Skip to main content

CVE-2021-47176: Vulnerability in Linux Linux

High
VulnerabilityCVE-2021-47176cvecve-2021-47176
Published: Mon Mar 25 2024 (03/25/2024, 09:16:26 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: s390/dasd: add missing discipline function Fix crash with illegal operation exception in dasd_device_tasklet. Commit b72949328869 ("s390/dasd: Prepare for additional path event handling") renamed the verify_path function for ECKD but not for FBA and DIAG. This leads to a panic when the path verification function is called for a FBA or DIAG device. Fix by defining a wrapper function for dasd_generic_verify_path().

AI-Powered Analysis

AILast updated: 06/26/2025, 18:07:39 UTC

Technical Analysis

CVE-2021-47176 is a vulnerability identified in the Linux kernel specifically affecting the s390 architecture's DASD (Direct Access Storage Device) subsystem. The issue arises from a missing discipline function related to path verification for certain DASD device types, namely FBA (Fixed Block Architecture) and DIAG devices. A recent commit (b72949328869) renamed the verify_path function for ECKD (Extended Count Key Data) devices but failed to apply the same change for FBA and DIAG devices. This discrepancy causes the kernel to invoke an undefined or incorrect path verification function when handling FBA or DIAG devices, leading to an illegal operation exception and ultimately a kernel panic (system crash). The vulnerability is rooted in the kernel's device tasklet code for DASD, which is responsible for managing device-specific operations asynchronously. The fix involved defining a wrapper function for dasd_generic_verify_path(), ensuring that path verification is correctly handled for all DASD device types, preventing the panic condition. This vulnerability is specific to the s390 architecture, which is IBM's mainframe platform, and affects certain Linux kernel versions containing the faulty commit. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet. The vulnerability impacts system stability and availability by causing kernel panics, which can lead to denial of service on affected systems.

Potential Impact

For European organizations, the impact of CVE-2021-47176 is primarily related to availability and operational continuity, especially for those utilizing IBM mainframe systems running Linux on s390 architecture. Organizations relying on DASD devices for critical storage operations could experience unexpected system crashes, leading to downtime and potential disruption of business-critical applications. This could affect sectors such as finance, government, and large enterprises where IBM mainframes are prevalent. Although the vulnerability does not directly compromise confidentiality or integrity, repeated kernel panics may result in data loss or corruption if systems are not properly shut down or if storage operations are interrupted. The lack of known exploits reduces immediate risk, but the potential for denial of service and operational disruption remains significant for affected environments. European organizations with legacy or specialized infrastructure using s390 Linux kernels must prioritize patching to maintain system stability and avoid costly downtime.

Mitigation Recommendations

To mitigate CVE-2021-47176, organizations should: 1) Identify all Linux systems running on the s390 architecture, particularly those utilizing DASD devices with FBA or DIAG types. 2) Apply the official Linux kernel patches that include the fix for this vulnerability, specifically the commit that adds the wrapper function for dasd_generic_verify_path(). 3) Test patches in a controlled environment before deployment to ensure compatibility and stability. 4) Implement monitoring to detect kernel panics or unusual DASD device errors that could indicate attempts to trigger this vulnerability. 5) Maintain regular backups and ensure disaster recovery plans are in place to mitigate potential data loss from unexpected crashes. 6) Engage with hardware and software vendors for additional guidance and updates related to s390 Linux kernel security. 7) Limit access to s390 systems to trusted administrators and restrict user permissions to reduce the risk of accidental or malicious triggering of the vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-03-25T09:12:14.112Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9835c4522896dcbe9f8b

Added to database: 5/21/2025, 9:09:09 AM

Last enriched: 6/26/2025, 6:07:39 PM

Last updated: 8/11/2025, 2:06:05 AM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats