In the Linux kernel, the following vulnerability has been resolved: f2fs:
compress: fix race condition of overwrite vs truncate pos_fsstress testcase
complains a panic as belew: ------------[ cut here ]------------ kernel BUG
at fs/f2fs/compress.c:1082! invalid opcode: 0000 [#1] SMP PTI CPU: 4 PID:
2753477 Comm: kworker/u16:2 Tainted: G OE 5.12.0-rc1-custom #1 Hardware
name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.14.0-2 04/01/2014
Workqueue: writeback wb_workfn (flush-252:16) RIP:
0010:prepare_compress_overwrite+0x4c0/0x760 [f2fs] Call Trace:
f2fs_prepare_compress_overwrite+0x5f/0x80 [f2fs]
f2fs_write_cache_pages+0x468/0x8a0 [f2fs] f2fs_write_data_pages+0x2a4/0x2f0
[f2fs] do_writepages+0x38/0xc0 __writeback_single_inode+0x44/0x2a0
writeback_sb_inodes+0x223/0x4d0 __writeback_inodes_wb+0x56/0xf0
wb_writeback+0x1dd/0x290 wb_workfn+0x309/0x500 process_one_work+0x220/0x3c0
worker_thread+0x53/0x420 kthread+0x12f/0x150 ret_from_fork+0x22/0x30 The
root cause is truncate() may race with overwrite as below, so that one
reference count left in page can not guarantee the page attaching in
mapping tree all the time, after truncation, later find_lock_page() may
return NULL pointer. - prepare_compress_overwrite - f2fs_pagecache_get_page
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 20.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-azure | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-bluefield | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-gcp | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-gkeop | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-ibm | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-iot | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-kvm | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-oracle | < any | UNKNOWN |
git.kernel.org/linus/a949dc5f2c5cfe0c910b664650f45371254c0744 (5.13-rc2)
git.kernel.org/stable/c/5639b73fd3bc6fc8ca72e3a9ac15aacaabd7ebff
git.kernel.org/stable/c/64acb100fe3beb5d20184d0ae3307235bd3555c4
git.kernel.org/stable/c/936158b15e2648253afb824d252c910c496d34b5
git.kernel.org/stable/c/a949dc5f2c5cfe0c910b664650f45371254c0744
launchpad.net/bugs/cve/CVE-2021-46982
nvd.nist.gov/vuln/detail/CVE-2021-46982
security-tracker.debian.org/tracker/CVE-2021-46982
www.cve.org/CVERecord?id=CVE-2021-46982