In the Linux kernel, the following vulnerability has been resolved: f2fs:
fix to avoid touching checkpointed data in get_victim() In CP disabling
mode, there are two issues when using LFS or SSR | AT_SSR mode to select
victim: 1. LFS is set to find source section during GC, the victim should
have no checkpointed data, since after GC, section could not be set free
for reuse. Previously, we only check valid chpt blocks in current segment
rather than section, fix it. 2. SSR | AT_SSR are set to find target segment
for writes which can be fully filled by checkpointed and newly written
blocks, we should never select such segment, otherwise it can cause panic
or data corruption during allocation, potential case is described as below:
a) target segment has ‘n’ (n < 512) ckpt valid blocks b) GC migrates ‘n’
valid blocks to other segment (segment is still in dirty list) c) GC
migrates ‘512 - n’ blocks to target segment (segment has ‘n’ cp_vblocks and
‘512 - n’ vblocks) d) If GC selects target segment via {AT,}SSR allocator,
however there is no free space in targe segment.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 23.10 | noarch | linux | < any | UNKNOWN |
ubuntu | 24.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 14.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 16.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 18.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-aws | < any | UNKNOWN |
git.kernel.org/linus/61461fc921b756ae16e64243f72af2bfc2e620db (5.13-rc1)
git.kernel.org/stable/c/105155a8146ddb54c119d8318964eef3859d109d
git.kernel.org/stable/c/1e116f87825f01a6380286472196882746b16f63
git.kernel.org/stable/c/211372b2571520e394b56b431a0705586013b3ff
git.kernel.org/stable/c/61461fc921b756ae16e64243f72af2bfc2e620db
launchpad.net/bugs/cve/CVE-2021-47004
nvd.nist.gov/vuln/detail/CVE-2021-47004
security-tracker.debian.org/tracker/CVE-2021-47004
www.cve.org/CVERecord?id=CVE-2021-47004