blob: 47593c7683fa60ff63a1a7fc9f31552b850a7933 [file] [log] [blame]
{
"containers": {
"cna": {
"providerMetadata": {
"orgId": "f4215fc3-5b6b-47ff-a258-f7189bd81038"
},
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: fix check to prevent false positive report of incorrect used inodes\n\nCommit <50122847007> (\"ext4: fix check to prevent initializing reserved\ninodes\") check the block group zero and prevent initializing reserved\ninodes. But in some special cases, the reserved inode may not all belong\nto the group zero, it may exist into the second group if we format\nfilesystem below.\n\n mkfs.ext4 -b 4096 -g 8192 -N 1024 -I 4096 /dev/sda\n\nSo, it will end up triggering a false positive report of a corrupted\nfile system. This patch fix it by avoid check reserved inodes if no free\ninode blocks will be zeroed."
}
],
"affected": [
{
"product": "Linux",
"vendor": "Linux",
"defaultStatus": "unaffected",
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
"version": "7736fcede789",
"lessThan": "539ba4ebc467",
"status": "affected",
"versionType": "git"
},
{
"version": "954e572ae2f2",
"lessThan": "d2e121be8d31",
"status": "affected",
"versionType": "git"
},
{
"version": "f547aa20b4f6",
"lessThan": "e70db6e43286",
"status": "affected",
"versionType": "git"
},
{
"version": "50122847007",
"lessThan": "7687f5aba0f5",
"status": "affected",
"versionType": "git"
},
{
"version": "50122847007",
"lessThan": "9c61387630a5",
"status": "affected",
"versionType": "git"
},
{
"version": "50122847007",
"lessThan": "098b257563b9",
"status": "affected",
"versionType": "git"
},
{
"version": "50122847007",
"lessThan": "f42789ee5f96",
"status": "affected",
"versionType": "git"
},
{
"version": "50122847007",
"lessThan": "e18d76a12b34",
"status": "affected",
"versionType": "git"
},
{
"version": "50122847007",
"lessThan": "a149d2a5cabb",
"status": "affected",
"versionType": "git"
}
]
},
{
"product": "Linux",
"vendor": "Linux",
"defaultStatus": "affected",
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
"version": "4.4.269",
"lessThanOrEqual": "4.4.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "4.9.269",
"lessThanOrEqual": "4.9.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "4.14.233",
"lessThanOrEqual": "4.14.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "4.19.191",
"lessThanOrEqual": "4.19.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.4.118",
"lessThanOrEqual": "5.4.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.10.36",
"lessThanOrEqual": "5.10.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.11.20",
"lessThanOrEqual": "5.11.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.12.3",
"lessThanOrEqual": "5.12.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.13",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/539ba4ebc467260225898e67ea53cbb73308f894"
},
{
"url": "https://git.kernel.org/stable/c/d2e121be8d318524a61e13ca15b5bfab2d0b63c7"
},
{
"url": "https://git.kernel.org/stable/c/e70db6e43286a17c3dfc840fcee662de183b6a81"
},
{
"url": "https://git.kernel.org/stable/c/7687f5aba0f50c7ff8040e506bae184e59c8e7b8"
},
{
"url": "https://git.kernel.org/stable/c/9c61387630a54e35b96a90608aafd369ffb86f39"
},
{
"url": "https://git.kernel.org/stable/c/098b257563b959f4ca6c1d82fde0ee727792cb19"
},
{
"url": "https://git.kernel.org/stable/c/f42789ee5f96743cdb5f69445cab3609458733f7"
},
{
"url": "https://git.kernel.org/stable/c/e18d76a12b34791bc0318a0e0c0fa5863cd8dabf"
},
{
"url": "https://git.kernel.org/stable/c/a149d2a5cabbf6507a7832a1c4fd2593c55fd450"
}
],
"title": "ext4: fix check to prevent false positive report of incorrect used inodes",
"x_generator": {
"engine": "bippy-c298863b1525"
}
}
},
"cveMetadata": {
"assignerOrgId": "f4215fc3-5b6b-47ff-a258-f7189bd81038",
"cveID": "CVE-2021-46946",
"requesterUserId": "gregkh@kernel.org",
"serial": "1",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.0"
}