cve-2021-47478
Vulnerability from cvelistv5
Published
2024-05-22 08:19
Modified
2024-12-19 07:43
EPSS score ?
0.04% (0.14912)
Summary
In the Linux kernel, the following vulnerability has been resolved: isofs: Fix out of bound access for corrupted isofs image When isofs image is suitably corrupted isofs_read_inode() can read data beyond the end of buffer. Sanity-check the directory entry length before using it.
References
416baaa9-dc9f-4396-8d5f-8c081fb06d67https://git.kernel.org/stable/c/156ce5bb6cc43a80a743810199defb1dc3f55b7f
416baaa9-dc9f-4396-8d5f-8c081fb06d67https://git.kernel.org/stable/c/6e80e9314f8bb52d9eabe1907698718ff01120f5
416baaa9-dc9f-4396-8d5f-8c081fb06d67https://git.kernel.org/stable/c/86d4aedcbc69c0f84551fb70f953c24e396de2d7
416baaa9-dc9f-4396-8d5f-8c081fb06d67https://git.kernel.org/stable/c/9ec33a9b8790c212cc926a88c5e2105f97f3f57e
416baaa9-dc9f-4396-8d5f-8c081fb06d67https://git.kernel.org/stable/c/afbd40f425227e661d991757e11cc4db024e761f
416baaa9-dc9f-4396-8d5f-8c081fb06d67https://git.kernel.org/stable/c/b0ddff8d68f2e43857a84dce54c3deab181c8ae1
416baaa9-dc9f-4396-8d5f-8c081fb06d67https://git.kernel.org/stable/c/b2fa1f52d22c5455217b294629346ad23a744945
416baaa9-dc9f-4396-8d5f-8c081fb06d67https://git.kernel.org/stable/c/e7fb722586a2936b37bdff096c095c30ca06404d
416baaa9-dc9f-4396-8d5f-8c081fb06d67https://git.kernel.org/stable/c/e96a1866b40570b5950cda8602c2819189c62a48
af854a3a-2127-422b-91ae-364da2661108https://git.kernel.org/stable/c/156ce5bb6cc43a80a743810199defb1dc3f55b7f
af854a3a-2127-422b-91ae-364da2661108https://git.kernel.org/stable/c/6e80e9314f8bb52d9eabe1907698718ff01120f5
af854a3a-2127-422b-91ae-364da2661108https://git.kernel.org/stable/c/86d4aedcbc69c0f84551fb70f953c24e396de2d7
af854a3a-2127-422b-91ae-364da2661108https://git.kernel.org/stable/c/9ec33a9b8790c212cc926a88c5e2105f97f3f57e
af854a3a-2127-422b-91ae-364da2661108https://git.kernel.org/stable/c/afbd40f425227e661d991757e11cc4db024e761f
af854a3a-2127-422b-91ae-364da2661108https://git.kernel.org/stable/c/b0ddff8d68f2e43857a84dce54c3deab181c8ae1
af854a3a-2127-422b-91ae-364da2661108https://git.kernel.org/stable/c/b2fa1f52d22c5455217b294629346ad23a744945
af854a3a-2127-422b-91ae-364da2661108https://git.kernel.org/stable/c/e7fb722586a2936b37bdff096c095c30ca06404d
af854a3a-2127-422b-91ae-364da2661108https://git.kernel.org/stable/c/e96a1866b40570b5950cda8602c2819189c62a48
Impacted products
Vendor Product Version
Linux Linux
Show details on NVD website


{
   containers: {
      adp: [
         {
            metrics: [
               {
                  cvssV3_1: {
                     attackComplexity: "LOW",
                     attackVector: "LOCAL",
                     availabilityImpact: "NONE",
                     baseScore: 5.5,
                     baseSeverity: "MEDIUM",
                     confidentialityImpact: "HIGH",
                     integrityImpact: "NONE",
                     privilegesRequired: "LOW",
                     scope: "UNCHANGED",
                     userInteraction: "NONE",
                     vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
                     version: "3.1",
                  },
               },
               {
                  other: {
                     content: {
                        id: "CVE-2021-47478",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-05-29T18:36:21.366364Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            problemTypes: [
               {
                  descriptions: [
                     {
                        cweId: "CWE-125",
                        description: "CWE-125 Out-of-bounds Read",
                        lang: "en",
                        type: "CWE",
                     },
                  ],
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-11-07T15:12:42.793Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T05:39:59.618Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://git.kernel.org/stable/c/156ce5bb6cc43a80a743810199defb1dc3f55b7f",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://git.kernel.org/stable/c/9ec33a9b8790c212cc926a88c5e2105f97f3f57e",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://git.kernel.org/stable/c/afbd40f425227e661d991757e11cc4db024e761f",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://git.kernel.org/stable/c/b0ddff8d68f2e43857a84dce54c3deab181c8ae1",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://git.kernel.org/stable/c/6e80e9314f8bb52d9eabe1907698718ff01120f5",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://git.kernel.org/stable/c/86d4aedcbc69c0f84551fb70f953c24e396de2d7",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://git.kernel.org/stable/c/b2fa1f52d22c5455217b294629346ad23a744945",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://git.kernel.org/stable/c/e7fb722586a2936b37bdff096c095c30ca06404d",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://git.kernel.org/stable/c/e96a1866b40570b5950cda8602c2819189c62a48",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "unaffected",
               product: "Linux",
               programFiles: [
                  "fs/isofs/inode.c",
               ],
               repo: "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
               vendor: "Linux",
               versions: [
                  {
                     lessThan: "156ce5bb6cc43a80a743810199defb1dc3f55b7f",
                     status: "affected",
                     version: "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2",
                     versionType: "git",
                  },
                  {
                     lessThan: "9ec33a9b8790c212cc926a88c5e2105f97f3f57e",
                     status: "affected",
                     version: "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2",
                     versionType: "git",
                  },
                  {
                     lessThan: "afbd40f425227e661d991757e11cc4db024e761f",
                     status: "affected",
                     version: "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2",
                     versionType: "git",
                  },
                  {
                     lessThan: "b0ddff8d68f2e43857a84dce54c3deab181c8ae1",
                     status: "affected",
                     version: "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2",
                     versionType: "git",
                  },
                  {
                     lessThan: "6e80e9314f8bb52d9eabe1907698718ff01120f5",
                     status: "affected",
                     version: "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2",
                     versionType: "git",
                  },
                  {
                     lessThan: "86d4aedcbc69c0f84551fb70f953c24e396de2d7",
                     status: "affected",
                     version: "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2",
                     versionType: "git",
                  },
                  {
                     lessThan: "b2fa1f52d22c5455217b294629346ad23a744945",
                     status: "affected",
                     version: "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2",
                     versionType: "git",
                  },
                  {
                     lessThan: "e7fb722586a2936b37bdff096c095c30ca06404d",
                     status: "affected",
                     version: "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2",
                     versionType: "git",
                  },
                  {
                     lessThan: "e96a1866b40570b5950cda8602c2819189c62a48",
                     status: "affected",
                     version: "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2",
                     versionType: "git",
                  },
               ],
            },
            {
               defaultStatus: "affected",
               product: "Linux",
               programFiles: [
                  "fs/isofs/inode.c",
               ],
               repo: "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
               vendor: "Linux",
               versions: [
                  {
                     lessThanOrEqual: "4.4.*",
                     status: "unaffected",
                     version: "4.4.292",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "4.9.*",
                     status: "unaffected",
                     version: "4.9.290",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "4.14.*",
                     status: "unaffected",
                     version: "4.14.255",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "4.19.*",
                     status: "unaffected",
                     version: "4.19.217",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "5.4.*",
                     status: "unaffected",
                     version: "5.4.159",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "5.10.*",
                     status: "unaffected",
                     version: "5.10.79",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "5.14.*",
                     status: "unaffected",
                     version: "5.14.18",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "5.15.*",
                     status: "unaffected",
                     version: "5.15.2",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "*",
                     status: "unaffected",
                     version: "5.16",
                     versionType: "original_commit_for_fix",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In the Linux kernel, the following vulnerability has been resolved:\n\nisofs: Fix out of bound access for corrupted isofs image\n\nWhen isofs image is suitably corrupted isofs_read_inode() can read data\nbeyond the end of buffer. Sanity-check the directory entry length before\nusing it.",
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-12-19T07:43:10.972Z",
            orgId: "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
            shortName: "Linux",
         },
         references: [
            {
               url: "https://git.kernel.org/stable/c/156ce5bb6cc43a80a743810199defb1dc3f55b7f",
            },
            {
               url: "https://git.kernel.org/stable/c/9ec33a9b8790c212cc926a88c5e2105f97f3f57e",
            },
            {
               url: "https://git.kernel.org/stable/c/afbd40f425227e661d991757e11cc4db024e761f",
            },
            {
               url: "https://git.kernel.org/stable/c/b0ddff8d68f2e43857a84dce54c3deab181c8ae1",
            },
            {
               url: "https://git.kernel.org/stable/c/6e80e9314f8bb52d9eabe1907698718ff01120f5",
            },
            {
               url: "https://git.kernel.org/stable/c/86d4aedcbc69c0f84551fb70f953c24e396de2d7",
            },
            {
               url: "https://git.kernel.org/stable/c/b2fa1f52d22c5455217b294629346ad23a744945",
            },
            {
               url: "https://git.kernel.org/stable/c/e7fb722586a2936b37bdff096c095c30ca06404d",
            },
            {
               url: "https://git.kernel.org/stable/c/e96a1866b40570b5950cda8602c2819189c62a48",
            },
         ],
         title: "isofs: Fix out of bound access for corrupted isofs image",
         x_generator: {
            engine: "bippy-5f407fcff5a0",
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
      assignerShortName: "Linux",
      cveId: "CVE-2021-47478",
      datePublished: "2024-05-22T08:19:31.521Z",
      dateReserved: "2024-05-22T06:20:56.200Z",
      dateUpdated: "2024-12-19T07:43:10.972Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
   "vulnerability-lookup:meta": {
      nvd: "{\"cve\":{\"id\":\"CVE-2021-47478\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2024-05-22T09:15:09.747\",\"lastModified\":\"2024-11-21T06:36:16.007\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nisofs: Fix out of bound access for corrupted isofs image\\n\\nWhen isofs image is suitably corrupted isofs_read_inode() can read data\\nbeyond the end of buffer. Sanity-check the directory entry length before\\nusing it.\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: isofs: corrige el acceso fuera de los límites para una imagen isofs corrupta. Cuando la imagen isofs está adecuadamente dañada, isofs_read_inode() puede leer datos más allá del final del búfer. Cordura: verifique la longitud de la entrada del directorio antes de usarla.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-125\"}]}],\"references\":[{\"url\":\"https://git.kernel.org/stable/c/156ce5bb6cc43a80a743810199defb1dc3f55b7f\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/6e80e9314f8bb52d9eabe1907698718ff01120f5\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/86d4aedcbc69c0f84551fb70f953c24e396de2d7\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/9ec33a9b8790c212cc926a88c5e2105f97f3f57e\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/afbd40f425227e661d991757e11cc4db024e761f\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/b0ddff8d68f2e43857a84dce54c3deab181c8ae1\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/b2fa1f52d22c5455217b294629346ad23a744945\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/e7fb722586a2936b37bdff096c095c30ca06404d\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/e96a1866b40570b5950cda8602c2819189c62a48\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/156ce5bb6cc43a80a743810199defb1dc3f55b7f\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://git.kernel.org/stable/c/6e80e9314f8bb52d9eabe1907698718ff01120f5\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://git.kernel.org/stable/c/86d4aedcbc69c0f84551fb70f953c24e396de2d7\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://git.kernel.org/stable/c/9ec33a9b8790c212cc926a88c5e2105f97f3f57e\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://git.kernel.org/stable/c/afbd40f425227e661d991757e11cc4db024e761f\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://git.kernel.org/stable/c/b0ddff8d68f2e43857a84dce54c3deab181c8ae1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://git.kernel.org/stable/c/b2fa1f52d22c5455217b294629346ad23a744945\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://git.kernel.org/stable/c/e7fb722586a2936b37bdff096c095c30ca06404d\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://git.kernel.org/stable/c/e96a1866b40570b5950cda8602c2819189c62a48\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}",
   },
}


Log in or create an account to share your comment.

Security Advisory comment format.

This schema specifies the format of a comment related to a security advisory.

UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).



Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.