Lucene search

K
debiancveDebian Security Bug TrackerDEBIANCVE:CVE-2021-47214
HistoryApr 10, 2024 - 7:15 p.m.

CVE-2021-47214

2024-04-1019:15:48
Debian Security Bug Tracker
security-tracker.debian.org
4
linux kernel
hugetlb
userfaultfd
reservation fix
code bug
pagecache
reservation restoration

6.8 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.2%

In the Linux kernel, the following vulnerability has been resolved: hugetlb, userfaultfd: fix reservation restore on userfaultfd error Currently in the is_continue case in hugetlb_mcopy_atomic_pte(), if we bail out using “goto out_release_unlock;” in the cases where idx >= size, or !huge_pte_none(), the code will detect that new_pagecache_page == false, and so call restore_reserve_on_error(). In this case I see restore_reserve_on_error() delete the reservation, and the following call to remove_inode_hugepages() will increment h->resv_hugepages causing a 100% reproducible leak. We should treat the is_continue case similar to adding a page into the pagecache and set new_pagecache_page to true, to indicate that there is no reservation to restore on the error path, and we need not call restore_reserve_on_error(). Rename new_pagecache_page to page_in_pagecache to make that clear.

6.8 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.2%