ext4:修复 ext4_fill_super 中的内存泄漏 (CVE-2021-47119)

admin 2024-03-25 10:14:23 Ali_nvd 来源:ZONE.CI 全球网 0 阅读模式
ext4:修复 ext4_fill_super 中的内存泄漏 (CVE-2021-47119)

CVE编号

CVE-2021-47119

利用情况

暂无

补丁情况

N/A

披露时间

2024-03-16
漏洞描述
In the Linux kernel, the following vulnerability has been resolved: ext4: fix memory leak in ext4_fill_super Buffer head references must be released before calling kill_bdev(); otherwise the buffer head (and its page referenced by b_data) will not be freed by kill_bdev, and subsequently that bh will be leaked. If blocksizes differ, sb_set_blocksize() will kill current buffers and page cache by using kill_bdev(). And then super block will be reread again but using correct blocksize this time. sb_set_blocksize() didn't fully free superblock page and buffer head, and being busy, they were not freed and instead leaked. This can easily be reproduced by calling an infinite loop of: systemctl start <ext4_on_lvm>.mount, and systemctl stop <ext4_on_lvm>.mount ... since systemd creates a cgroup for each slice which it mounts, and the bh leak get amplified by a dying memory cgroup that also never gets freed, and memory consumption is much more easily noticed.
解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接
https://git.kernel.org/stable/c/01d349a481f0591230300a9171330136f9159bcd
https://git.kernel.org/stable/c/1385b23396d511d5233b8b921ac3058b3f86a5e1
https://git.kernel.org/stable/c/afd09b617db3786b6ef3dc43e28fe728cfea84df
受影响软件情况
# 类型 厂商 产品 版本 影响面
1
运行在以下环境
系统 debian_11 linux * Up to (excluding) 5.10.46-1
运行在以下环境
系统 debian_12 linux * Up to (excluding) 5.10.46-1
CVSS3评分 N/A
  • 攻击路径 N/A
  • 攻击复杂度 N/A
  • 权限要求 N/A
  • 影响范围 N/A
  • 用户交互 N/A
  • 可用性 N/A
  • 保密性 N/A
  • 完整性 N/A
N/A
CWE-ID 漏洞类型
- avd.aliyun.com
weinxin
版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
N/A Ali_nvd

N/A

N/ACVE编号 CVE-2024-9120利用情况 暂无补丁情况 N/A披露时间 2024-09-23漏洞描述Use after free in Dawn
评论:0   参与:  0