#VU91306 Buffer overflow in Linux kernel - CVE-2021-47458
Published: June 8, 2024 / Updated: May 13, 2025
Vulnerability identifier: #VU91306
Vulnerability risk: Low
CVSSv4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2021-47458
CWE-ID: CWE-119
Exploitation vector: Local access
Exploit availability:
No public exploit available
Vulnerable software:
Linux kernel
Linux kernel
Software vendor:
Linux Foundation
Linux Foundation
Description
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to memory corruption within the ocfs2_initialize_super() function in fs/ocfs2/super.c. A local user can escalate privileges on the system.
Remediation
Install update from vendor's website.
External links
- https://git.kernel.org/stable/c/ac011cb3ff7a76b3e0e6e77158ee4ba2f929e1fb
- https://git.kernel.org/stable/c/4b74ddcc22ee6455946e80a9c4808801f8f8561e
- https://git.kernel.org/stable/c/232ed9752510de4436468b653d145565669c8498
- https://git.kernel.org/stable/c/7623b1035ca2d17bde0f6a086ad6844a34648df1
- https://git.kernel.org/stable/c/d3a83576378b4c904f711598dde2c5e881c4295c
- https://git.kernel.org/stable/c/93be0eeea14cf39235e585c8f56df3b3859deaad
- https://git.kernel.org/stable/c/0e677ea5b7396f715a76b6b0ef441430e4c4b57f
- https://git.kernel.org/stable/c/b15fa9224e6e1239414525d8d556d824701849fc
- https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.253
- https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.214
- https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.290
- https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.288
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.76
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.15
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.156