vulnerability

Ubuntu: (Multiple Advisories) (CVE-2021-47119): Linux kernel vulnerabilities

Severity
5
CVSS
(AV:L/AC:L/Au:S/C:N/I:N/A:C)
Published
Mar 15, 2024
Added
Apr 4, 2025
Modified
Aug 18, 2025

Description

In the Linux kernel, the following vulnerability has been resolved:

ext4: fix memory leak in ext4_fill_super

Buffer head references must be released before calling kill_bdev();
otherwise the buffer head (and its page referenced by b_data) will not
be freed by kill_bdev, and subsequently that bh will be leaked.

If blocksizes differ, sb_set_blocksize() will kill current buffers and
page cache by using kill_bdev(). And then super block will be reread
again but using correct blocksize this time. sb_set_blocksize() didn't
fully free superblock page and buffer head, and being busy, they were
not freed and instead leaked.

This can easily be reproduced by calling an infinite loop of:

systemctl start <ext4_on_lvm>.mount, and
systemctl stop <ext4_on_lvm>.mount

... since systemd creates a cgroup for each slice which it mounts, and
the bh leak get amplified by a dying memory cgroup that also never
gets freed, and memory consumption is much more easily noticed.

Solutions

ubuntu-upgrade-linux-image-3-13-0-205-genericubuntu-upgrade-linux-image-3-13-0-205-lowlatencyubuntu-upgrade-linux-image-4-15-0-1134-fipsubuntu-upgrade-linux-image-4-15-0-1141-oracleubuntu-upgrade-linux-image-4-15-0-1162-kvmubuntu-upgrade-linux-image-4-15-0-1172-gcpubuntu-upgrade-linux-image-4-15-0-1179-awsubuntu-upgrade-linux-image-4-15-0-1187-azureubuntu-upgrade-linux-image-4-15-0-2080-gcp-fipsubuntu-upgrade-linux-image-4-15-0-2096-azure-fipsubuntu-upgrade-linux-image-4-15-0-2117-aws-fipsubuntu-upgrade-linux-image-4-15-0-236-genericubuntu-upgrade-linux-image-4-15-0-236-lowlatencyubuntu-upgrade-linux-image-4-4-0-1112-fipsubuntu-upgrade-linux-image-4-4-0-1142-awsubuntu-upgrade-linux-image-4-4-0-1143-kvmubuntu-upgrade-linux-image-4-4-0-1180-awsubuntu-upgrade-linux-image-4-4-0-267-genericubuntu-upgrade-linux-image-4-4-0-267-lowlatencyubuntu-upgrade-linux-image-5-4-0-1049-iotubuntu-upgrade-linux-image-5-4-0-1062-xilinx-zynqmpubuntu-upgrade-linux-image-5-4-0-1090-ibmubuntu-upgrade-linux-image-5-4-0-1103-bluefieldubuntu-upgrade-linux-image-5-4-0-1118-fipsubuntu-upgrade-linux-image-5-4-0-1129-raspiubuntu-upgrade-linux-image-5-4-0-1131-kvmubuntu-upgrade-linux-image-5-4-0-1142-oracleubuntu-upgrade-linux-image-5-4-0-1144-awsubuntu-upgrade-linux-image-5-4-0-1144-aws-fipsubuntu-upgrade-linux-image-5-4-0-1147-gcpubuntu-upgrade-linux-image-5-4-0-1147-gcp-fipsubuntu-upgrade-linux-image-5-4-0-1149-azureubuntu-upgrade-linux-image-5-4-0-1149-azure-fipsubuntu-upgrade-linux-image-5-4-0-214-genericubuntu-upgrade-linux-image-5-4-0-214-generic-lpaeubuntu-upgrade-linux-image-5-4-0-214-lowlatencyubuntu-upgrade-linux-image-awsubuntu-upgrade-linux-image-aws-fipsubuntu-upgrade-linux-image-aws-hweubuntu-upgrade-linux-image-aws-lts-18-04ubuntu-upgrade-linux-image-aws-lts-20-04ubuntu-upgrade-linux-image-azureubuntu-upgrade-linux-image-azure-fipsubuntu-upgrade-linux-image-azure-lts-18-04ubuntu-upgrade-linux-image-azure-lts-20-04ubuntu-upgrade-linux-image-bluefieldubuntu-upgrade-linux-image-fipsubuntu-upgrade-linux-image-gcpubuntu-upgrade-linux-image-gcp-fipsubuntu-upgrade-linux-image-gcp-lts-18-04ubuntu-upgrade-linux-image-gcp-lts-20-04ubuntu-upgrade-linux-image-genericubuntu-upgrade-linux-image-generic-hwe-16-04ubuntu-upgrade-linux-image-generic-hwe-18-04ubuntu-upgrade-linux-image-generic-lpaeubuntu-upgrade-linux-image-generic-lts-trustyubuntu-upgrade-linux-image-generic-lts-xenialubuntu-upgrade-linux-image-gkeubuntu-upgrade-linux-image-ibmubuntu-upgrade-linux-image-ibm-lts-20-04ubuntu-upgrade-linux-image-kvmubuntu-upgrade-linux-image-lowlatencyubuntu-upgrade-linux-image-lowlatency-hwe-16-04ubuntu-upgrade-linux-image-lowlatency-hwe-18-04ubuntu-upgrade-linux-image-lowlatency-lts-xenialubuntu-upgrade-linux-image-oemubuntu-upgrade-linux-image-oem-osp1ubuntu-upgrade-linux-image-oracleubuntu-upgrade-linux-image-oracle-lts-18-04ubuntu-upgrade-linux-image-oracle-lts-20-04ubuntu-upgrade-linux-image-raspiubuntu-upgrade-linux-image-raspi-hwe-18-04ubuntu-upgrade-linux-image-raspi2ubuntu-upgrade-linux-image-serverubuntu-upgrade-linux-image-snapdragon-hwe-18-04ubuntu-upgrade-linux-image-virtualubuntu-upgrade-linux-image-virtual-hwe-16-04ubuntu-upgrade-linux-image-virtual-hwe-18-04ubuntu-upgrade-linux-image-virtual-lts-xenialubuntu-upgrade-linux-image-xilinx-zynqmp

References

    Title
    NEW

    Explore Exposure Command

    Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.