In the Linux kernel, the following vulnerability has been resolved:

ext4: fix memory leak in ext4_fill_super

Buffer head references must be released before calling kill_bdev();
otherwise the buffer head (and its page referenced by b_data) will not
be freed by kill_bdev, and subsequently that bh will be leaked.

If blocksizes differ, sb_set_blocksize() will kill current buffers and
page cache by using kill_bdev(). And then super block will be reread
again but using correct blocksize this time. sb_set_blocksize() didn't
fully free superblock page and buffer head, and being busy, they were
not freed and instead leaked.

This can easily be reproduced by calling an infinite loop of:

systemctl start <ext4_on_lvm>.mount, and
systemctl stop <ext4_on_lvm>.mount

... since systemd creates a cgroup for each slice which it mounts, and
the bh leak get amplified by a dying memory cgroup that also never
gets freed, and memory consumption is much more easily noticed.
Advisories
Source ID Title
Ubuntu USN Ubuntu USN USN-7415-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-7428-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-7428-2 Linux kernel (FIPS) vulnerabilities
Ubuntu USN Ubuntu USN USN-7429-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-7429-2 Linux kernel (FIPS) vulnerabilities
Ubuntu USN Ubuntu USN USN-7461-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-7461-2 Linux kernel (FIPS) vulnerabilities
Ubuntu USN Ubuntu USN USN-7461-3 Linux kernel (Xilinx ZynqMP) vulnerabilities
Ubuntu USN Ubuntu USN USN-7462-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-7462-2 Linux kernel (AWS FIPS) vulnerabilities
Ubuntu USN Ubuntu USN USN-7463-1 Linux kernel (IBM) vulnerabilities
Ubuntu USN Ubuntu USN USN-7539-1 Linux kernel (Raspberry Pi) vulnerabilities
Ubuntu USN Ubuntu USN USN-7540-1 Linux kernel (Raspberry Pi) vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 07 Jan 2025 18:00:00 +0000

Type Values Removed Values Added
First Time appeared Linux
Linux linux Kernel
Weaknesses CWE-401
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc4:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
Metrics cvssV3_1

{'score': 4.1, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H'}

cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}


Mon, 04 Nov 2024 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2025-05-04T07:04:31.455Z

Reserved: 2024-03-04T18:12:48.838Z

Link: CVE-2021-47119

cve-icon Vulnrichment

Updated: 2024-08-04T05:24:39.956Z

cve-icon NVD

Status : Analyzed

Published: 2024-03-15T21:15:07.013

Modified: 2025-01-07T17:31:16.383

Link: CVE-2021-47119

cve-icon Redhat

Severity : Low

Publid Date: 2024-03-15T00:00:00Z

Links: CVE-2021-47119 - Bugzilla

cve-icon OpenCVE Enrichment

No data.