Unrated severityNVD Advisory· Published May 21, 2024· Updated Dec 18, 2025
jfs: fix GPF in diFree
CVE-2021-47340
Description
In the Linux kernel, the following vulnerability has been resolved:
jfs: fix GPF in diFree
Avoid passing inode with JFS_SBI(inode->i_sb)->ipimap == NULL to diFree()[1]. GFP will appear:
struct inode *ipimap = JFS_SBI(ip->i_sb)->ipimap; struct inomap *imap = JFS_IP(ipimap)->i_imap;
JFS_IP() will return invalid pointer when ipimap == NULL
Call Trace: diFree+0x13d/0x2dc0 fs/jfs/jfs_imap.c:853 [1] jfs_evict_inode+0x2c9/0x370 fs/jfs/inode.c:154 evict+0x2ed/0x750 fs/inode.c:578 iput_final fs/inode.c:1654 [inline] iput.part.0+0x3fe/0x820 fs/inode.c:1680 iput+0x58/0x70 fs/inode.c:1670
Affected products
44- osv-coords43 versionspkg:rpm/suse/kernel-64kb&distro=SUSE%20Enterprise%20Storage%207.1pkg:rpm/suse/kernel-64kb&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP3-LTSSpkg:rpm/suse/kernel-64kb&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP3-LTSSpkg:rpm/suse/kernel-default-base&distro=SUSE%20Enterprise%20Storage%207.1pkg:rpm/suse/kernel-default-base&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP3-LTSSpkg:rpm/suse/kernel-default-base&distro=SUSE%20Linux%20Enterprise%20Micro%205.1pkg:rpm/suse/kernel-default-base&distro=SUSE%20Linux%20Enterprise%20Micro%205.2pkg:rpm/suse/kernel-default-base&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP3-LTSSpkg:rpm/suse/kernel-default-base&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP3pkg:rpm/suse/kernel-default&distro=SUSE%20Enterprise%20Storage%207.1pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20High%20Availability%20Extension%2015%20SP3pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP3-LTSSpkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015%20SP3pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Micro%205.1pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Micro%205.2pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP3-LTSSpkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP3pkg:rpm/suse/kernel-docs&distro=SUSE%20Enterprise%20Storage%207.1pkg:rpm/suse/kernel-docs&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP3-LTSSpkg:rpm/suse/kernel-docs&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP3-LTSSpkg:rpm/suse/kernel-docs&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP3pkg:rpm/suse/kernel-livepatch-SLE15-SP3_Update_45&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015%20SP3pkg:rpm/suse/kernel-obs-build&distro=SUSE%20Enterprise%20Storage%207.1pkg:rpm/suse/kernel-obs-build&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP3-LTSSpkg:rpm/suse/kernel-obs-build&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP3-LTSSpkg:rpm/suse/kernel-obs-build&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP3pkg:rpm/suse/kernel-preempt&distro=SUSE%20Enterprise%20Storage%207.1pkg:rpm/suse/kernel-preempt&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP3-LTSSpkg:rpm/suse/kernel-preempt&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP3-LTSSpkg:rpm/suse/kernel-preempt&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP3pkg:rpm/suse/kernel-rt&distro=SUSE%20Linux%20Enterprise%20Micro%205.1pkg:rpm/suse/kernel-rt&distro=SUSE%20Linux%20Enterprise%20Micro%205.2pkg:rpm/suse/kernel-source&distro=SUSE%20Enterprise%20Storage%207.1pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP3-LTSSpkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP3-LTSSpkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP3pkg:rpm/suse/kernel-source-rt&distro=SUSE%20Linux%20Enterprise%20Micro%205.1pkg:rpm/suse/kernel-source-rt&distro=SUSE%20Linux%20Enterprise%20Micro%205.2pkg:rpm/suse/kernel-syms&distro=SUSE%20Enterprise%20Storage%207.1pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP3-LTSSpkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP3-LTSSpkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP3pkg:rpm/suse/kernel-zfcpdump&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP3-LTSS
< 5.3.18-150300.59.164.1+ 42 more
- (no CPE)range: < 5.3.18-150300.59.164.1
- (no CPE)range: < 5.3.18-150300.59.164.1
- (no CPE)range: < 5.3.18-150300.59.164.1
- (no CPE)range: < 5.3.18-150300.59.164.1.150300.18.96.1
- (no CPE)range: < 5.3.18-150300.59.164.1.150300.18.96.1
- (no CPE)range: < 5.3.18-150300.59.164.1.150300.18.96.1
- (no CPE)range: < 5.3.18-150300.59.164.1.150300.18.96.1
- (no CPE)range: < 5.3.18-150300.59.164.1.150300.18.96.1
- (no CPE)range: < 5.3.18-150300.59.164.1.150300.18.96.1
- (no CPE)range: < 5.3.18-150300.59.164.1
- (no CPE)range: < 5.3.18-150300.59.164.1
- (no CPE)range: < 5.3.18-150300.59.164.1
- (no CPE)range: < 5.3.18-150300.59.164.1
- (no CPE)range: < 5.3.18-150300.59.164.1
- (no CPE)range: < 5.3.18-150300.59.164.1
- (no CPE)range: < 5.3.18-150300.59.164.1
- (no CPE)range: < 5.3.18-150300.59.164.1
- (no CPE)range: < 5.3.18-150300.59.164.1
- (no CPE)range: < 5.3.18-150300.59.164.1
- (no CPE)range: < 5.3.18-150300.59.164.1
- (no CPE)range: < 5.3.18-150300.59.164.1
- (no CPE)range: < 1-150300.7.3.1
- (no CPE)range: < 5.3.18-150300.59.164.1
- (no CPE)range: < 5.3.18-150300.59.164.1
- (no CPE)range: < 5.3.18-150300.59.164.1
- (no CPE)range: < 5.3.18-150300.59.164.1
- (no CPE)range: < 5.3.18-150300.59.164.1
- (no CPE)range: < 5.3.18-150300.59.164.1
- (no CPE)range: < 5.3.18-150300.59.164.1
- (no CPE)range: < 5.3.18-150300.59.164.1
- (no CPE)range: < 5.3.18-150300.172.1
- (no CPE)range: < 5.3.18-150300.172.1
- (no CPE)range: < 5.3.18-150300.59.164.1
- (no CPE)range: < 5.3.18-150300.59.164.1
- (no CPE)range: < 5.3.18-150300.59.164.1
- (no CPE)range: < 5.3.18-150300.59.164.1
- (no CPE)range: < 5.3.18-150300.172.1
- (no CPE)range: < 5.3.18-150300.172.1
- (no CPE)range: < 5.3.18-150300.59.164.1
- (no CPE)range: < 5.3.18-150300.59.164.1
- (no CPE)range: < 5.3.18-150300.59.164.1
- (no CPE)range: < 5.3.18-150300.59.164.1
- (no CPE)range: < 5.3.18-150300.59.164.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
9- git.kernel.org/stable/c/3bb27e27240289b47d3466f647a55c567adbdc3amitre
- git.kernel.org/stable/c/42f102ea1943ecb10a0756bf75424de5d1d5beedmitre
- git.kernel.org/stable/c/49def1b0644892e3b113673c13d650c3060b43bcmitre
- git.kernel.org/stable/c/745c9a59422c63f661f4374ed5181740db4130a1mitre
- git.kernel.org/stable/c/7bde24bde490f3139eee147efc6d60d6040fe975mitre
- git.kernel.org/stable/c/8018936950360f1c503bb385e158cfc5e4945d18mitre
- git.kernel.org/stable/c/9d574f985fe33efd6911f4d752de6f485a1ea732mitre
- git.kernel.org/stable/c/a21e5cb1a64c904f1f0ef7b2d386fc7d2b1d2ce2mitre
- git.kernel.org/stable/c/aff8d95b69051d0cf4acc3d91f22299fdbb9dfb3mitre
News mentions
0No linked articles in our index yet.