CVE-2021-47406: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: ext4: add error checking to ext4_ext_replay_set_iblocks() If the call to ext4_map_blocks() fails due to an corrupted file system, ext4_ext_replay_set_iblocks() can get stuck in an infinite loop. This could be reproduced by running generic/526 with a file system that has inline_data and fast_commit enabled. The system will repeatedly log to the console: EXT4-fs warning (device dm-3): ext4_block_to_path:105: block 1074800922 > max in inode 131076 and the stack that it gets stuck in is: ext4_block_to_path+0xe3/0x130 ext4_ind_map_blocks+0x93/0x690 ext4_map_blocks+0x100/0x660 skip_hole+0x47/0x70 ext4_ext_replay_set_iblocks+0x223/0x440 ext4_fc_replay_inode+0x29e/0x3b0 ext4_fc_replay+0x278/0x550 do_one_pass+0x646/0xc10 jbd2_journal_recover+0x14a/0x270 jbd2_journal_load+0xc4/0x150 ext4_load_journal+0x1f3/0x490 ext4_fill_super+0x22d4/0x2c00 With this patch, generic/526 still fails, but system is no longer locking up in a tight loop. It's likely the root casue is that fast_commit replay is corrupting file systems with inline_data, and we probably need to add better error handling in the fast commit replay code path beyond what is done here, which essentially just breaks the infinite loop without reporting the to the higher levels of the code.
AI Analysis
Technical Summary
CVE-2021-47406 is a vulnerability in the Linux kernel's ext4 filesystem implementation, specifically related to the ext4_ext_replay_set_iblocks() function. This function is involved in replaying ext4 journaling operations during filesystem recovery. The vulnerability arises when ext4_map_blocks() fails due to a corrupted filesystem, particularly one with inline_data and fast_commit features enabled. In such cases, ext4_ext_replay_set_iblocks() can enter an infinite loop, causing the system to repeatedly log warnings and become unresponsive or stuck in a tight loop. The issue is rooted in insufficient error handling during the fast_commit replay process, which corrupts filesystems with inline_data. The patch applied breaks the infinite loop but does not fully address the root cause, indicating that further improvements in error handling are needed. The vulnerability has a CVSS 3.1 score of 5.5 (medium severity), with an attack vector of local access, low complexity, requiring privileges but no user interaction, and impacts availability by causing denial of service through system hang or lockup. No known exploits are currently reported in the wild.
Potential Impact
For European organizations, this vulnerability primarily poses a risk of denial of service (DoS) on Linux systems using ext4 filesystems with inline_data and fast_commit enabled. Systems affected may become unresponsive or stuck during filesystem recovery, potentially leading to downtime or disruption of critical services. This can impact servers, workstations, or embedded devices running vulnerable Linux kernel versions. Organizations relying on ext4 for storage, especially those using advanced filesystem features like fast_commit for performance, may experience operational interruptions. While the vulnerability does not compromise confidentiality or integrity directly, the availability impact can affect business continuity, particularly in sectors with high uptime requirements such as finance, healthcare, and critical infrastructure. Additionally, recovery from such a hang may require manual intervention or system reboot, increasing operational overhead.
Mitigation Recommendations
European organizations should ensure that all Linux systems are updated with the latest kernel patches that address CVE-2021-47406. Specifically, they should: 1) Apply kernel updates from trusted Linux distributions that include the fix for this vulnerability. 2) Audit systems to identify those using ext4 filesystems with inline_data and fast_commit enabled, and consider disabling fast_commit if immediate patching is not feasible. 3) Implement monitoring for ext4 filesystem warnings and system logs that indicate ext4_block_to_path errors or repeated journaling warnings to detect potential exploitation attempts or filesystem corruption early. 4) Maintain regular filesystem integrity checks and backups to recover from corruption scenarios. 5) For critical systems, consider deploying kernel live patching solutions to minimize downtime during patch application. 6) Educate system administrators about the symptoms of this vulnerability to enable rapid response. These steps go beyond generic advice by focusing on configuration auditing, proactive monitoring, and operational readiness specific to ext4 and this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Poland, Italy, Spain
CVE-2021-47406: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: ext4: add error checking to ext4_ext_replay_set_iblocks() If the call to ext4_map_blocks() fails due to an corrupted file system, ext4_ext_replay_set_iblocks() can get stuck in an infinite loop. This could be reproduced by running generic/526 with a file system that has inline_data and fast_commit enabled. The system will repeatedly log to the console: EXT4-fs warning (device dm-3): ext4_block_to_path:105: block 1074800922 > max in inode 131076 and the stack that it gets stuck in is: ext4_block_to_path+0xe3/0x130 ext4_ind_map_blocks+0x93/0x690 ext4_map_blocks+0x100/0x660 skip_hole+0x47/0x70 ext4_ext_replay_set_iblocks+0x223/0x440 ext4_fc_replay_inode+0x29e/0x3b0 ext4_fc_replay+0x278/0x550 do_one_pass+0x646/0xc10 jbd2_journal_recover+0x14a/0x270 jbd2_journal_load+0xc4/0x150 ext4_load_journal+0x1f3/0x490 ext4_fill_super+0x22d4/0x2c00 With this patch, generic/526 still fails, but system is no longer locking up in a tight loop. It's likely the root casue is that fast_commit replay is corrupting file systems with inline_data, and we probably need to add better error handling in the fast commit replay code path beyond what is done here, which essentially just breaks the infinite loop without reporting the to the higher levels of the code.
AI-Powered Analysis
Technical Analysis
CVE-2021-47406 is a vulnerability in the Linux kernel's ext4 filesystem implementation, specifically related to the ext4_ext_replay_set_iblocks() function. This function is involved in replaying ext4 journaling operations during filesystem recovery. The vulnerability arises when ext4_map_blocks() fails due to a corrupted filesystem, particularly one with inline_data and fast_commit features enabled. In such cases, ext4_ext_replay_set_iblocks() can enter an infinite loop, causing the system to repeatedly log warnings and become unresponsive or stuck in a tight loop. The issue is rooted in insufficient error handling during the fast_commit replay process, which corrupts filesystems with inline_data. The patch applied breaks the infinite loop but does not fully address the root cause, indicating that further improvements in error handling are needed. The vulnerability has a CVSS 3.1 score of 5.5 (medium severity), with an attack vector of local access, low complexity, requiring privileges but no user interaction, and impacts availability by causing denial of service through system hang or lockup. No known exploits are currently reported in the wild.
Potential Impact
For European organizations, this vulnerability primarily poses a risk of denial of service (DoS) on Linux systems using ext4 filesystems with inline_data and fast_commit enabled. Systems affected may become unresponsive or stuck during filesystem recovery, potentially leading to downtime or disruption of critical services. This can impact servers, workstations, or embedded devices running vulnerable Linux kernel versions. Organizations relying on ext4 for storage, especially those using advanced filesystem features like fast_commit for performance, may experience operational interruptions. While the vulnerability does not compromise confidentiality or integrity directly, the availability impact can affect business continuity, particularly in sectors with high uptime requirements such as finance, healthcare, and critical infrastructure. Additionally, recovery from such a hang may require manual intervention or system reboot, increasing operational overhead.
Mitigation Recommendations
European organizations should ensure that all Linux systems are updated with the latest kernel patches that address CVE-2021-47406. Specifically, they should: 1) Apply kernel updates from trusted Linux distributions that include the fix for this vulnerability. 2) Audit systems to identify those using ext4 filesystems with inline_data and fast_commit enabled, and consider disabling fast_commit if immediate patching is not feasible. 3) Implement monitoring for ext4 filesystem warnings and system logs that indicate ext4_block_to_path errors or repeated journaling warnings to detect potential exploitation attempts or filesystem corruption early. 4) Maintain regular filesystem integrity checks and backups to recover from corruption scenarios. 5) For critical systems, consider deploying kernel live patching solutions to minimize downtime during patch application. 6) Educate system administrators about the symptoms of this vulnerability to enable rapid response. These steps go beyond generic advice by focusing on configuration auditing, proactive monitoring, and operational readiness specific to ext4 and this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-05-21T14:58:30.817Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9833c4522896dcbe9058
Added to database: 5/21/2025, 9:09:07 AM
Last enriched: 6/30/2025, 12:27:20 PM
Last updated: 7/28/2025, 2:52:42 AM
Views: 8
Related Threats
CVE-2025-8762: Improper Physical Access Control in INSTAR 2K+
HighCVE-2025-8761: Denial of Service in INSTAR 2K+
HighCVE-2025-8760: Buffer Overflow in INSTAR 2K+
CriticalCVE-2025-6715: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in LatePoint
CriticalCVE-2025-7384: CWE-502 Deserialization of Untrusted Data in crmperks Database for Contact Form 7, WPforms, Elementor forms
CriticalActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.