gsd-2021-47166
Vulnerability from gsd
Modified
2024-04-03 05:03
Details
In the Linux kernel, the following vulnerability has been resolved: NFS: Don't corrupt the value of pg_bytes_written in nfs_do_recoalesce() The value of mirror->pg_bytes_written should only be updated after a successful attempt to flush out the requests on the list.
Aliases



{
   gsd: {
      metadata: {
         exploitCode: "unknown",
         remediation: "unknown",
         reportConfidence: "confirmed",
         type: "vulnerability",
      },
      osvSchema: {
         aliases: [
            "CVE-2021-47166",
         ],
         details: "In the Linux kernel, the following vulnerability has been resolved:\n\nNFS: Don't corrupt the value of pg_bytes_written in nfs_do_recoalesce()\n\nThe value of mirror->pg_bytes_written should only be updated after a\nsuccessful attempt to flush out the requests on the list.",
         id: "GSD-2021-47166",
         modified: "2024-04-03T05:03:54.921101Z",
         schema_version: "1.4.0",
      },
   },
   namespaces: {
      "cve.org": {
         CVE_data_meta: {
            ASSIGNER: "cve@kernel.org",
            ID: "CVE-2021-47166",
            STATE: "PUBLIC",
         },
         affects: {
            vendor: {
               vendor_data: [
                  {
                     product: {
                        product_data: [
                           {
                              product_name: "Linux",
                              version: {
                                 version_data: [
                                    {
                                       version_affected: "<",
                                       version_name: "a7d42ddb3099",
                                       version_value: "e8b8418ce14a",
                                    },
                                    {
                                       version_value: "not down converted",
                                       x_cve_json_5_version_data: {
                                          defaultStatus: "affected",
                                          versions: [
                                             {
                                                status: "affected",
                                                version: "4.0",
                                             },
                                             {
                                                lessThan: "4.0",
                                                status: "unaffected",
                                                version: "0",
                                                versionType: "custom",
                                             },
                                             {
                                                lessThanOrEqual: "4.4.*",
                                                status: "unaffected",
                                                version: "4.4.271",
                                                versionType: "custom",
                                             },
                                             {
                                                lessThanOrEqual: "4.9.*",
                                                status: "unaffected",
                                                version: "4.9.271",
                                                versionType: "custom",
                                             },
                                             {
                                                lessThanOrEqual: "4.14.*",
                                                status: "unaffected",
                                                version: "4.14.235",
                                                versionType: "custom",
                                             },
                                             {
                                                lessThanOrEqual: "4.19.*",
                                                status: "unaffected",
                                                version: "4.19.193",
                                                versionType: "custom",
                                             },
                                             {
                                                lessThanOrEqual: "5.4.*",
                                                status: "unaffected",
                                                version: "5.4.124",
                                                versionType: "custom",
                                             },
                                             {
                                                lessThanOrEqual: "5.10.*",
                                                status: "unaffected",
                                                version: "5.10.42",
                                                versionType: "custom",
                                             },
                                             {
                                                lessThanOrEqual: "5.12.*",
                                                status: "unaffected",
                                                version: "5.12.9",
                                                versionType: "custom",
                                             },
                                             {
                                                lessThanOrEqual: "*",
                                                status: "unaffected",
                                                version: "5.13",
                                                versionType: "original_commit_for_fix",
                                             },
                                          ],
                                       },
                                    },
                                 ],
                              },
                           },
                        ],
                     },
                     vendor_name: "Linux",
                  },
               ],
            },
         },
         data_format: "MITRE",
         data_type: "CVE",
         data_version: "4.0",
         description: {
            description_data: [
               {
                  lang: "eng",
                  value: "In the Linux kernel, the following vulnerability has been resolved:\n\nNFS: Don't corrupt the value of pg_bytes_written in nfs_do_recoalesce()\n\nThe value of mirror->pg_bytes_written should only be updated after a\nsuccessful attempt to flush out the requests on the list.",
               },
            ],
         },
         generator: {
            engine: "bippy-b4257b672505",
         },
         problemtype: {
            problemtype_data: [
               {
                  description: [
                     {
                        lang: "eng",
                        value: "n/a",
                     },
                  ],
               },
            ],
         },
         references: {
            reference_data: [
               {
                  name: "https://git.kernel.org/stable/c/e8b8418ce14ae66ee55179901edd12191ab06a9e",
                  refsource: "MISC",
                  url: "https://git.kernel.org/stable/c/e8b8418ce14ae66ee55179901edd12191ab06a9e",
               },
               {
                  name: "https://git.kernel.org/stable/c/b291baae24f876acd5a5dd57d0bb2bbac8a68b0c",
                  refsource: "MISC",
                  url: "https://git.kernel.org/stable/c/b291baae24f876acd5a5dd57d0bb2bbac8a68b0c",
               },
               {
                  name: "https://git.kernel.org/stable/c/c757c1f1e65d89429db1409429436cf40d47c008",
                  refsource: "MISC",
                  url: "https://git.kernel.org/stable/c/c757c1f1e65d89429db1409429436cf40d47c008",
               },
               {
                  name: "https://git.kernel.org/stable/c/40f139a6d50c232c0d1fd1c5e65a845c62db0ede",
                  refsource: "MISC",
                  url: "https://git.kernel.org/stable/c/40f139a6d50c232c0d1fd1c5e65a845c62db0ede",
               },
               {
                  name: "https://git.kernel.org/stable/c/785917316b25685c9b3a2a88f933139f2de75e33",
                  refsource: "MISC",
                  url: "https://git.kernel.org/stable/c/785917316b25685c9b3a2a88f933139f2de75e33",
               },
               {
                  name: "https://git.kernel.org/stable/c/7087db95c0a06ab201b8ebfac6a7ec1e34257997",
                  refsource: "MISC",
                  url: "https://git.kernel.org/stable/c/7087db95c0a06ab201b8ebfac6a7ec1e34257997",
               },
               {
                  name: "https://git.kernel.org/stable/c/2fe1cac336b55a1f79e603e9ce3552c3623e90eb",
                  refsource: "MISC",
                  url: "https://git.kernel.org/stable/c/2fe1cac336b55a1f79e603e9ce3552c3623e90eb",
               },
               {
                  name: "https://git.kernel.org/stable/c/0d0ea309357dea0d85a82815f02157eb7fcda39f",
                  refsource: "MISC",
                  url: "https://git.kernel.org/stable/c/0d0ea309357dea0d85a82815f02157eb7fcda39f",
               },
            ],
         },
      },
      "nvd.nist.gov": {
         cve: {
            descriptions: [
               {
                  lang: "en",
                  value: "In the Linux kernel, the following vulnerability has been resolved:\n\nNFS: Don't corrupt the value of pg_bytes_written in nfs_do_recoalesce()\n\nThe value of mirror->pg_bytes_written should only be updated after a\nsuccessful attempt to flush out the requests on the list.",
               },
               {
                  lang: "es",
                  value: "En el kernel de Linux, se resolvió la siguiente vulnerabilidad: NFS: no corrompa el valor de pg_bytes_writing en nfs_do_recoalesce() El valor de mirror-&gt;pg_bytes_write solo debe actualizarse después de un intento exitoso de eliminar las solicitudes de la lista.",
               },
            ],
            id: "CVE-2021-47166",
            lastModified: "2024-03-25T13:47:14.087",
            metrics: {},
            published: "2024-03-25T10:15:08.667",
            references: [
               {
                  source: "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
                  url: "https://git.kernel.org/stable/c/0d0ea309357dea0d85a82815f02157eb7fcda39f",
               },
               {
                  source: "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
                  url: "https://git.kernel.org/stable/c/2fe1cac336b55a1f79e603e9ce3552c3623e90eb",
               },
               {
                  source: "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
                  url: "https://git.kernel.org/stable/c/40f139a6d50c232c0d1fd1c5e65a845c62db0ede",
               },
               {
                  source: "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
                  url: "https://git.kernel.org/stable/c/7087db95c0a06ab201b8ebfac6a7ec1e34257997",
               },
               {
                  source: "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
                  url: "https://git.kernel.org/stable/c/785917316b25685c9b3a2a88f933139f2de75e33",
               },
               {
                  source: "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
                  url: "https://git.kernel.org/stable/c/b291baae24f876acd5a5dd57d0bb2bbac8a68b0c",
               },
               {
                  source: "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
                  url: "https://git.kernel.org/stable/c/c757c1f1e65d89429db1409429436cf40d47c008",
               },
               {
                  source: "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
                  url: "https://git.kernel.org/stable/c/e8b8418ce14ae66ee55179901edd12191ab06a9e",
               },
            ],
            sourceIdentifier: "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
            vulnStatus: "Awaiting Analysis",
         },
      },
   },
}


Log in or create an account to share your comment.

Security Advisory comment format.

This schema specifies the format of a comment related to a security advisory.

UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).



Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.