In the Linux kernel, the following vulnerability has been resolved:
isofs: Fix out of bound access for corrupted isofs image
When isofs image is suitably corrupted isofs_read_inode() can read data
beyond the end of buffer. Sanity-check the directory entry length before
using it.
References
Configurations
Configuration 1 (hide)
|
History
02 Apr 2025, 15:09
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
References | () https://git.kernel.org/stable/c/156ce5bb6cc43a80a743810199defb1dc3f55b7f - Patch | |
References | () https://git.kernel.org/stable/c/6e80e9314f8bb52d9eabe1907698718ff01120f5 - Patch | |
References | () https://git.kernel.org/stable/c/86d4aedcbc69c0f84551fb70f953c24e396de2d7 - Patch | |
References | () https://git.kernel.org/stable/c/9ec33a9b8790c212cc926a88c5e2105f97f3f57e - Patch | |
References | () https://git.kernel.org/stable/c/afbd40f425227e661d991757e11cc4db024e761f - Patch | |
References | () https://git.kernel.org/stable/c/b0ddff8d68f2e43857a84dce54c3deab181c8ae1 - Patch | |
References | () https://git.kernel.org/stable/c/b2fa1f52d22c5455217b294629346ad23a744945 - Patch | |
References | () https://git.kernel.org/stable/c/e7fb722586a2936b37bdff096c095c30ca06404d - Patch | |
References | () https://git.kernel.org/stable/c/e96a1866b40570b5950cda8602c2819189c62a48 - Patch | |
First Time |
Linux linux Kernel
Linux |
21 Nov 2024, 06:36
Type | Values Removed | Values Added |
---|---|---|
References | () https://git.kernel.org/stable/c/156ce5bb6cc43a80a743810199defb1dc3f55b7f - | |
References | () https://git.kernel.org/stable/c/6e80e9314f8bb52d9eabe1907698718ff01120f5 - | |
References | () https://git.kernel.org/stable/c/86d4aedcbc69c0f84551fb70f953c24e396de2d7 - | |
References | () https://git.kernel.org/stable/c/9ec33a9b8790c212cc926a88c5e2105f97f3f57e - | |
References | () https://git.kernel.org/stable/c/afbd40f425227e661d991757e11cc4db024e761f - | |
References | () https://git.kernel.org/stable/c/b0ddff8d68f2e43857a84dce54c3deab181c8ae1 - | |
References | () https://git.kernel.org/stable/c/b2fa1f52d22c5455217b294629346ad23a744945 - | |
References | () https://git.kernel.org/stable/c/e7fb722586a2936b37bdff096c095c30ca06404d - | |
References | () https://git.kernel.org/stable/c/e96a1866b40570b5950cda8602c2819189c62a48 - |
07 Nov 2024, 16:35
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-125 | |
Summary |
|
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
22 May 2024, 09:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-05-22 09:15
Updated : 2025-04-02 15:09
NVD link : CVE-2021-47478
Mitre link : CVE-2021-47478
CVE.ORG link : CVE-2021-47478
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-125
Out-of-bounds Read