c/9e379da727a7a031be9b877cde7b9c34a0fb8306 - () https://git.kernel.org/stable/c/9e379da727a7a031be9b877cde7b9c34a0fb8306 -
References () https://git.kernel.org/stable/c/d05267fd27a5c4f54e06daefa3035995d765ca0c - () https://git.kernel.org/stable/c/d05267fd27a5c4f54e06daefa3035995d765ca0c -
References () https://git.kernel.org/stable/c/e8675d291ac007e1c636870db880f837a9ea112a - () https://git.kernel.org/stable/c/e8675d291ac007e1c636870db880f837a9ea112a -

21 May 2024, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-21 15:15

Updated : 2025-04-30 15:05


NVD link : CVE-2021-47256

Mitre link : CVE-2021-47256

CVE.ORG link : CVE-2021-47256


JSON object : View

Products Affected

linux

  • linux_kernel