CVE-2021-47166

In the Linux kernel, the following vulnerability has been resolved: NFS: Don't corrupt the value of pg_bytes_written in nfs_do_recoalesce() The value of mirror->pg_bytes_written should only be updated after a successful attempt to flush out the requests on the list.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc3:*:*:*:*:*:*

History

17 Mar 2025, 15:03

Type Values Removed Values Added
CWE CWE-787
First Time Linux linux Kernel
Linux
References () https://git.kernel.org/stable/c/0d0ea309357dea0d85a82815f02157eb7fcda39f - () https://git.kernel.org/stable/c/0d0ea309357dea0d85a82815f02157eb7fcda39f - Patch
References () https://git.kernel.org/stable/c/2fe1cac336b55a1f79e603e9ce3552c3623e90eb - () https://git.kernel.org/stable/c/2fe1cac336b55a1f79e603e9ce3552c3623e90eb - Patch
References () https://git.kernel.org/stable/c/40f139a6d50c232c0d1fd1c5e65a845c62db0ede - () https://git.kernel.org/stable/c/40f139a6d50c232c0d1fd1c5e65a845c62db0ede - Patch
References () https://git.kernel.org/stable/c/7087db95c0a06ab201b8ebfac6a7ec1e34257997 - () https://git.kernel.org/stable/c/7087db95c0a06ab201b8ebfac6a7ec1e34257997 - Patch
References () https://git.kernel.org/stable/c/785917316b25685c9b3a2a88f933139f2de75e33 - () https://git.kernel.org/stable/c/785917316b25685c9b3a2a88f933139f2de75e33 - Patch
References () https://git.kernel.org/stable/c/b291baae24f876acd5a5dd57d0bb2bbac8a68b0c - () https://git.kernel.org/stable/c/b291baae24f876acd5a5dd57d0bb2bbac8a68b0c - Patch
References () https://git.kernel.org/stable/c/c757c1f1e65d89429db1409429436cf40d47c008 - () https://git.kernel.org/stable/c/c757c1f1e65d89429db1409429436cf40d47c008 - Patch
References () https://git.kernel.org/stable/c/e8b8418ce14ae66ee55179901edd12191ab06a9e - () https://git.kernel.org/stable/c/e8b8418ce14ae66ee55179901edd12191ab06a9e - Patch
CPE cpe:2.3:o:linux:linux_kernel:5.13:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5

Information

Published : 2024-03-25 10:15

Updated : 2025-03-17 15:03


NVD link : CVE-2021-47166

Mitre link : CVE-2021-47166

CVE.ORG link : CVE-2021-47166


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-787

Out-of-bounds Write