CVE-2021-47176: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: s390/dasd: add missing discipline function Fix crash with illegal operation exception in dasd_device_tasklet. Commit b72949328869 ("s390/dasd: Prepare for additional path event handling") renamed the verify_path function for ECKD but not for FBA and DIAG. This leads to a panic when the path verification function is called for a FBA or DIAG device. Fix by defining a wrapper function for dasd_generic_verify_path().
AI Analysis
Technical Summary
CVE-2021-47176 is a vulnerability identified in the Linux kernel specifically affecting the s390 architecture's DASD (Direct Access Storage Device) subsystem. The issue arises from a missing discipline function related to path verification for certain DASD device types, namely FBA (Fixed Block Architecture) and DIAG devices. A recent commit (b72949328869) renamed the verify_path function for ECKD (Extended Count Key Data) devices but failed to apply the same change for FBA and DIAG devices. This discrepancy causes the kernel to invoke an undefined or incorrect path verification function when handling FBA or DIAG devices, leading to an illegal operation exception and ultimately a kernel panic (system crash). The vulnerability is rooted in the kernel's device tasklet code for DASD, which is responsible for managing device-specific operations asynchronously. The fix involved defining a wrapper function for dasd_generic_verify_path(), ensuring that path verification is correctly handled for all DASD device types, preventing the panic condition. This vulnerability is specific to the s390 architecture, which is IBM's mainframe platform, and affects certain Linux kernel versions containing the faulty commit. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet. The vulnerability impacts system stability and availability by causing kernel panics, which can lead to denial of service on affected systems.
Potential Impact
For European organizations, the impact of CVE-2021-47176 is primarily related to availability and operational continuity, especially for those utilizing IBM mainframe systems running Linux on s390 architecture. Organizations relying on DASD devices for critical storage operations could experience unexpected system crashes, leading to downtime and potential disruption of business-critical applications. This could affect sectors such as finance, government, and large enterprises where IBM mainframes are prevalent. Although the vulnerability does not directly compromise confidentiality or integrity, repeated kernel panics may result in data loss or corruption if systems are not properly shut down or if storage operations are interrupted. The lack of known exploits reduces immediate risk, but the potential for denial of service and operational disruption remains significant for affected environments. European organizations with legacy or specialized infrastructure using s390 Linux kernels must prioritize patching to maintain system stability and avoid costly downtime.
Mitigation Recommendations
To mitigate CVE-2021-47176, organizations should: 1) Identify all Linux systems running on the s390 architecture, particularly those utilizing DASD devices with FBA or DIAG types. 2) Apply the official Linux kernel patches that include the fix for this vulnerability, specifically the commit that adds the wrapper function for dasd_generic_verify_path(). 3) Test patches in a controlled environment before deployment to ensure compatibility and stability. 4) Implement monitoring to detect kernel panics or unusual DASD device errors that could indicate attempts to trigger this vulnerability. 5) Maintain regular backups and ensure disaster recovery plans are in place to mitigate potential data loss from unexpected crashes. 6) Engage with hardware and software vendors for additional guidance and updates related to s390 Linux kernel security. 7) Limit access to s390 systems to trusted administrators and restrict user permissions to reduce the risk of accidental or malicious triggering of the vulnerability.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy
CVE-2021-47176: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: s390/dasd: add missing discipline function Fix crash with illegal operation exception in dasd_device_tasklet. Commit b72949328869 ("s390/dasd: Prepare for additional path event handling") renamed the verify_path function for ECKD but not for FBA and DIAG. This leads to a panic when the path verification function is called for a FBA or DIAG device. Fix by defining a wrapper function for dasd_generic_verify_path().
AI-Powered Analysis
Technical Analysis
CVE-2021-47176 is a vulnerability identified in the Linux kernel specifically affecting the s390 architecture's DASD (Direct Access Storage Device) subsystem. The issue arises from a missing discipline function related to path verification for certain DASD device types, namely FBA (Fixed Block Architecture) and DIAG devices. A recent commit (b72949328869) renamed the verify_path function for ECKD (Extended Count Key Data) devices but failed to apply the same change for FBA and DIAG devices. This discrepancy causes the kernel to invoke an undefined or incorrect path verification function when handling FBA or DIAG devices, leading to an illegal operation exception and ultimately a kernel panic (system crash). The vulnerability is rooted in the kernel's device tasklet code for DASD, which is responsible for managing device-specific operations asynchronously. The fix involved defining a wrapper function for dasd_generic_verify_path(), ensuring that path verification is correctly handled for all DASD device types, preventing the panic condition. This vulnerability is specific to the s390 architecture, which is IBM's mainframe platform, and affects certain Linux kernel versions containing the faulty commit. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet. The vulnerability impacts system stability and availability by causing kernel panics, which can lead to denial of service on affected systems.
Potential Impact
For European organizations, the impact of CVE-2021-47176 is primarily related to availability and operational continuity, especially for those utilizing IBM mainframe systems running Linux on s390 architecture. Organizations relying on DASD devices for critical storage operations could experience unexpected system crashes, leading to downtime and potential disruption of business-critical applications. This could affect sectors such as finance, government, and large enterprises where IBM mainframes are prevalent. Although the vulnerability does not directly compromise confidentiality or integrity, repeated kernel panics may result in data loss or corruption if systems are not properly shut down or if storage operations are interrupted. The lack of known exploits reduces immediate risk, but the potential for denial of service and operational disruption remains significant for affected environments. European organizations with legacy or specialized infrastructure using s390 Linux kernels must prioritize patching to maintain system stability and avoid costly downtime.
Mitigation Recommendations
To mitigate CVE-2021-47176, organizations should: 1) Identify all Linux systems running on the s390 architecture, particularly those utilizing DASD devices with FBA or DIAG types. 2) Apply the official Linux kernel patches that include the fix for this vulnerability, specifically the commit that adds the wrapper function for dasd_generic_verify_path(). 3) Test patches in a controlled environment before deployment to ensure compatibility and stability. 4) Implement monitoring to detect kernel panics or unusual DASD device errors that could indicate attempts to trigger this vulnerability. 5) Maintain regular backups and ensure disaster recovery plans are in place to mitigate potential data loss from unexpected crashes. 6) Engage with hardware and software vendors for additional guidance and updates related to s390 Linux kernel security. 7) Limit access to s390 systems to trusted administrators and restrict user permissions to reduce the risk of accidental or malicious triggering of the vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-03-25T09:12:14.112Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9835c4522896dcbe9f8b
Added to database: 5/21/2025, 9:09:09 AM
Last enriched: 6/26/2025, 6:07:39 PM
Last updated: 8/11/2025, 2:06:05 AM
Views: 14
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.