Vulnerability Name: | CVE-2021-45469 (CCN-216042) | ||||||||||||
Assigned: | 2021-12-12 | ||||||||||||
Published: | 2021-12-12 | ||||||||||||
Updated: | 2022-04-06 | ||||||||||||
Summary: | In __f2fs_setxattr in fs/f2fs/xattr.c in the Linux kernel through 5.15.11, there is an out-of-bounds memory access when an inode has an invalid last xattr entry. | ||||||||||||
CVSS v3 Severity: | 7.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) 6.8 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
6.8 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 4.6 Medium (CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P)
| ||||||||||||
Vulnerability Type: | CWE-125 | ||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2021-45469 Source: MLIST Type: Mailing List, Third Party Advisory [oss-security] 20211224 CVE-2021-45469: Linux kernel: an out-of-bounds memory access in fs/f2fs/xattr.c __f2fs_setxattr Source: CCN Type: Kernel.org Bugzilla - Bug 215235 page fault in f2fs_setxattr() when mount and operate on corrupted image Source: MISC Type: Exploit, Issue Tracking, Patch, Vendor Advisory https://bugzilla.kernel.org/show_bug.cgi?id=215235 Source: XF Type: UNKNOWN linux-kernel-cve202145469-code-exec(216042) Source: CCN Type: Linux Kernel GIT Repository f2fs: fix to do sanity check on last xattr entry in __f2fs_setxattr() Source: MISC Type: Exploit, Patch, Vendor Advisory https://git.kernel.org/pub/scm/linux/kernel/git/chao/linux.git/commit/?h=dev&id=5598b24efaf4892741c798b425d543e4bed357a1 Source: MLIST Type: Mailing List, Third Party Advisory [debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2021-c387682aa1 Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2021-a7a558062e Source: CONFIRM Type: Third Party Advisory https://security.netapp.com/advisory/ntap-20220114-0003/ Source: DEBIAN Type: Third Party Advisory DSA-5050 Source: DEBIAN Type: Third Party Advisory DSA-5096 Source: CCN Type: WhiteSource Vulnerability Database CVE-2021-45469 | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration 3: Configuration 4: Configuration 5: Configuration 6: Configuration 7: Configuration 8: Configuration 9: Configuration 10: Configuration 11: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||
BACK |