Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2021-47213

Опубликовано: 10 апр. 2024
Источник: redhat
CVSS3: 6.1

Описание

[REJECTED CVE] In the Linux kernel, the following vulnerability has been resolved: NFSD: Fix exposure in nfsd4_decode_bitmap() The Linux kernel CVE team has assigned CVE-2021-47213 to this issue.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6kernelOut of support scope
Red Hat Enterprise Linux 7kernelOut of support scope
Red Hat Enterprise Linux 7kernel-rtOut of support scope
Red Hat Enterprise Linux 8kernel-rtAffected
Red Hat Enterprise Linux 9kernelNot affected
Red Hat Enterprise Linux 9kernel-rtNot affected
Red Hat Enterprise Linux 8kernelFixedRHSA-2022:768308.11.2022

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-402
https://bugzilla.redhat.com/show_bug.cgi?id=2274573kernel: NFSD: Fix exposure in nfsd4_decode_bitmap()

6.1 Medium

CVSS3

Связанные уязвимости

ubuntu
почти 2 года назад

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

nvd
почти 2 года назад

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

github
почти 2 года назад

In the Linux kernel, the following vulnerability has been resolved: NFSD: Fix exposure in nfsd4_decode_bitmap() rtm@csail.mit.edu reports: > nfsd4_decode_bitmap4() will write beyond bmval[bmlen-1] if the RPC > directs it to do so. This can cause nfsd4_decode_state_protect4_a() > to write client-supplied data beyond the end of > nfsd4_exchange_id.spo_must_allow[] when called by > nfsd4_decode_exchange_id(). Rewrite the loops so nfsd4_decode_bitmap() cannot iterate beyond @bmlen. Reported by: rtm@csail.mit.edu

6.1 Medium

CVSS3