In the Linux kernel, the following vulnerability has been resolved:
NFS: fix an incorrect limit in filelayout_decode_layout()
The "sizeof(struct nfs_fh)" is two bytes too large and could lead to
memory corruption. It should be NFS_MAXFHSIZE because that's the size
of the ->data[] buffer.
I reversed the size of the arguments to put the variable on the left.
References
Configurations
Configuration 1 (hide)
|
History
17 Mar 2025, 15:03
Type | Values Removed | Values Added |
---|---|---|
References | () https://git.kernel.org/stable/c/769b01ea68b6c49dc3cde6adf7e53927dacbd3a8 - Patch | |
References | () https://git.kernel.org/stable/c/945ebef997227ca8c20bad7f8a8358c8ee57a84a - Patch | |
References | () https://git.kernel.org/stable/c/9b367fe770b1b80d7bf64ed0d177544a44405f6e - Patch | |
References | () https://git.kernel.org/stable/c/9d280ab53df1d4a1043bd7a9e7c6a2f9cfbfe040 - Patch | |
References | () https://git.kernel.org/stable/c/b287521e9e94bb342ebe5fd8c3fd7db9aef4e6f1 - Patch | |
References | () https://git.kernel.org/stable/c/d34fb628f6ef522f996205a9e578216bbee09e84 - Patch | |
References | () https://git.kernel.org/stable/c/e411df81cd862ef3d5b878120b2a2fef0ca9cdb1 - Patch | |
References | () https://git.kernel.org/stable/c/f299522eda1566cbfbae4b15c82970fc41b03714 - Patch | |
CPE | cpe:2.3:o:linux:linux_kernel:5.13:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:* |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
CWE | CWE-787 | |
First Time |
Linux linux Kernel
Linux |
Information
Published : 2024-03-25 10:15
Updated : 2025-03-17 15:03
NVD link : CVE-2021-47168
Mitre link : CVE-2021-47168
CVE.ORG link : CVE-2021-47168
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-787
Out-of-bounds Write