In the Linux kernel, the following vulnerability has been resolved:
fs/mount_setattr: always cleanup mount_kattr
Make sure that finish_mount_kattr() is called after mount_kattr was
succesfully built in both the success and failure case to prevent
leaking any references we took when we built it. We returned early if
path lookup failed thereby risking to leak an additional reference we
took when building mount_kattr when an idmapped mount was requested.
fs/mount_setattr: always cleanup mount_kattr
Make sure that finish_mount_kattr() is called after mount_kattr was
succesfully built in both the success and failure case to prevent
leaking any references we took when we built it. We returned early if
path lookup failed thereby risking to leak an additional reference we
took when building mount_kattr when an idmapped mount was requested.
Metrics
Affected Vendors & Products
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: Linux
Published:
Updated: 2025-05-04T07:00:25.933Z
Reserved: 2024-02-25T13:45:52.719Z
Link: CVE-2021-46923
Updated: 2024-08-04T05:17:43.009Z
Status : Modified
Published: 2024-02-27T10:15:07.100
Modified: 2024-11-21T06:34:56.550
Link: CVE-2021-46923
OpenCVE Enrichment
No data.