In the Linux kernel, the following vulnerability has been resolved: jfs:
fix GPF in diFree Avoid passing inode with JFS_SBI(inode->i_sb)->ipimap ==
NULL to diFree()[1]. GFP will appear: struct inode *ipimap =
JFS_SBI(ip->i_sb)->ipimap; struct inomap *imap = JFS_IP(ipimap)->i_imap;
JFS_IP() will return invalid pointer when ipimap == NULL Call Trace:
diFree+0x13d/0x2dc0 fs/jfs/jfs_imap.c:853 [1] jfs_evict_inode+0x2c9/0x370
fs/jfs/inode.c:154 evict+0x2ed/0x750 fs/inode.c:578 iput_final
fs/inode.c:1654 [inline] iput.part.0+0x3fe/0x820 fs/inode.c:1680
iput+0x58/0x70 fs/inode.c:1670
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 23.10 | noarch | linux | < any | UNKNOWN |
ubuntu | 24.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 14.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 16.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 18.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-aws | < any | UNKNOWN |
git.kernel.org/linus/9d574f985fe33efd6911f4d752de6f485a1ea732 (5.14-rc1)
git.kernel.org/stable/c/3bb27e27240289b47d3466f647a55c567adbdc3a
git.kernel.org/stable/c/42f102ea1943ecb10a0756bf75424de5d1d5beed
git.kernel.org/stable/c/49def1b0644892e3b113673c13d650c3060b43bc
git.kernel.org/stable/c/745c9a59422c63f661f4374ed5181740db4130a1
git.kernel.org/stable/c/7bde24bde490f3139eee147efc6d60d6040fe975
git.kernel.org/stable/c/8018936950360f1c503bb385e158cfc5e4945d18
git.kernel.org/stable/c/9d574f985fe33efd6911f4d752de6f485a1ea732
git.kernel.org/stable/c/a21e5cb1a64c904f1f0ef7b2d386fc7d2b1d2ce2
git.kernel.org/stable/c/aff8d95b69051d0cf4acc3d91f22299fdbb9dfb3
launchpad.net/bugs/cve/CVE-2021-47340
nvd.nist.gov/vuln/detail/CVE-2021-47340
security-tracker.debian.org/tracker/CVE-2021-47340
www.cve.org/CVERecord?id=CVE-2021-47340