CVE-2021-46950

In the Linux kernel, the following vulnerability has been resolved: md/raid1: properly indicate failure when ending a failed write request This patch addresses a data corruption bug in raid1 arrays using bitmaps. Without this fix, the bitmap bits for the failed I/O end up being cleared. Since we are in the failure leg of raid1_end_write_request, the request either needs to be retried (R1BIO_WriteError) or failed (R1BIO_Degraded).
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

21 Nov 2024, 06:35

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/12216d0919b64ee2ea5dc7a50e455670f44383d5 - Patch () https://git.kernel.org/stable/c/12216d0919b64ee2ea5dc7a50e455670f44383d5 - Patch
References () https://git.kernel.org/stable/c/2417b9869b81882ab90fd5ed1081a1cb2d4db1dd - Patch () https://git.kernel.org/stable/c/2417b9869b81882ab90fd5ed1081a1cb2d4db1dd - Patch
References () https://git.kernel.org/stable/c/538244fba59fde17186322776247cd9c05be86dd - Patch () https://git.kernel.org/stable/c/538244fba59fde17186322776247cd9c05be86dd - Patch
References () https://git.kernel.org/stable/c/59452e551784b7a57a45d971727e9db63b192515 - Patch () https://git.kernel.org/stable/c/59452e551784b7a57a45d971727e9db63b192515 - Patch
References () https://git.kernel.org/stable/c/661061a45e32d8b2cc0e306da9f169ad44011382 - Patch () https://git.kernel.org/stable/c/661061a45e32d8b2cc0e306da9f169ad44011382 - Patch
References () https://git.kernel.org/stable/c/6920cef604fa57f9409e3960413e9cc11f5c5a40 - Patch () https://git.kernel.org/stable/c/6920cef604fa57f9409e3960413e9cc11f5c5a40 - Patch
References () https://git.kernel.org/stable/c/a6e17cab00fc5bf85472434c52ac751426257c6f - Patch () https://git.kernel.org/stable/c/a6e17cab00fc5bf85472434c52ac751426257c6f - Patch

10 Apr 2024, 20:13

Type Values Removed Values Added
First Time Linux
Linux linux Kernel
CWE NVD-CWE-noinfo
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
References () https://git.kernel.org/stable/c/12216d0919b64ee2ea5dc7a50e455670f44383d5 - () https://git.kernel.org/stable/c/12216d0919b64ee2ea5dc7a50e455670f44383d5 - Patch
References () https://git.kernel.org/stable/c/2417b9869b81882ab90fd5ed1081a1cb2d4db1dd - () https://git.kernel.org/stable/c/2417b9869b81882ab90fd5ed1081a1cb2d4db1dd - Patch
References () https://git.kernel.org/stable/c/538244fba59fde17186322776247cd9c05be86dd - () https://git.kernel.org/stable/c/538244fba59fde17186322776247cd9c05be86dd - Patch
References () https://git.kernel.org/stable/c/59452e551784b7a57a45d971727e9db63b192515 - () https://git.kernel.org/stable/c/59452e551784b7a57a45d971727e9db63b192515 - Patch
References () https://git.kernel.org/stable/c/661061a45e32d8b2cc0e306da9f169ad44011382 - () https://git.kernel.org/stable/c/661061a45e32d8b2cc0e306da9f169ad44011382 - Patch
References () https://git.kernel.org/stable/c/6920cef604fa57f9409e3960413e9cc11f5c5a40 - () https://git.kernel.org/stable/c/6920cef604fa57f9409e3960413e9cc11f5c5a40 - Patch
References () https://git.kernel.org/stable/c/a6e17cab00fc5bf85472434c52ac751426257c6f - () https://git.kernel.org/stable/c/a6e17cab00fc5bf85472434c52ac751426257c6f - Patch
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

27 Feb 2024, 19:04

Type Values Removed Values Added
New CVE

Information

Published : 2024-02-27 19:04

Updated : 2024-11-21 06:35


NVD link : CVE-2021-46950

Mitre link : CVE-2021-46950

CVE.ORG link : CVE-2021-46950


JSON object : View

Products Affected

linux

  • linux_kernel