CVE-2021-47340

In the Linux kernel, the following vulnerability has been resolved: jfs: fix GPF in diFree Avoid passing inode with JFS_SBI(inode->i_sb)->ipimap == NULL to diFree()[1]. GFP will appear: struct inode *ipimap = JFS_SBI(ip->i_sb)->ipimap; struct inomap *imap = JFS_IP(ipimap)->i_imap; JFS_IP() will return invalid pointer when ipimap == NULL Call Trace: diFree+0x13d/0x2dc0 fs/jfs/jfs_imap.c:853 [1] jfs_evict_inode+0x2c9/0x370 fs/jfs/inode.c:154 evict+0x2ed/0x750 fs/inode.c:578 iput_final fs/inode.c:1654 [inline] iput.part.0+0x3fe/0x820 fs/inode.c:1680 iput+0x58/0x70 fs/inode.c:1670
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

12 May 2025, 19:58

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
First Time Linux linux Kernel
Linux
CWE CWE-476
References () https://git.kernel.org/stable/c/3bb27e27240289b47d3466f647a55c567adbdc3a - () https://git.kernel.org/stable/c/3bb27e27240289b47d3466f647a55c567adbdc3a - Patch
References () https://git.kernel.org/stable/c/42f102ea1943ecb10a0756bf75424de5d1d5beed - () https://git.kernel.org/stable/c/42f102ea1943ecb10a0756bf75424de5d1d5beed - Patch
References () https://git.kernel.org/stable/c/49def1b0644892e3b113673c13d650c3060b43bc - () https://git.kernel.org/stable/c/49def1b0644892e3b113673c13d650c3060b43bc - Patch
References () https://git.kernel.org/stable/c/745c9a59422c63f661f4374ed5181740db4130a1 - () https://git.kernel.org/stable/c/745c9a59422c63f661f4374ed5181740db4130a1 - Patch
References () https://git.kernel.org/stable/c/7bde24bde490f3139eee147efc6d60d6040fe975 - () https://git.kernel.org/stable/c/7bde24bde490f3139eee147efc6d60d6040fe975 - Patch
References () https://git.kernel.org/stable/c/8018936950360f1c503bb385e158cfc5e4945d18 - () https://git.kernel.org/stable/c/8018936950360f1c503bb385e158cfc5e4945d18 - Patch
References () https://git.kernel.org/stable/c/9d574f985fe33efd6911f4d752de6f485a1ea732 - () https://git.kernel.org/stable/c/9d574f985fe33efd6911f4d752de6f485a1ea732 - Patch
References () https://git.kernel.org/stable/c/a21e5cb1a64c904f1f0ef7b2d386fc7d2b1d2ce2 - () https://git.kernel.org/stable/c/a21e5cb1a64c904f1f0ef7b2d386fc7d2b1d2ce2 - Patch
References () https://git.kernel.org/stable/c/aff8d95b69051d0cf4acc3d91f22299fdbb9dfb3 - () https://git.kernel.org/stable/c/aff8d95b69051d0cf4acc3d91f22299fdbb9dfb3 - Patch

21 Nov 2024, 06:35

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux se ha resuelto la siguiente vulnerabilidad: jfs: corrige GPF en diFree. Evite pasar el inodo con JFS_SBI(inode->i_sb)->ipimap == NULL a diFree()[1]. Aparecerá GFP: struct inode *ipimap = JFS_SBI(ip->i_sb)->ipimap; estructura inomap *imap = JFS_IP(ipimap)->i_imap; JFS_IP() devolverá un puntero no válido cuando ipimap == NULL Seguimiento de llamadas: diFree+0x13d/0x2dc0 fs/jfs/jfs_imap.c:853 [1] jfs_evict_inode+0x2c9/0x370 fs/jfs/inode.c:154 evict+0x2ed/ 0x750 fs/inode.c:578 iput_final fs/inode.c:1654 [en línea] iput.part.0+0x3fe/0x820 fs/inode.c:1680 iput+0x58/0x70 fs/inode.c:1670
References () https://git.kernel.org/stable/c/3bb27e27240289b47d3466f647a55c567adbdc3a - () https://git.kernel.org/stable/c/3bb27e27240289b47d3466f647a55c567adbdc3a -
References () https://git.kernel.org/stable/c/42f102ea1943ecb10a0756bf75424de5d1d5beed - () https://git.kernel.org/stable/c/42f102ea1943ecb10a0756bf75424de5d1d5beed -
References () https://git.kernel.org/stable/c/49def1b0644892e3b113673c13d650c3060b43bc - () https://git.kernel.org/stable/c/49def1b0644892e3b113673c13d650c3060b43bc -
References () https://git.kernel.org/stable/c/745c9a59422c63f661f4374ed5181740db4130a1 - () https://git.kernel.org/stable/c/745c9a59422c63f661f4374ed5181740db4130a1 -
References () https://git.kernel.org/stable/c/7bde24bde490f3139eee147efc6d60d6040fe975 - () https://git.kernel.org/stable/c/7bde24bde490f3139eee147efc6d60d6040fe975 -
References () https://git.kernel.org/stable/c/8018936950360f1c503bb385e158cfc5e4945d18 - () https://git.kernel.org/stable/c/8018936950360f1c503bb385e158cfc5e4945d18 -
References () https://git.kernel.org/stable/c/9d574f985fe33efd6911f4d752de6f485a1ea732 - () https://git.kernel.org/stable/c/9d574f985fe33efd6911f4d752de6f485a1ea732 -
References () https://git.kernel.org/stable/c/a21e5cb1a64c904f1f0ef7b2d386fc7d2b1d2ce2 - () https://git.kernel.org/stable/c/a21e5cb1a64c904f1f0ef7b2d386fc7d2b1d2ce2 -
References () https://git.kernel.org/stable/c/aff8d95b69051d0cf4acc3d91f22299fdbb9dfb3 - () https://git.kernel.org/stable/c/aff8d95b69051d0cf4acc3d91f22299fdbb9dfb3 -

21 May 2024, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-21 15:15

Updated : 2025-05-12 19:58


NVD link : CVE-2021-47340

Mitre link : CVE-2021-47340

CVE.ORG link : CVE-2021-47340


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-476

NULL Pointer Dereference