CVE-2021-47460
ocfs2: fix data corruption after conversion from inline format
Description
In the Linux kernel, the following vulnerability has been resolved: ocfs2: fix data corruption after conversion from inline format Commit 6dbf7bb55598 ("fs: Don't invalidate page buffers in block_write_full_page()") uncovered a latent bug in ocfs2 conversion from inline inode format to a normal inode format. The code in ocfs2_convert_inline_data_to_extents() attempts to zero out the whole cluster allocated for file data by grabbing, zeroing, and dirtying all pages covering this cluster. However these pages are beyond i_size, thus writeback code generally ignores these dirty pages and no blocks were ever actually zeroed on the disk. This oversight was fixed by commit 693c241a5f6a ("ocfs2: No need to zero pages past i_size.") for standard ocfs2 write path, inline conversion path was apparently forgotten; the commit log also has a reasoning why the zeroing actually is not needed. After commit 6dbf7bb55598, things became worse as writeback code stopped invalidating buffers on pages beyond i_size and thus these pages end up with clean PageDirty bit but with buffers attached to these pages being still dirty. So when a file is converted from inline format, then writeback triggers, and then the file is grown so that these pages become valid, the invalid dirtiness state is preserved, mark_buffer_dirty() does nothing on these pages (buffers are already dirty) but page is never written back because it is clean. So data written to these pages is lost once pages are reclaimed. Simple reproducer for the problem is: xfs_io -f -c "pwrite 0 2000" -c "pwrite 2000 2000" -c "fsync" \ -c "pwrite 4000 2000" ocfs2_file After unmounting and mounting the fs again, you can observe that end of 'ocfs2_file' has lost its contents. Fix the problem by not doing the pointless zeroing during conversion from inline format similarly as in the standard write path. [[email protected]: fix whitespace, per Joseph]
INFO
Published Date :
May 22, 2024, 7:15 a.m.
Last Modified :
Sept. 24, 2025, 12:05 p.m.
Remotely Exploit :
No
Source :
416baaa9-dc9f-4396-8d5f-8c081fb06d67
CVSS Scores
| Score | Version | Severity | Vector | Exploitability Score | Impact Score | Source |
|---|---|---|---|---|---|---|
| CVSS 3.1 | MEDIUM | [email protected] |
Solution
- Update the affected packages.
- Update the kernel to address the vulnerability.
References to Advisories, Solutions, and Tools
Here, you will find a curated list of external links that provide in-depth
information, practical solutions, and valuable tools related to
CVE-2021-47460.
CWE - Common Weakness Enumeration
While CVE identifies
specific instances of vulnerabilities, CWE categorizes the common flaws or
weaknesses that can lead to vulnerabilities. CVE-2021-47460 is
associated with the following CWEs:
Common Attack Pattern Enumeration and Classification (CAPEC)
Common Attack Pattern Enumeration and Classification
(CAPEC)
stores attack patterns, which are descriptions of the common attributes and
approaches employed by adversaries to exploit the CVE-2021-47460
weaknesses.
We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).
Results are limited to the first 15 repositories due to potential performance issues.
The following list is the news that have been mention
CVE-2021-47460 vulnerability anywhere in the article.
The following table lists the changes that have been made to the
CVE-2021-47460 vulnerability over time.
Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.
-
Initial Analysis by [email protected]
Sep. 24, 2025
Action Type Old Value New Value Added CVSS V3.1 AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Added CWE NVD-CWE-Other Added CPE Configuration OR *cpe:2.3:o:linux:linux_kernel:5.15:rc2:*:*:*:*:*:* *cpe:2.3:o:linux:linux_kernel:5.15:rc3:*:*:*:*:*:* *cpe:2.3:o:linux:linux_kernel:5.15:rc5:*:*:*:*:*:* *cpe:2.3:o:linux:linux_kernel:5.15:rc1:*:*:*:*:*:* *cpe:2.3:o:linux:linux_kernel:5.15:rc4:*:*:*:*:*:* *cpe:2.3:o:linux:linux_kernel:5.15:rc6:*:*:*:*:*:* *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 4.9.242 up to (excluding) 4.9.288 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 4.14.204 up to (excluding) 4.14.253 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 4.19.155 up to (excluding) 4.19.214 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.4.75 up to (excluding) 5.4.156 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.9.5 up to (excluding) 5.10.76 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.11 up to (excluding) 5.14.15 Added Reference Type CVE: https://git.kernel.org/stable/c/5314454ea3ff6fc746eaf71b9a7ceebed52888fa Types: Patch Added Reference Type kernel.org: https://git.kernel.org/stable/c/5314454ea3ff6fc746eaf71b9a7ceebed52888fa Types: Patch Added Reference Type CVE: https://git.kernel.org/stable/c/560edd14de2bf9dbc0129681eeb4d5ef87cc105f Types: Patch Added Reference Type kernel.org: https://git.kernel.org/stable/c/560edd14de2bf9dbc0129681eeb4d5ef87cc105f Types: Patch Added Reference Type CVE: https://git.kernel.org/stable/c/8e6bfb4f70168ddfd32fb6dc028ad52faaf1f32e Types: Patch Added Reference Type kernel.org: https://git.kernel.org/stable/c/8e6bfb4f70168ddfd32fb6dc028ad52faaf1f32e Types: Patch Added Reference Type CVE: https://git.kernel.org/stable/c/a3a089c241cd49b33a8cdd7fcb37cc87a086912a Types: Patch Added Reference Type kernel.org: https://git.kernel.org/stable/c/a3a089c241cd49b33a8cdd7fcb37cc87a086912a Types: Patch Added Reference Type CVE: https://git.kernel.org/stable/c/b05caf023b14cbed9223bb5b48ecc7bffe38f632 Types: Patch Added Reference Type kernel.org: https://git.kernel.org/stable/c/b05caf023b14cbed9223bb5b48ecc7bffe38f632 Types: Patch Added Reference Type CVE: https://git.kernel.org/stable/c/f1b98569e81c37d7e0deada7172f8f60860c1360 Types: Patch Added Reference Type kernel.org: https://git.kernel.org/stable/c/f1b98569e81c37d7e0deada7172f8f60860c1360 Types: Patch Added Reference Type CVE: https://git.kernel.org/stable/c/fa9b6b6c953e3f6441ed6cf83b4c771dac2dae08 Types: Patch Added Reference Type kernel.org: https://git.kernel.org/stable/c/fa9b6b6c953e3f6441ed6cf83b4c771dac2dae08 Types: Patch -
CVE Modified by af854a3a-2127-422b-91ae-364da2661108
Nov. 21, 2024
Action Type Old Value New Value Added Reference https://git.kernel.org/stable/c/5314454ea3ff6fc746eaf71b9a7ceebed52888fa Added Reference https://git.kernel.org/stable/c/560edd14de2bf9dbc0129681eeb4d5ef87cc105f Added Reference https://git.kernel.org/stable/c/8e6bfb4f70168ddfd32fb6dc028ad52faaf1f32e Added Reference https://git.kernel.org/stable/c/a3a089c241cd49b33a8cdd7fcb37cc87a086912a Added Reference https://git.kernel.org/stable/c/b05caf023b14cbed9223bb5b48ecc7bffe38f632 Added Reference https://git.kernel.org/stable/c/f1b98569e81c37d7e0deada7172f8f60860c1360 Added Reference https://git.kernel.org/stable/c/fa9b6b6c953e3f6441ed6cf83b4c771dac2dae08 -
CVE Modified by 416baaa9-dc9f-4396-8d5f-8c081fb06d67
May. 28, 2024
Action Type Old Value New Value -
CVE Received by 416baaa9-dc9f-4396-8d5f-8c081fb06d67
May. 22, 2024
Action Type Old Value New Value Added Description In the Linux kernel, the following vulnerability has been resolved: ocfs2: fix data corruption after conversion from inline format Commit 6dbf7bb55598 ("fs: Don't invalidate page buffers in block_write_full_page()") uncovered a latent bug in ocfs2 conversion from inline inode format to a normal inode format. The code in ocfs2_convert_inline_data_to_extents() attempts to zero out the whole cluster allocated for file data by grabbing, zeroing, and dirtying all pages covering this cluster. However these pages are beyond i_size, thus writeback code generally ignores these dirty pages and no blocks were ever actually zeroed on the disk. This oversight was fixed by commit 693c241a5f6a ("ocfs2: No need to zero pages past i_size.") for standard ocfs2 write path, inline conversion path was apparently forgotten; the commit log also has a reasoning why the zeroing actually is not needed. After commit 6dbf7bb55598, things became worse as writeback code stopped invalidating buffers on pages beyond i_size and thus these pages end up with clean PageDirty bit but with buffers attached to these pages being still dirty. So when a file is converted from inline format, then writeback triggers, and then the file is grown so that these pages become valid, the invalid dirtiness state is preserved, mark_buffer_dirty() does nothing on these pages (buffers are already dirty) but page is never written back because it is clean. So data written to these pages is lost once pages are reclaimed. Simple reproducer for the problem is: xfs_io -f -c "pwrite 0 2000" -c "pwrite 2000 2000" -c "fsync" \ -c "pwrite 4000 2000" ocfs2_file After unmounting and mounting the fs again, you can observe that end of 'ocfs2_file' has lost its contents. Fix the problem by not doing the pointless zeroing during conversion from inline format similarly as in the standard write path. [[email protected]: fix whitespace, per Joseph] Added Reference kernel.org https://git.kernel.org/stable/c/560edd14de2bf9dbc0129681eeb4d5ef87cc105f [No types assigned] Added Reference kernel.org https://git.kernel.org/stable/c/8e6bfb4f70168ddfd32fb6dc028ad52faaf1f32e [No types assigned] Added Reference kernel.org https://git.kernel.org/stable/c/a3a089c241cd49b33a8cdd7fcb37cc87a086912a [No types assigned] Added Reference kernel.org https://git.kernel.org/stable/c/b05caf023b14cbed9223bb5b48ecc7bffe38f632 [No types assigned] Added Reference kernel.org https://git.kernel.org/stable/c/f1b98569e81c37d7e0deada7172f8f60860c1360 [No types assigned] Added Reference kernel.org https://git.kernel.org/stable/c/fa9b6b6c953e3f6441ed6cf83b4c771dac2dae08 [No types assigned] Added Reference kernel.org https://git.kernel.org/stable/c/5314454ea3ff6fc746eaf71b9a7ceebed52888fa [No types assigned]