![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
CVE ID: | CVE-2021-47119 |
Description: | In the Linux kernel, the following vulnerability has been resolved:
ext4: fix memory leak in ext4_fill_super Buffer head references must
be released before calling kill_bdev(); otherwise the buffer head (and
its page referenced by b_data) will not be freed by kill_bdev, and
subsequently that bh will be leaked. If blocksizes differ,
sb_set_blocksize() will kill current buffers and page cache by using
kill_bdev(). And then super block will be reread again but using
correct blocksize this time. sb_set_blocksize() didn't fully free
superblock page and buffer head, and being busy, they were not freed
and instead leaked. This can easily be reproduced by calling an
infinite loop of: systemctl start |
Test IDs: | None available |
Cross References: |
Common Vulnerability Exposure (CVE) ID: CVE-2021-47119 https://git.kernel.org/stable/c/01d349a481f0591230300a9171330136f9159bcd https://git.kernel.org/stable/c/01d349a481f0591230300a9171330136f9159bcd https://git.kernel.org/stable/c/1385b23396d511d5233b8b921ac3058b3f86a5e1 https://git.kernel.org/stable/c/1385b23396d511d5233b8b921ac3058b3f86a5e1 https://git.kernel.org/stable/c/afd09b617db3786b6ef3dc43e28fe728cfea84df https://git.kernel.org/stable/c/afd09b617db3786b6ef3dc43e28fe728cfea84df |