Lucene search

K
cve416baaa9-dc9f-4396-8d5f-8c081fb06d67CVE-2021-46952
HistoryFeb 27, 2024 - 7:04 p.m.

CVE-2021-46952

2024-02-2719:04:06
CWE-125
416baaa9-dc9f-4396-8d5f-8c081fb06d67
web.nvd.nist.gov
543
cve-2021-46952
linux kernel
nfs
vulnerability
security
fix
retrans
mount option
udp
shift out-of-bounds

7.1 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H

6.3 Medium

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

5.1%

In the Linux kernel, the following vulnerability has been resolved:

NFS: fs_context: validate UDP retrans to prevent shift out-of-bounds

Fix shift out-of-bounds in xprt_calc_majortimeo(). This is caused
by a garbage timeout (retrans) mount option being passed to nfs mount,
in this case from syzkaller.

If the protocol is XPRT_TRANSPORT_UDP, then ‘retrans’ is a shift
value for a 64-bit long integer, so ‘retrans’ cannot be >= 64.
If it is >= 64, fail the mount and return an error.

Affected configurations

Vulners
NVD
Node
linuxlinux_kernelRange5.65.10.36
OR
linuxlinux_kernelRange5.11.05.11.20
OR
linuxlinux_kernelRange5.12.05.12.3
OR
linuxlinux_kernelRange5.13.0
VendorProductVersionCPE
linuxlinux_kernel*cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
linuxlinux_kernel*cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
linuxlinux_kernel*cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
linuxlinux_kernel*cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "product": "Linux",
    "vendor": "Linux",
    "defaultStatus": "unaffected",
    "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
    "programFiles": [
      "fs/nfs/fs_context.c"
    ],
    "versions": [
      {
        "version": "9954bf92c0cd",
        "lessThan": "96fa26b74cdc",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "9954bf92c0cd",
        "lessThan": "2f3380121d49",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "9954bf92c0cd",
        "lessThan": "3d0163821c03",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "9954bf92c0cd",
        "lessThan": "c09f11ef3595",
        "status": "affected",
        "versionType": "git"
      }
    ]
  },
  {
    "product": "Linux",
    "vendor": "Linux",
    "defaultStatus": "affected",
    "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
    "programFiles": [
      "fs/nfs/fs_context.c"
    ],
    "versions": [
      {
        "version": "5.6",
        "status": "affected"
      },
      {
        "version": "0",
        "lessThan": "5.6",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "5.10.36",
        "lessThanOrEqual": "5.10.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "5.11.20",
        "lessThanOrEqual": "5.11.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "5.12.3",
        "lessThanOrEqual": "5.12.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "5.13",
        "lessThanOrEqual": "*",
        "status": "unaffected",
        "versionType": "original_commit_for_fix"
      }
    ]
  }
]

7.1 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H

6.3 Medium

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

5.1%