Skip to main content

CVE-2021-47007: Vulnerability in Linux Linux

High
VulnerabilityCVE-2021-47007cvecve-2021-47007
Published: Wed Feb 28 2024 (02/28/2024, 08:13:27 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: f2fs: fix panic during f2fs_resize_fs() f2fs_resize_fs() hangs in below callstack with testcase: - mkfs 16GB image & mount image - dd 8GB fileA - dd 8GB fileB - sync - rm fileA - sync - resize filesystem to 8GB kernel BUG at segment.c:2484! Call Trace: allocate_segment_by_default+0x92/0xf0 [f2fs] f2fs_allocate_data_block+0x44b/0x7e0 [f2fs] do_write_page+0x5a/0x110 [f2fs] f2fs_outplace_write_data+0x55/0x100 [f2fs] f2fs_do_write_data_page+0x392/0x850 [f2fs] move_data_page+0x233/0x320 [f2fs] do_garbage_collect+0x14d9/0x1660 [f2fs] free_segment_range+0x1f7/0x310 [f2fs] f2fs_resize_fs+0x118/0x330 [f2fs] __f2fs_ioctl+0x487/0x3680 [f2fs] __x64_sys_ioctl+0x8e/0xd0 do_syscall_64+0x33/0x80 entry_SYSCALL_64_after_hwframe+0x44/0xa9 The root cause is we forgot to check that whether we have enough space in resized filesystem to store all valid blocks in before-resizing filesystem, then allocator will run out-of-space during block migration in free_segment_range().

AI-Powered Analysis

AILast updated: 06/30/2025, 19:11:37 UTC

Technical Analysis

CVE-2021-47007 is a vulnerability identified in the Linux kernel's f2fs (Flash-Friendly File System) implementation, specifically within the f2fs_resize_fs() function. The vulnerability arises due to a missing check for sufficient space in the resized filesystem before migrating valid data blocks during a filesystem resize operation. When resizing the filesystem to a smaller size, the allocator may run out of space during block migration in the free_segment_range() function, leading to a kernel panic or system hang. The issue manifests under a specific sequence of operations: creating a 16GB f2fs image, mounting it, writing two 8GB files, syncing, deleting one file, syncing again, and then resizing the filesystem to 8GB. The root cause is the failure to verify that the resized filesystem can accommodate all valid blocks from the original size, causing the allocator to exhaust available space and triggering a kernel BUG at segment.c:2484. This vulnerability can cause denial of service (DoS) by crashing or hanging the system during filesystem resize operations. No known exploits are reported in the wild, and the vulnerability requires specific conditions and operations to be triggered, typically involving administrative privileges to perform filesystem resizing. The vulnerability affects Linux kernel versions identified by the commit hash b4b10061ef98c583bcf82a4200703fbaa98c18dc and likely related versions around that commit. No CVSS score is assigned yet, and no patches or exploit code are currently publicly available.

Potential Impact

For European organizations, this vulnerability primarily poses a risk of denial of service on systems using the f2fs filesystem, which is optimized for flash storage devices. Organizations relying on Linux servers or embedded systems with f2fs, especially those performing dynamic filesystem resizing, could experience system crashes or hangs, leading to service interruptions. This could impact data availability and operational continuity, particularly in environments with flash-based storage such as IoT devices, edge computing nodes, or specialized storage appliances. While the vulnerability does not directly expose confidentiality or integrity risks, the resulting system instability could disrupt critical services or maintenance operations. The requirement for administrative privileges to trigger the vulnerability limits the risk of remote exploitation but does not eliminate the threat from insider misuse or misconfigured automated processes. European organizations with Linux-based infrastructure should be aware of this vulnerability to avoid unexpected downtime and ensure system reliability.

Mitigation Recommendations

To mitigate this vulnerability, organizations should: 1) Avoid resizing f2fs filesystems on affected Linux kernel versions until a patch is applied. 2) Monitor Linux kernel updates and apply security patches promptly once available from trusted sources or Linux distributions. 3) Implement strict access controls to limit filesystem resize operations to trusted administrators only. 4) Use alternative filesystems for critical systems where dynamic resizing is required and f2fs is not essential. 5) Test filesystem resize operations in controlled environments before deploying in production to detect potential issues. 6) Maintain regular backups of critical data to enable recovery in case of system crashes caused by this vulnerability. 7) Monitor system logs for kernel panics or unusual filesystem errors that may indicate attempted exploitation or accidental triggering of the vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-02-27T18:42:55.952Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9834c4522896dcbe9a33

Added to database: 5/21/2025, 9:09:08 AM

Last enriched: 6/30/2025, 7:11:37 PM

Last updated: 8/9/2025, 6:34:40 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats