Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1110 CNY

100%

CVE-2021-47458— ocfs2: mount fails with buffer overflow in strlen

EPSS 0.03% · P10

Affected Version Matrix 18

VendorProductVersion RangeStatus
LinuxLinuxc74a3bdd9b529d924d1abf986079b783dd105ace< ac011cb3ff7a76b3e0e6e77158ee4ba2f929e1fbaffected
c74a3bdd9b529d924d1abf986079b783dd105ace< 4b74ddcc22ee6455946e80a9c4808801f8f8561eaffected
c74a3bdd9b529d924d1abf986079b783dd105ace< 232ed9752510de4436468b653d145565669c8498affected
c74a3bdd9b529d924d1abf986079b783dd105ace< 7623b1035ca2d17bde0f6a086ad6844a34648df1affected
c74a3bdd9b529d924d1abf986079b783dd105ace< d3a83576378b4c904f711598dde2c5e881c4295caffected
c74a3bdd9b529d924d1abf986079b783dd105ace< 93be0eeea14cf39235e585c8f56df3b3859deaadaffected
c74a3bdd9b529d924d1abf986079b783dd105ace< 0e677ea5b7396f715a76b6b0ef441430e4c4b57faffected
c74a3bdd9b529d924d1abf986079b783dd105ace< b15fa9224e6e1239414525d8d556d824701849fcaffected
… +10 more rows
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2021-47458

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
ocfs2: mount fails with buffer overflow in strlen
Source: NVD (National Vulnerability Database)
Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: ocfs2: mount fails with buffer overflow in strlen Starting with kernel 5.11 built with CONFIG_FORTIFY_SOURCE mouting an ocfs2 filesystem with either o2cb or pcmk cluster stack fails with the trace below. Problem seems to be that strings for cluster stack and cluster name are not guaranteed to be null terminated in the disk representation, while strlcpy assumes that the source string is always null terminated. This causes a read outside of the source string triggering the buffer overflow detection. detected buffer overflow in strlen ------------[ cut here ]------------ kernel BUG at lib/string.c:1149! invalid opcode: 0000 [#1] SMP PTI CPU: 1 PID: 910 Comm: mount.ocfs2 Not tainted 5.14.0-1-amd64 #1 Debian 5.14.6-2 RIP: 0010:fortify_panic+0xf/0x11 ... Call Trace: ocfs2_initialize_super.isra.0.cold+0xc/0x18 [ocfs2] ocfs2_fill_super+0x359/0x19b0 [ocfs2] mount_bdev+0x185/0x1b0 legacy_get_tree+0x27/0x40 vfs_get_tree+0x25/0xb0 path_mount+0x454/0xa20 __x64_sys_mount+0x103/0x140 do_syscall_64+0x3b/0xc0 entry_SYSCALL_64_after_hwframe+0x44/0xae
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Linux kernel 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel存在安全漏洞,该漏洞源于存在缓冲区溢出漏洞。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
LinuxLinux c74a3bdd9b529d924d1abf986079b783dd105ace ~ ac011cb3ff7a76b3e0e6e77158ee4ba2f929e1fb -
LinuxLinux 3.14 -

II. Public POCs for CVE-2021-47458

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2021-47458

登录查看更多情报信息。

Other References for CVE-2021-47458 (8)

Same Patch Batch · Linux · 2024-05-22 · 63 CVEs total

CVE-2021-47477comedi: dt9812: fix DMA buffers on stack
CVE-2021-47493ocfs2: fix race between searching chunks and release journal_head from buffer_head
CVE-2021-47495usbnet: sanity check for maxpacket
CVE-2021-47496net/tls: Fix flipped sign in tls_err_abort() calls
CVE-2021-47494cfg80211: fix management registrations locking
CVE-2021-47481RDMA/mlx5: Initialize the ODP xarray when creating an ODP MR
CVE-2021-47482net: batman-adv: fix error handling
CVE-2021-47480scsi: core: Put LLD module refcnt after SCSI device is released
CVE-2021-47478isofs: Fix out of bound access for corrupted isofs image
CVE-2021-47479staging: rtl8712: fix use-after-free in rtl8712_dl_fw
CVE-2021-47483regmap: Fix possible double-free in regcache_rbtree_exit()
CVE-2021-47476comedi: ni_usb6501: fix NULL-deref in command paths
CVE-2021-47475comedi: vmk80xx: fix transfer-buffer overflows
CVE-2021-47474comedi: vmk80xx: fix bulk-buffer overflow
CVE-2021-47473scsi: qla2xxx: Fix a memory leak in an error path of qla2x00_process_els()
CVE-2021-47471drm: mxsfb: Fix NULL pointer dereference crash on unload
CVE-2021-47470mm, slub: fix potential use-after-free in slab_debugfs_fops
CVE-2021-47468isdn: mISDN: Fix sleeping function called from invalid context
CVE-2021-47467kunit: fix reference count leak in kfree_at_end
CVE-2021-47466mm, slub: fix potential memoryleak in kmem_cache_open()

Showing top 20 of 63 CVEs. View all on vendor page &rarr; →

IV. Related Vulnerabilities

V. Comments for CVE-2021-47458

No comments yet


Leave a comment