CVE-2021-45868
Linux Kernel vulnerability analysis and mitigation

Overview

CVE-2021-45868 affects the Linux kernel versions before 5.15.3, specifically in the fs/quota/quotatree.c component. The vulnerability stems from a failure to validate the block number in the quota tree (on disk), which could lead to a kernel/locking/rwsem.c use-after-free condition if there is a corrupted quota file (NVD, [Kernel Bugzilla](https://bugzilla.kernel.org/showbug.cgi?id=214655)).

Technical details

The vulnerability occurs because the block number in the quota tree on disk should be smaller than the v2diskdqinfo.dqi_blocks. When the quota file is corrupted, the system may allocate an 'allocated' block, potentially creating a loop in the tree. This can trigger a kernel oops due to improper validation of block numbers when reading blocks in the quota file. The vulnerability has been assigned a CVSS v3.1 Base Score of 5.5 (MEDIUM) with a vector of CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H (NVD).

Impact

Successful exploitation of this vulnerability can lead to a denial of service condition through a kernel crash. The vulnerability specifically affects the quota mechanism's block number validation, which could result in system instability when processing corrupted quota files (Ubuntu Security).

Mitigation and workarounds

The vulnerability was fixed in Linux kernel version 5.15.3 through a patch that adds validation checks for block numbers in the quota tree. The fix specifically adds checks to ensure that block numbers are within valid bounds and prevents potential loops in the tree structure (Kernel Commit).

Community reactions

Various Linux distributions and vendors have responded to this vulnerability by releasing security advisories and patches. NetApp issued an advisory (NTAP-20220419-0003) detailing the impact on their products and providing mitigation guidance (NetApp Advisory).

Additional resources


SourceThis report was generated using AI

Related Linux Kernel vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-40344N/AN/A
  • Linux KernelLinux Kernel
  • kernel-debug-modules-internal
NoYesDec 09, 2025
CVE-2025-40343N/AN/A
  • Linux KernelLinux Kernel
  • kernel-64k-debug-devel
NoYesDec 09, 2025
CVE-2025-40342N/AN/A
  • Linux KernelLinux Kernel
  • kernel-64k-debug-devel-matched
NoYesDec 09, 2025
CVE-2025-40341N/AN/A
  • Linux KernelLinux Kernel
  • kernel-rt-64k-debug-modules-extra
NoYesDec 09, 2025
CVE-2025-40340N/AN/A
  • Linux KernelLinux Kernel
  • kernel-rt-64k-debug-kvm
NoYesDec 09, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management