cve-2021-47117
Vulnerability from cvelistv5
Published
2024-03-15 20:14
Modified
2024-12-19 07:35
Severity ?
Summary
In the Linux kernel, the following vulnerability has been resolved: ext4: fix bug on in ext4_es_cache_extent as ext4_split_extent_at failed We got follow bug_on when run fsstress with injecting IO fault: [130747.323114] kernel BUG at fs/ext4/extents_status.c:762! [130747.323117] Internal error: Oops - BUG: 0 [#1] SMP ...... [130747.334329] Call trace: [130747.334553] ext4_es_cache_extent+0x150/0x168 [ext4] [130747.334975] ext4_cache_extents+0x64/0xe8 [ext4] [130747.335368] ext4_find_extent+0x300/0x330 [ext4] [130747.335759] ext4_ext_map_blocks+0x74/0x1178 [ext4] [130747.336179] ext4_map_blocks+0x2f4/0x5f0 [ext4] [130747.336567] ext4_mpage_readpages+0x4a8/0x7a8 [ext4] [130747.336995] ext4_readpage+0x54/0x100 [ext4] [130747.337359] generic_file_buffered_read+0x410/0xae8 [130747.337767] generic_file_read_iter+0x114/0x190 [130747.338152] ext4_file_read_iter+0x5c/0x140 [ext4] [130747.338556] __vfs_read+0x11c/0x188 [130747.338851] vfs_read+0x94/0x150 [130747.339110] ksys_read+0x74/0xf0 This patch's modification is according to Jan Kara's suggestion in: https://patchwork.ozlabs.org/project/linux-ext4/patch/20210428085158.3728201-1-yebin10@huawei.com/ "I see. Now I understand your patch. Honestly, seeing how fragile is trying to fix extent tree after split has failed in the middle, I would probably go even further and make sure we fix the tree properly in case of ENOSPC and EDQUOT (those are easily user triggerable). Anything else indicates a HW problem or fs corruption so I'd rather leave the extent tree as is and don't try to fix it (which also means we will not create overlapping extents)."
References
416baaa9-dc9f-4396-8d5f-8c081fb06d67https://git.kernel.org/stable/c/082cd4ec240b8734a82a89ffb890216ac98fec68
416baaa9-dc9f-4396-8d5f-8c081fb06d67https://git.kernel.org/stable/c/48105dc98c9ca35af418746277b087cb2bc6df7c
416baaa9-dc9f-4396-8d5f-8c081fb06d67https://git.kernel.org/stable/c/569496aa3776eea1ff0d49d0174ac1b7e861e107
416baaa9-dc9f-4396-8d5f-8c081fb06d67https://git.kernel.org/stable/c/5b3a9a2be59478b013a430ac57b0f3d65471b071
416baaa9-dc9f-4396-8d5f-8c081fb06d67https://git.kernel.org/stable/c/920697b004e49cb026e2e15fe91be065bf0741b7
416baaa9-dc9f-4396-8d5f-8c081fb06d67https://git.kernel.org/stable/c/d3b668b96ad3192c0581a248ae2f596cd054792a
416baaa9-dc9f-4396-8d5f-8c081fb06d67https://git.kernel.org/stable/c/d8116743ef5432336289256b2f7c117299213eb9
416baaa9-dc9f-4396-8d5f-8c081fb06d67https://git.kernel.org/stable/c/e33bafad30d34cfa5e9787cb099cab05e2677fcb
af854a3a-2127-422b-91ae-364da2661108https://git.kernel.org/stable/c/082cd4ec240b8734a82a89ffb890216ac98fec68
af854a3a-2127-422b-91ae-364da2661108https://git.kernel.org/stable/c/48105dc98c9ca35af418746277b087cb2bc6df7c
af854a3a-2127-422b-91ae-364da2661108https://git.kernel.org/stable/c/569496aa3776eea1ff0d49d0174ac1b7e861e107
af854a3a-2127-422b-91ae-364da2661108https://git.kernel.org/stable/c/5b3a9a2be59478b013a430ac57b0f3d65471b071
af854a3a-2127-422b-91ae-364da2661108https://git.kernel.org/stable/c/920697b004e49cb026e2e15fe91be065bf0741b7
af854a3a-2127-422b-91ae-364da2661108https://git.kernel.org/stable/c/d3b668b96ad3192c0581a248ae2f596cd054792a
af854a3a-2127-422b-91ae-364da2661108https://git.kernel.org/stable/c/d8116743ef5432336289256b2f7c117299213eb9
af854a3a-2127-422b-91ae-364da2661108https://git.kernel.org/stable/c/e33bafad30d34cfa5e9787cb099cab05e2677fcb
Impacted products
Vendor Product Version
Linux Linux Version: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Version: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Version: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Version: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Version: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Version: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Version: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Version: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Create a notification for this product.
   Linux Linux Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2021-47117",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-03-18T14:32:59.932623Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-06-04T17:13:39.668Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T05:24:39.794Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/e33bafad30d34cfa5e9787cb099cab05e2677fcb"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/5b3a9a2be59478b013a430ac57b0f3d65471b071"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/d8116743ef5432336289256b2f7c117299213eb9"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/569496aa3776eea1ff0d49d0174ac1b7e861e107"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/920697b004e49cb026e2e15fe91be065bf0741b7"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/d3b668b96ad3192c0581a248ae2f596cd054792a"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/48105dc98c9ca35af418746277b087cb2bc6df7c"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/082cd4ec240b8734a82a89ffb890216ac98fec68"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "fs/ext4/extents.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "e33bafad30d34cfa5e9787cb099cab05e2677fcb",
              "status": "affected",
              "version": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2",
              "versionType": "git"
            },
            {
              "lessThan": "5b3a9a2be59478b013a430ac57b0f3d65471b071",
              "status": "affected",
              "version": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2",
              "versionType": "git"
            },
            {
              "lessThan": "d8116743ef5432336289256b2f7c117299213eb9",
              "status": "affected",
              "version": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2",
              "versionType": "git"
            },
            {
              "lessThan": "569496aa3776eea1ff0d49d0174ac1b7e861e107",
              "status": "affected",
              "version": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2",
              "versionType": "git"
            },
            {
              "lessThan": "920697b004e49cb026e2e15fe91be065bf0741b7",
              "status": "affected",
              "version": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2",
              "versionType": "git"
            },
            {
              "lessThan": "d3b668b96ad3192c0581a248ae2f596cd054792a",
              "status": "affected",
              "version": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2",
              "versionType": "git"
            },
            {
              "lessThan": "48105dc98c9ca35af418746277b087cb2bc6df7c",
              "status": "affected",
              "version": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2",
              "versionType": "git"
            },
            {
              "lessThan": "082cd4ec240b8734a82a89ffb890216ac98fec68",
              "status": "affected",
              "version": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "fs/ext4/extents.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThanOrEqual": "4.4.*",
              "status": "unaffected",
              "version": "4.4.272",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.9.*",
              "status": "unaffected",
              "version": "4.9.272",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.14.*",
              "status": "unaffected",
              "version": "4.14.236",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.19.*",
              "status": "unaffected",
              "version": "4.19.194",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.4.*",
              "status": "unaffected",
              "version": "5.4.125",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.10.*",
              "status": "unaffected",
              "version": "5.10.43",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.12.*",
              "status": "unaffected",
              "version": "5.12.10",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "5.13",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: fix bug on in ext4_es_cache_extent as ext4_split_extent_at failed\n\nWe got follow bug_on when run fsstress with injecting IO fault:\n[130747.323114] kernel BUG at fs/ext4/extents_status.c:762!\n[130747.323117] Internal error: Oops - BUG: 0 [#1] SMP\n......\n[130747.334329] Call trace:\n[130747.334553]  ext4_es_cache_extent+0x150/0x168 [ext4]\n[130747.334975]  ext4_cache_extents+0x64/0xe8 [ext4]\n[130747.335368]  ext4_find_extent+0x300/0x330 [ext4]\n[130747.335759]  ext4_ext_map_blocks+0x74/0x1178 [ext4]\n[130747.336179]  ext4_map_blocks+0x2f4/0x5f0 [ext4]\n[130747.336567]  ext4_mpage_readpages+0x4a8/0x7a8 [ext4]\n[130747.336995]  ext4_readpage+0x54/0x100 [ext4]\n[130747.337359]  generic_file_buffered_read+0x410/0xae8\n[130747.337767]  generic_file_read_iter+0x114/0x190\n[130747.338152]  ext4_file_read_iter+0x5c/0x140 [ext4]\n[130747.338556]  __vfs_read+0x11c/0x188\n[130747.338851]  vfs_read+0x94/0x150\n[130747.339110]  ksys_read+0x74/0xf0\n\nThis patch\u0027s modification is according to Jan Kara\u0027s suggestion in:\nhttps://patchwork.ozlabs.org/project/linux-ext4/patch/20210428085158.3728201-1-yebin10@huawei.com/\n\"I see. Now I understand your patch. Honestly, seeing how fragile is trying\nto fix extent tree after split has failed in the middle, I would probably\ngo even further and make sure we fix the tree properly in case of ENOSPC\nand EDQUOT (those are easily user triggerable).  Anything else indicates a\nHW problem or fs corruption so I\u0027d rather leave the extent tree as is and\ndon\u0027t try to fix it (which also means we will not create overlapping\nextents).\""
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-12-19T07:35:32.762Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/e33bafad30d34cfa5e9787cb099cab05e2677fcb"
        },
        {
          "url": "https://git.kernel.org/stable/c/5b3a9a2be59478b013a430ac57b0f3d65471b071"
        },
        {
          "url": "https://git.kernel.org/stable/c/d8116743ef5432336289256b2f7c117299213eb9"
        },
        {
          "url": "https://git.kernel.org/stable/c/569496aa3776eea1ff0d49d0174ac1b7e861e107"
        },
        {
          "url": "https://git.kernel.org/stable/c/920697b004e49cb026e2e15fe91be065bf0741b7"
        },
        {
          "url": "https://git.kernel.org/stable/c/d3b668b96ad3192c0581a248ae2f596cd054792a"
        },
        {
          "url": "https://git.kernel.org/stable/c/48105dc98c9ca35af418746277b087cb2bc6df7c"
        },
        {
          "url": "https://git.kernel.org/stable/c/082cd4ec240b8734a82a89ffb890216ac98fec68"
        }
      ],
      "title": "ext4: fix bug on in ext4_es_cache_extent as ext4_split_extent_at failed",
      "x_generator": {
        "engine": "bippy-5f407fcff5a0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2021-47117",
    "datePublished": "2024-03-15T20:14:24.291Z",
    "dateReserved": "2024-03-04T18:12:48.838Z",
    "dateUpdated": "2024-12-19T07:35:32.762Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2021-47117\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2024-03-15T21:15:06.887\",\"lastModified\":\"2024-11-21T06:35:25.837\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\next4: fix bug on in ext4_es_cache_extent as ext4_split_extent_at failed\\n\\nWe got follow bug_on when run fsstress with injecting IO fault:\\n[130747.323114] kernel BUG at fs/ext4/extents_status.c:762!\\n[130747.323117] Internal error: Oops - BUG: 0 [#1] SMP\\n......\\n[130747.334329] Call trace:\\n[130747.334553]  ext4_es_cache_extent+0x150/0x168 [ext4]\\n[130747.334975]  ext4_cache_extents+0x64/0xe8 [ext4]\\n[130747.335368]  ext4_find_extent+0x300/0x330 [ext4]\\n[130747.335759]  ext4_ext_map_blocks+0x74/0x1178 [ext4]\\n[130747.336179]  ext4_map_blocks+0x2f4/0x5f0 [ext4]\\n[130747.336567]  ext4_mpage_readpages+0x4a8/0x7a8 [ext4]\\n[130747.336995]  ext4_readpage+0x54/0x100 [ext4]\\n[130747.337359]  generic_file_buffered_read+0x410/0xae8\\n[130747.337767]  generic_file_read_iter+0x114/0x190\\n[130747.338152]  ext4_file_read_iter+0x5c/0x140 [ext4]\\n[130747.338556]  __vfs_read+0x11c/0x188\\n[130747.338851]  vfs_read+0x94/0x150\\n[130747.339110]  ksys_read+0x74/0xf0\\n\\nThis patch\u0027s modification is according to Jan Kara\u0027s suggestion in:\\nhttps://patchwork.ozlabs.org/project/linux-ext4/patch/20210428085158.3728201-1-yebin10@huawei.com/\\n\\\"I see. Now I understand your patch. Honestly, seeing how fragile is trying\\nto fix extent tree after split has failed in the middle, I would probably\\ngo even further and make sure we fix the tree properly in case of ENOSPC\\nand EDQUOT (those are easily user triggerable).  Anything else indicates a\\nHW problem or fs corruption so I\u0027d rather leave the extent tree as is and\\ndon\u0027t try to fix it (which also means we will not create overlapping\\nextents).\\\"\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: ext4: corrigi\u00f3 el error en ext4_es_cache_extent ya que ext4_split_extent_at fall\u00f3. Obtuvimos el seguimiento de bug_on cuando ejecutamos fsstress con la inyecci\u00f3n de error de IO: [130747.323114] ERROR del kernel en fs/ext4/extents_status.c:762. [130747.323117] Error interno: Vaya - ERROR: 0 [#1] SMP ...... [130747.334329] Rastreo de llamadas: [130747.334553] ext4_es_cache_extent+0x150/0x168 [ext4] [130747.334975] ext4_cache_extents+0x 64/0xe8 [ext4] [130747.335368] text4_find_extent+0x300/0x330 [ext4] [130747.335759] text4_ext_map_blocks+0x74/0x1178 [ext4] [130747.336179] text4_map_blocks+0x2f4/0x5f0 [ext4] [130747.336567] ext4_mpage_readpages+0x4a8/0x7a8 [ext4] [130747.336995] ext4_readpage+0x54 /0x100 [ext4] [130747.337359] generic_file_buffered_read+0x410/0xae8 [130747.337767] generic_file_read_iter+0x114/0x190 [130747.338152] ext4_file_read_iter+0x5c/0x140 [ext4] [13 0747.338556] __vfs_read+0x11c/0x188 [130747.338851] vfs_read+0x94/0x150 [130747.339110 ] ksys_read+0x74/0xf0 La modificaci\u00f3n de este parche se realiza seg\u00fan la sugerencia de Jan Kara en: https://patchwork.ozlabs.org/project/linux-ext4/patch/20210428085158.3728201-1-yebin10@huawei.com/ \\\"Ya veo. Ahora Entiendo su parche. Honestamente, viendo lo fr\u00e1gil que es intentar arreglar el \u00e1rbol de extensi\u00f3n despu\u00e9s de que la divisi\u00f3n fall\u00f3 en el medio, probablemente ir\u00eda a\u00fan m\u00e1s lejos y me asegurar\u00eda de arreglar el \u00e1rbol correctamente en el caso de ENOSPC y EDQUOT (esos son f\u00e1cilmente activables por el usuario). ). Cualquier otra cosa indica un problema de hardware o corrupci\u00f3n de fs, por lo que prefiero dejar el \u00e1rbol de extensiones como est\u00e1 y no intentar arreglarlo (lo que tambi\u00e9n significa que no crearemos extensiones superpuestas)\\\".\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/082cd4ec240b8734a82a89ffb890216ac98fec68\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/48105dc98c9ca35af418746277b087cb2bc6df7c\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/569496aa3776eea1ff0d49d0174ac1b7e861e107\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/5b3a9a2be59478b013a430ac57b0f3d65471b071\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/920697b004e49cb026e2e15fe91be065bf0741b7\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/d3b668b96ad3192c0581a248ae2f596cd054792a\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/d8116743ef5432336289256b2f7c117299213eb9\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/e33bafad30d34cfa5e9787cb099cab05e2677fcb\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/082cd4ec240b8734a82a89ffb890216ac98fec68\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://git.kernel.org/stable/c/48105dc98c9ca35af418746277b087cb2bc6df7c\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://git.kernel.org/stable/c/569496aa3776eea1ff0d49d0174ac1b7e861e107\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://git.kernel.org/stable/c/5b3a9a2be59478b013a430ac57b0f3d65471b071\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://git.kernel.org/stable/c/920697b004e49cb026e2e15fe91be065bf0741b7\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://git.kernel.org/stable/c/d3b668b96ad3192c0581a248ae2f596cd054792a\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://git.kernel.org/stable/c/d8116743ef5432336289256b2f7c117299213eb9\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://git.kernel.org/stable/c/e33bafad30d34cfa5e9787cb099cab05e2677fcb\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://git.kernel.org/stable/c/e33bafad30d34cfa5e9787cb099cab05e2677fcb\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/5b3a9a2be59478b013a430ac57b0f3d65471b071\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/d8116743ef5432336289256b2f7c117299213eb9\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/569496aa3776eea1ff0d49d0174ac1b7e861e107\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/920697b004e49cb026e2e15fe91be065bf0741b7\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/d3b668b96ad3192c0581a248ae2f596cd054792a\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/48105dc98c9ca35af418746277b087cb2bc6df7c\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/082cd4ec240b8734a82a89ffb890216ac98fec68\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-04T05:24:39.794Z\"}}, {\"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2021-47117\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-03-18T14:32:59.932623Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-05-23T19:01:18.180Z\"}, \"title\": \"CISA ADP Vulnrichment\"}], \"cna\": {\"title\": \"ext4: fix bug on in ext4_es_cache_extent as ext4_split_extent_at failed\", \"affected\": [{\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"1da177e4c3f41524e886b7f1b8a0c1fc7321cac2\", \"lessThan\": \"e33bafad30d34cfa5e9787cb099cab05e2677fcb\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"1da177e4c3f41524e886b7f1b8a0c1fc7321cac2\", \"lessThan\": \"5b3a9a2be59478b013a430ac57b0f3d65471b071\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"1da177e4c3f41524e886b7f1b8a0c1fc7321cac2\", \"lessThan\": \"d8116743ef5432336289256b2f7c117299213eb9\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"1da177e4c3f41524e886b7f1b8a0c1fc7321cac2\", \"lessThan\": \"569496aa3776eea1ff0d49d0174ac1b7e861e107\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"1da177e4c3f41524e886b7f1b8a0c1fc7321cac2\", \"lessThan\": \"920697b004e49cb026e2e15fe91be065bf0741b7\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"1da177e4c3f41524e886b7f1b8a0c1fc7321cac2\", \"lessThan\": \"d3b668b96ad3192c0581a248ae2f596cd054792a\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"1da177e4c3f41524e886b7f1b8a0c1fc7321cac2\", \"lessThan\": \"48105dc98c9ca35af418746277b087cb2bc6df7c\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"1da177e4c3f41524e886b7f1b8a0c1fc7321cac2\", \"lessThan\": \"082cd4ec240b8734a82a89ffb890216ac98fec68\", \"versionType\": \"git\"}], \"programFiles\": [\"fs/ext4/extents.c\"], \"defaultStatus\": \"unaffected\"}, {\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"4.4.272\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"4.4.*\"}, {\"status\": \"unaffected\", \"version\": \"4.9.272\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"4.9.*\"}, {\"status\": \"unaffected\", \"version\": \"4.14.236\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"4.14.*\"}, {\"status\": \"unaffected\", \"version\": \"4.19.194\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"4.19.*\"}, {\"status\": \"unaffected\", \"version\": \"5.4.125\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.4.*\"}, {\"status\": \"unaffected\", \"version\": \"5.10.43\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.10.*\"}, {\"status\": \"unaffected\", \"version\": \"5.12.10\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.12.*\"}, {\"status\": \"unaffected\", \"version\": \"5.13\", \"versionType\": \"original_commit_for_fix\", \"lessThanOrEqual\": \"*\"}], \"programFiles\": [\"fs/ext4/extents.c\"], \"defaultStatus\": \"affected\"}], \"references\": [{\"url\": \"https://git.kernel.org/stable/c/e33bafad30d34cfa5e9787cb099cab05e2677fcb\"}, {\"url\": \"https://git.kernel.org/stable/c/5b3a9a2be59478b013a430ac57b0f3d65471b071\"}, {\"url\": \"https://git.kernel.org/stable/c/d8116743ef5432336289256b2f7c117299213eb9\"}, {\"url\": \"https://git.kernel.org/stable/c/569496aa3776eea1ff0d49d0174ac1b7e861e107\"}, {\"url\": \"https://git.kernel.org/stable/c/920697b004e49cb026e2e15fe91be065bf0741b7\"}, {\"url\": \"https://git.kernel.org/stable/c/d3b668b96ad3192c0581a248ae2f596cd054792a\"}, {\"url\": \"https://git.kernel.org/stable/c/48105dc98c9ca35af418746277b087cb2bc6df7c\"}, {\"url\": \"https://git.kernel.org/stable/c/082cd4ec240b8734a82a89ffb890216ac98fec68\"}], \"x_generator\": {\"engine\": \"bippy-5f407fcff5a0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\next4: fix bug on in ext4_es_cache_extent as ext4_split_extent_at failed\\n\\nWe got follow bug_on when run fsstress with injecting IO fault:\\n[130747.323114] kernel BUG at fs/ext4/extents_status.c:762!\\n[130747.323117] Internal error: Oops - BUG: 0 [#1] SMP\\n......\\n[130747.334329] Call trace:\\n[130747.334553]  ext4_es_cache_extent+0x150/0x168 [ext4]\\n[130747.334975]  ext4_cache_extents+0x64/0xe8 [ext4]\\n[130747.335368]  ext4_find_extent+0x300/0x330 [ext4]\\n[130747.335759]  ext4_ext_map_blocks+0x74/0x1178 [ext4]\\n[130747.336179]  ext4_map_blocks+0x2f4/0x5f0 [ext4]\\n[130747.336567]  ext4_mpage_readpages+0x4a8/0x7a8 [ext4]\\n[130747.336995]  ext4_readpage+0x54/0x100 [ext4]\\n[130747.337359]  generic_file_buffered_read+0x410/0xae8\\n[130747.337767]  generic_file_read_iter+0x114/0x190\\n[130747.338152]  ext4_file_read_iter+0x5c/0x140 [ext4]\\n[130747.338556]  __vfs_read+0x11c/0x188\\n[130747.338851]  vfs_read+0x94/0x150\\n[130747.339110]  ksys_read+0x74/0xf0\\n\\nThis patch\u0027s modification is according to Jan Kara\u0027s suggestion in:\\nhttps://patchwork.ozlabs.org/project/linux-ext4/patch/20210428085158.3728201-1-yebin10@huawei.com/\\n\\\"I see. Now I understand your patch. Honestly, seeing how fragile is trying\\nto fix extent tree after split has failed in the middle, I would probably\\ngo even further and make sure we fix the tree properly in case of ENOSPC\\nand EDQUOT (those are easily user triggerable).  Anything else indicates a\\nHW problem or fs corruption so I\u0027d rather leave the extent tree as is and\\ndon\u0027t try to fix it (which also means we will not create overlapping\\nextents).\\\"\"}], \"providerMetadata\": {\"orgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"shortName\": \"Linux\", \"dateUpdated\": \"2024-12-19T07:35:32.762Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2021-47117\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-12-19T07:35:32.762Z\", \"dateReserved\": \"2024-03-04T18:12:48.838Z\", \"assignerOrgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"datePublished\": \"2024-03-15T20:14:24.291Z\", \"assignerShortName\": \"Linux\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.