CVE-2021-47167: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: NFS: Fix an Oopsable condition in __nfs_pageio_add_request() Ensure that nfs_pageio_error_cleanup() resets the mirror array contents, so that the structure reflects the fact that it is now empty. Also change the test in nfs_pageio_do_add_request() to be more robust by checking whether or not the list is empty rather than relying on the value of pg_count.
AI Analysis
Technical Summary
CVE-2021-47167 is a vulnerability identified in the Linux kernel's implementation of the Network File System (NFS), specifically within the __nfs_pageio_add_request() function. The issue arises due to improper handling of the mirror array contents during error cleanup in nfs_pageio_error_cleanup(). The vulnerability manifests as an 'Oopsable' condition, meaning it can cause the kernel to crash (kernel oops) due to inconsistent internal state management. The root cause is that the mirror array contents were not properly reset after an error, leading to stale or invalid data being referenced. Additionally, the check in nfs_pageio_do_add_request() relied on the pg_count value, which could be unreliable; the fix involves changing this test to verify if the list is empty instead, making the check more robust. This vulnerability affects certain versions of the Linux kernel identified by the commit hash a7d42ddb3099727f58366fa006f850a219cce6c8. Although no known exploits are reported in the wild, the vulnerability could be triggered by malicious or malformed NFS requests, potentially causing denial of service through kernel crashes. The vulnerability does not require user interaction but does require access to the NFS subsystem, which may be exposed in networked environments. The patch involves resetting the mirror array contents properly during error cleanup and improving the robustness of the request addition logic.
Potential Impact
For European organizations, the impact of CVE-2021-47167 primarily concerns availability and system stability. Since the vulnerability can cause kernel crashes, systems acting as NFS clients or servers could experience denial of service, disrupting file sharing and critical operations dependent on NFS. This is particularly significant for enterprises and public sector organizations relying on Linux-based infrastructure for storage and network file systems. The disruption could affect data availability, leading to operational downtime and potential loss of productivity. While confidentiality and integrity impacts are not directly indicated, the instability could be leveraged as part of a broader attack chain. Given the widespread use of Linux in European data centers, cloud environments, and embedded systems, the vulnerability poses a moderate risk. However, the lack of known exploits and the requirement for NFS access somewhat limit the attack surface. Organizations with exposed NFS services or those using NFS in multi-tenant environments should be particularly vigilant.
Mitigation Recommendations
European organizations should prioritize applying the official Linux kernel patches that address CVE-2021-47167 as soon as they are available. Until patched, organizations should restrict access to NFS services by implementing strict network segmentation and firewall rules to limit NFS traffic to trusted hosts only. Monitoring kernel logs for Oops or crash messages related to NFS can help detect exploitation attempts. Additionally, disabling or limiting NFS usage where feasible, especially on systems exposed to untrusted networks, reduces risk. For environments where patching is delayed, consider deploying kernel crash recovery mechanisms and ensuring robust backup and failover strategies to minimize downtime. Security teams should also review NFS configurations to enforce authentication and encryption where supported, reducing the risk of unauthorized access. Finally, maintain up-to-date inventory of Linux kernel versions in use to identify vulnerable systems promptly.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2021-47167: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: NFS: Fix an Oopsable condition in __nfs_pageio_add_request() Ensure that nfs_pageio_error_cleanup() resets the mirror array contents, so that the structure reflects the fact that it is now empty. Also change the test in nfs_pageio_do_add_request() to be more robust by checking whether or not the list is empty rather than relying on the value of pg_count.
AI-Powered Analysis
Technical Analysis
CVE-2021-47167 is a vulnerability identified in the Linux kernel's implementation of the Network File System (NFS), specifically within the __nfs_pageio_add_request() function. The issue arises due to improper handling of the mirror array contents during error cleanup in nfs_pageio_error_cleanup(). The vulnerability manifests as an 'Oopsable' condition, meaning it can cause the kernel to crash (kernel oops) due to inconsistent internal state management. The root cause is that the mirror array contents were not properly reset after an error, leading to stale or invalid data being referenced. Additionally, the check in nfs_pageio_do_add_request() relied on the pg_count value, which could be unreliable; the fix involves changing this test to verify if the list is empty instead, making the check more robust. This vulnerability affects certain versions of the Linux kernel identified by the commit hash a7d42ddb3099727f58366fa006f850a219cce6c8. Although no known exploits are reported in the wild, the vulnerability could be triggered by malicious or malformed NFS requests, potentially causing denial of service through kernel crashes. The vulnerability does not require user interaction but does require access to the NFS subsystem, which may be exposed in networked environments. The patch involves resetting the mirror array contents properly during error cleanup and improving the robustness of the request addition logic.
Potential Impact
For European organizations, the impact of CVE-2021-47167 primarily concerns availability and system stability. Since the vulnerability can cause kernel crashes, systems acting as NFS clients or servers could experience denial of service, disrupting file sharing and critical operations dependent on NFS. This is particularly significant for enterprises and public sector organizations relying on Linux-based infrastructure for storage and network file systems. The disruption could affect data availability, leading to operational downtime and potential loss of productivity. While confidentiality and integrity impacts are not directly indicated, the instability could be leveraged as part of a broader attack chain. Given the widespread use of Linux in European data centers, cloud environments, and embedded systems, the vulnerability poses a moderate risk. However, the lack of known exploits and the requirement for NFS access somewhat limit the attack surface. Organizations with exposed NFS services or those using NFS in multi-tenant environments should be particularly vigilant.
Mitigation Recommendations
European organizations should prioritize applying the official Linux kernel patches that address CVE-2021-47167 as soon as they are available. Until patched, organizations should restrict access to NFS services by implementing strict network segmentation and firewall rules to limit NFS traffic to trusted hosts only. Monitoring kernel logs for Oops or crash messages related to NFS can help detect exploitation attempts. Additionally, disabling or limiting NFS usage where feasible, especially on systems exposed to untrusted networks, reduces risk. For environments where patching is delayed, consider deploying kernel crash recovery mechanisms and ensuring robust backup and failover strategies to minimize downtime. Security teams should also review NFS configurations to enforce authentication and encryption where supported, reducing the risk of unauthorized access. Finally, maintain up-to-date inventory of Linux kernel versions in use to identify vulnerable systems promptly.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-03-25T09:12:14.111Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9835c4522896dcbe9f38
Added to database: 5/21/2025, 9:09:09 AM
Last enriched: 6/26/2025, 6:35:35 PM
Last updated: 8/8/2025, 10:16:07 AM
Views: 15
Related Threats
CVE-2025-36023: CWE-639 Authorization Bypass Through User-Controlled Key in IBM Cloud Pak for Business Automation
MediumCVE-2025-8730: Hard-coded Credentials in Belkin F9K1009
CriticalCVE-2025-36119: CWE-290 Authentication Bypass by Spoofing
HighCVE-2025-22963: CWE-352 Cross-Site Request Forgery (CSRF) in Sismics Teedy
HighCVE-2025-8729: Path Traversal in MigoXLab LMeterX
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.