CVE-2021-47004 (GCVE-0-2021-47004)

Vulnerability from cvelistv5 – Published: 2024-02-28 08:13 – Updated: 2025-05-04 07:02
VLAI?
Summary
In the Linux kernel, the following vulnerability has been resolved: f2fs: fix to avoid touching checkpointed data in get_victim() In CP disabling mode, there are two issues when using LFS or SSR | AT_SSR mode to select victim: 1. LFS is set to find source section during GC, the victim should have no checkpointed data, since after GC, section could not be set free for reuse. Previously, we only check valid chpt blocks in current segment rather than section, fix it. 2. SSR | AT_SSR are set to find target segment for writes which can be fully filled by checkpointed and newly written blocks, we should never select such segment, otherwise it can cause panic or data corruption during allocation, potential case is described as below: a) target segment has 'n' (n < 512) ckpt valid blocks b) GC migrates 'n' valid blocks to other segment (segment is still in dirty list) c) GC migrates '512 - n' blocks to target segment (segment has 'n' cp_vblocks and '512 - n' vblocks) d) If GC selects target segment via {AT,}SSR allocator, however there is no free space in targe segment.
Severity ?
No CVSS data available.
Assigner
Impacted products
Vendor Product Version
Linux Linux Affected: 4354994f097d068a894aa1a0860da54571df3582 , < 105155a8146ddb54c119d8318964eef3859d109d (git)
Affected: 4354994f097d068a894aa1a0860da54571df3582 , < 1e116f87825f01a6380286472196882746b16f63 (git)
Affected: 4354994f097d068a894aa1a0860da54571df3582 , < 211372b2571520e394b56b431a0705586013b3ff (git)
Affected: 4354994f097d068a894aa1a0860da54571df3582 , < 61461fc921b756ae16e64243f72af2bfc2e620db (git)
Create a notification for this product.
    Linux Linux Affected: 4.20
Unaffected: 0 , < 4.20 (semver)
Unaffected: 5.10.38 , ≤ 5.10.* (semver)
Unaffected: 5.11.22 , ≤ 5.11.* (semver)
Unaffected: 5.12.5 , ≤ 5.12.* (semver)
Unaffected: 5.13 , ≤ * (original_commit_for_fix)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T05:24:39.238Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/105155a8146ddb54c119d8318964eef3859d109d"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/1e116f87825f01a6380286472196882746b16f63"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/211372b2571520e394b56b431a0705586013b3ff"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/61461fc921b756ae16e64243f72af2bfc2e620db"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2021-47004",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-09-10T15:58:19.064167Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-09-11T17:33:34.294Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "fs/f2fs/f2fs.h",
            "fs/f2fs/gc.c",
            "fs/f2fs/segment.c",
            "fs/f2fs/segment.h"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "105155a8146ddb54c119d8318964eef3859d109d",
              "status": "affected",
              "version": "4354994f097d068a894aa1a0860da54571df3582",
              "versionType": "git"
            },
            {
              "lessThan": "1e116f87825f01a6380286472196882746b16f63",
              "status": "affected",
              "version": "4354994f097d068a894aa1a0860da54571df3582",
              "versionType": "git"
            },
            {
              "lessThan": "211372b2571520e394b56b431a0705586013b3ff",
              "status": "affected",
              "version": "4354994f097d068a894aa1a0860da54571df3582",
              "versionType": "git"
            },
            {
              "lessThan": "61461fc921b756ae16e64243f72af2bfc2e620db",
              "status": "affected",
              "version": "4354994f097d068a894aa1a0860da54571df3582",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "fs/f2fs/f2fs.h",
            "fs/f2fs/gc.c",
            "fs/f2fs/segment.c",
            "fs/f2fs/segment.h"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "4.20"
            },
            {
              "lessThan": "4.20",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.10.*",
              "status": "unaffected",
              "version": "5.10.38",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.11.*",
              "status": "unaffected",
              "version": "5.11.22",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.12.*",
              "status": "unaffected",
              "version": "5.12.5",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "5.13",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.10.38",
                  "versionStartIncluding": "4.20",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.11.22",
                  "versionStartIncluding": "4.20",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.12.5",
                  "versionStartIncluding": "4.20",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.13",
                  "versionStartIncluding": "4.20",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nf2fs: fix to avoid touching checkpointed data in get_victim()\n\nIn CP disabling mode, there are two issues when using LFS or SSR | AT_SSR\nmode to select victim:\n\n1. LFS is set to find source section during GC, the victim should have\nno checkpointed data, since after GC, section could not be set free for\nreuse.\n\nPreviously, we only check valid chpt blocks in current segment rather\nthan section, fix it.\n\n2. SSR | AT_SSR are set to find target segment for writes which can be\nfully filled by checkpointed and newly written blocks, we should never\nselect such segment, otherwise it can cause panic or data corruption\nduring allocation, potential case is described as below:\n\n a) target segment has \u0027n\u0027 (n \u003c 512) ckpt valid blocks\n b) GC migrates \u0027n\u0027 valid blocks to other segment (segment is still\n    in dirty list)\n c) GC migrates \u0027512 - n\u0027 blocks to target segment (segment has \u0027n\u0027\n    cp_vblocks and \u0027512 - n\u0027 vblocks)\n d) If GC selects target segment via {AT,}SSR allocator, however there\n    is no free space in targe segment."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-05-04T07:02:08.051Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/105155a8146ddb54c119d8318964eef3859d109d"
        },
        {
          "url": "https://git.kernel.org/stable/c/1e116f87825f01a6380286472196882746b16f63"
        },
        {
          "url": "https://git.kernel.org/stable/c/211372b2571520e394b56b431a0705586013b3ff"
        },
        {
          "url": "https://git.kernel.org/stable/c/61461fc921b756ae16e64243f72af2bfc2e620db"
        }
      ],
      "title": "f2fs: fix to avoid touching checkpointed data in get_victim()",
      "x_generator": {
        "engine": "bippy-1.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2021-47004",
    "datePublished": "2024-02-28T08:13:25.324Z",
    "dateReserved": "2024-02-27T18:42:55.951Z",
    "dateUpdated": "2025-05-04T07:02:08.051Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"4.20\", \"versionEndExcluding\": \"5.10.38\", \"matchCriteriaId\": \"7B942F1E-8607-4DB5-90A9-F497E0DCFF88\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"5.11\", \"versionEndExcluding\": \"5.11.22\", \"matchCriteriaId\": \"83B53E9A-F426-4C03-9A5F-A931FF79827E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"5.12\", \"versionEndExcluding\": \"5.12.5\", \"matchCriteriaId\": \"0274929A-B36C-4F4C-AB22-30A0DD6B995B\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\nf2fs: fix to avoid touching checkpointed data in get_victim()\\n\\nIn CP disabling mode, there are two issues when using LFS or SSR | AT_SSR\\nmode to select victim:\\n\\n1. LFS is set to find source section during GC, the victim should have\\nno checkpointed data, since after GC, section could not be set free for\\nreuse.\\n\\nPreviously, we only check valid chpt blocks in current segment rather\\nthan section, fix it.\\n\\n2. SSR | AT_SSR are set to find target segment for writes which can be\\nfully filled by checkpointed and newly written blocks, we should never\\nselect such segment, otherwise it can cause panic or data corruption\\nduring allocation, potential case is described as below:\\n\\n a) target segment has \u0027n\u0027 (n \u003c 512) ckpt valid blocks\\n b) GC migrates \u0027n\u0027 valid blocks to other segment (segment is still\\n    in dirty list)\\n c) GC migrates \u0027512 - n\u0027 blocks to target segment (segment has \u0027n\u0027\\n    cp_vblocks and \u0027512 - n\u0027 vblocks)\\n d) If GC selects target segment via {AT,}SSR allocator, however there\\n    is no free space in targe segment.\"}, {\"lang\": \"es\", \"value\": \"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: f2fs: correcci\\u00f3n para evitar tocar datos con puntos de control en get_victim() En el modo de desactivaci\\u00f3n de CP, hay dos problemas al usar LFS o SSR | Modo AT_SSR para seleccionar a la v\\u00edctima: 1. LFS est\\u00e1 configurado para buscar la secci\\u00f3n de origen durante la GC, la v\\u00edctima no debe tener datos de puntos de control, ya que despu\\u00e9s de la GC, la secci\\u00f3n no se puede liberar para su reutilizaci\\u00f3n. Anteriormente, solo verific\\u00e1bamos los bloques chpt v\\u00e1lidos en el segmento actual en lugar de en la secci\\u00f3n, lo arreglamos. 2. RSS | AT_SSR est\\u00e1 configurado para encontrar un segmento de destino para escrituras que se puede llenar completamente con bloques reci\\u00e9n escritos y con puntos de control. Nunca debemos seleccionar dicho segmento; de lo contrario, puede causar p\\u00e1nico o corrupci\\u00f3n de datos durante la asignaci\\u00f3n. El caso potencial se describe a continuaci\\u00f3n: a) segmento de destino tiene \u0027n\u0027 (n \u0026lt; 512) ckpt bloques v\\u00e1lidos b) GC migra \u0027n\u0027 bloques v\\u00e1lidos a otro segmento (el segmento todav\\u00eda est\\u00e1 en la lista sucia) c) GC migra \u0027512 - n\u0027 bloques al segmento objetivo (el segmento tiene \u0027n \u0027 cp_vblocks y \u0027512 - n\u0027 vblocks) d) Si GC selecciona el segmento de destino mediante el asignador {AT,}SSR, sin embargo, no hay espacio libre en el segmento de destino.\"}]",
      "id": "CVE-2021-47004",
      "lastModified": "2025-01-08T17:43:50.870",
      "metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H\", \"baseScore\": 7.1, \"baseSeverity\": \"HIGH\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 1.8, \"impactScore\": 5.2}]}",
      "published": "2024-02-28T09:15:38.353",
      "references": "[{\"url\": \"https://git.kernel.org/stable/c/105155a8146ddb54c119d8318964eef3859d109d\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"tags\": [\"Patch\"]}, {\"url\": \"https://git.kernel.org/stable/c/1e116f87825f01a6380286472196882746b16f63\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"tags\": [\"Patch\"]}, {\"url\": \"https://git.kernel.org/stable/c/211372b2571520e394b56b431a0705586013b3ff\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"tags\": [\"Patch\"]}, {\"url\": \"https://git.kernel.org/stable/c/61461fc921b756ae16e64243f72af2bfc2e620db\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"tags\": [\"Patch\"]}, {\"url\": \"https://git.kernel.org/stable/c/105155a8146ddb54c119d8318964eef3859d109d\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}, {\"url\": \"https://git.kernel.org/stable/c/1e116f87825f01a6380286472196882746b16f63\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}, {\"url\": \"https://git.kernel.org/stable/c/211372b2571520e394b56b431a0705586013b3ff\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}, {\"url\": \"https://git.kernel.org/stable/c/61461fc921b756ae16e64243f72af2bfc2e620db\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}]",
      "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
      "vulnStatus": "Analyzed",
      "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-noinfo\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2021-47004\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2024-02-28T09:15:38.353\",\"lastModified\":\"2025-01-08T17:43:50.870\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nf2fs: fix to avoid touching checkpointed data in get_victim()\\n\\nIn CP disabling mode, there are two issues when using LFS or SSR | AT_SSR\\nmode to select victim:\\n\\n1. LFS is set to find source section during GC, the victim should have\\nno checkpointed data, since after GC, section could not be set free for\\nreuse.\\n\\nPreviously, we only check valid chpt blocks in current segment rather\\nthan section, fix it.\\n\\n2. SSR | AT_SSR are set to find target segment for writes which can be\\nfully filled by checkpointed and newly written blocks, we should never\\nselect such segment, otherwise it can cause panic or data corruption\\nduring allocation, potential case is described as below:\\n\\n a) target segment has \u0027n\u0027 (n \u003c 512) ckpt valid blocks\\n b) GC migrates \u0027n\u0027 valid blocks to other segment (segment is still\\n    in dirty list)\\n c) GC migrates \u0027512 - n\u0027 blocks to target segment (segment has \u0027n\u0027\\n    cp_vblocks and \u0027512 - n\u0027 vblocks)\\n d) If GC selects target segment via {AT,}SSR allocator, however there\\n    is no free space in targe segment.\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: f2fs: correcci\u00f3n para evitar tocar datos con puntos de control en get_victim() En el modo de desactivaci\u00f3n de CP, hay dos problemas al usar LFS o SSR | Modo AT_SSR para seleccionar a la v\u00edctima: 1. LFS est\u00e1 configurado para buscar la secci\u00f3n de origen durante la GC, la v\u00edctima no debe tener datos de puntos de control, ya que despu\u00e9s de la GC, la secci\u00f3n no se puede liberar para su reutilizaci\u00f3n. Anteriormente, solo verific\u00e1bamos los bloques chpt v\u00e1lidos en el segmento actual en lugar de en la secci\u00f3n, lo arreglamos. 2. RSS | AT_SSR est\u00e1 configurado para encontrar un segmento de destino para escrituras que se puede llenar completamente con bloques reci\u00e9n escritos y con puntos de control. Nunca debemos seleccionar dicho segmento; de lo contrario, puede causar p\u00e1nico o corrupci\u00f3n de datos durante la asignaci\u00f3n. El caso potencial se describe a continuaci\u00f3n: a) segmento de destino tiene \u0027n\u0027 (n \u0026lt; 512) ckpt bloques v\u00e1lidos b) GC migra \u0027n\u0027 bloques v\u00e1lidos a otro segmento (el segmento todav\u00eda est\u00e1 en la lista sucia) c) GC migra \u0027512 - n\u0027 bloques al segmento objetivo (el segmento tiene \u0027n \u0027 cp_vblocks y \u0027512 - n\u0027 vblocks) d) Si GC selecciona el segmento de destino mediante el asignador {AT,}SSR, sin embargo, no hay espacio libre en el segmento de destino.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H\",\"baseScore\":7.1,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.2}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.20\",\"versionEndExcluding\":\"5.10.38\",\"matchCriteriaId\":\"7B942F1E-8607-4DB5-90A9-F497E0DCFF88\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.11\",\"versionEndExcluding\":\"5.11.22\",\"matchCriteriaId\":\"83B53E9A-F426-4C03-9A5F-A931FF79827E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.12\",\"versionEndExcluding\":\"5.12.5\",\"matchCriteriaId\":\"0274929A-B36C-4F4C-AB22-30A0DD6B995B\"}]}]}],\"references\":[{\"url\":\"https://git.kernel.org/stable/c/105155a8146ddb54c119d8318964eef3859d109d\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/1e116f87825f01a6380286472196882746b16f63\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/211372b2571520e394b56b431a0705586013b3ff\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/61461fc921b756ae16e64243f72af2bfc2e620db\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/105155a8146ddb54c119d8318964eef3859d109d\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/1e116f87825f01a6380286472196882746b16f63\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/211372b2571520e394b56b431a0705586013b3ff\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/61461fc921b756ae16e64243f72af2bfc2e620db\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://git.kernel.org/stable/c/105155a8146ddb54c119d8318964eef3859d109d\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/1e116f87825f01a6380286472196882746b16f63\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/211372b2571520e394b56b431a0705586013b3ff\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/61461fc921b756ae16e64243f72af2bfc2e620db\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-04T05:24:39.238Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2021-47004\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-09-10T15:58:19.064167Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-09-11T12:42:17.379Z\"}}], \"cna\": {\"title\": \"f2fs: fix to avoid touching checkpointed data in get_victim()\", \"affected\": [{\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"4354994f097d068a894aa1a0860da54571df3582\", \"lessThan\": \"105155a8146ddb54c119d8318964eef3859d109d\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"4354994f097d068a894aa1a0860da54571df3582\", \"lessThan\": \"1e116f87825f01a6380286472196882746b16f63\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"4354994f097d068a894aa1a0860da54571df3582\", \"lessThan\": \"211372b2571520e394b56b431a0705586013b3ff\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"4354994f097d068a894aa1a0860da54571df3582\", \"lessThan\": \"61461fc921b756ae16e64243f72af2bfc2e620db\", \"versionType\": \"git\"}], \"programFiles\": [\"fs/f2fs/f2fs.h\", \"fs/f2fs/gc.c\", \"fs/f2fs/segment.c\", \"fs/f2fs/segment.h\"], \"defaultStatus\": \"unaffected\"}, {\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"4.20\"}, {\"status\": \"unaffected\", \"version\": \"0\", \"lessThan\": \"4.20\", \"versionType\": \"semver\"}, {\"status\": \"unaffected\", \"version\": \"5.10.38\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.10.*\"}, {\"status\": \"unaffected\", \"version\": \"5.11.22\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.11.*\"}, {\"status\": \"unaffected\", \"version\": \"5.12.5\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.12.*\"}, {\"status\": \"unaffected\", \"version\": \"5.13\", \"versionType\": \"original_commit_for_fix\", \"lessThanOrEqual\": \"*\"}], \"programFiles\": [\"fs/f2fs/f2fs.h\", \"fs/f2fs/gc.c\", \"fs/f2fs/segment.c\", \"fs/f2fs/segment.h\"], \"defaultStatus\": \"affected\"}], \"references\": [{\"url\": \"https://git.kernel.org/stable/c/105155a8146ddb54c119d8318964eef3859d109d\"}, {\"url\": \"https://git.kernel.org/stable/c/1e116f87825f01a6380286472196882746b16f63\"}, {\"url\": \"https://git.kernel.org/stable/c/211372b2571520e394b56b431a0705586013b3ff\"}, {\"url\": \"https://git.kernel.org/stable/c/61461fc921b756ae16e64243f72af2bfc2e620db\"}], \"x_generator\": {\"engine\": \"bippy-1.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\nf2fs: fix to avoid touching checkpointed data in get_victim()\\n\\nIn CP disabling mode, there are two issues when using LFS or SSR | AT_SSR\\nmode to select victim:\\n\\n1. LFS is set to find source section during GC, the victim should have\\nno checkpointed data, since after GC, section could not be set free for\\nreuse.\\n\\nPreviously, we only check valid chpt blocks in current segment rather\\nthan section, fix it.\\n\\n2. SSR | AT_SSR are set to find target segment for writes which can be\\nfully filled by checkpointed and newly written blocks, we should never\\nselect such segment, otherwise it can cause panic or data corruption\\nduring allocation, potential case is described as below:\\n\\n a) target segment has \u0027n\u0027 (n \u003c 512) ckpt valid blocks\\n b) GC migrates \u0027n\u0027 valid blocks to other segment (segment is still\\n    in dirty list)\\n c) GC migrates \u0027512 - n\u0027 blocks to target segment (segment has \u0027n\u0027\\n    cp_vblocks and \u0027512 - n\u0027 vblocks)\\n d) If GC selects target segment via {AT,}SSR allocator, however there\\n    is no free space in targe segment.\"}], \"cpeApplicability\": [{\"nodes\": [{\"negate\": false, \"cpeMatch\": [{\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.10.38\", \"versionStartIncluding\": \"4.20\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.11.22\", \"versionStartIncluding\": \"4.20\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.12.5\", \"versionStartIncluding\": \"4.20\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.13\", \"versionStartIncluding\": \"4.20\"}], \"operator\": \"OR\"}]}], \"providerMetadata\": {\"orgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"shortName\": \"Linux\", \"dateUpdated\": \"2025-05-04T07:02:08.051Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2021-47004\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-05-04T07:02:08.051Z\", \"dateReserved\": \"2024-02-27T18:42:55.951Z\", \"assignerOrgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"datePublished\": \"2024-02-28T08:13:25.324Z\", \"assignerShortName\": \"Linux\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…