CVE-2021-47458

Severity CVSS v4.0:
Pending analysis
Type:
CWE-787 Out-of-bounds Write
Publication date:
22/05/2024
Last modified:
23/09/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> ocfs2: mount fails with buffer overflow in strlen<br /> <br /> Starting with kernel 5.11 built with CONFIG_FORTIFY_SOURCE mouting an<br /> ocfs2 filesystem with either o2cb or pcmk cluster stack fails with the<br /> trace below. Problem seems to be that strings for cluster stack and<br /> cluster name are not guaranteed to be null terminated in the disk<br /> representation, while strlcpy assumes that the source string is always<br /> null terminated. This causes a read outside of the source string<br /> triggering the buffer overflow detection.<br /> <br /> detected buffer overflow in strlen<br /> ------------[ cut here ]------------<br /> kernel BUG at lib/string.c:1149!<br /> invalid opcode: 0000 [#1] SMP PTI<br /> CPU: 1 PID: 910 Comm: mount.ocfs2 Not tainted 5.14.0-1-amd64 #1<br /> Debian 5.14.6-2<br /> RIP: 0010:fortify_panic+0xf/0x11<br /> ...<br /> Call Trace:<br /> ocfs2_initialize_super.isra.0.cold+0xc/0x18 [ocfs2]<br /> ocfs2_fill_super+0x359/0x19b0 [ocfs2]<br /> mount_bdev+0x185/0x1b0<br /> legacy_get_tree+0x27/0x40<br /> vfs_get_tree+0x25/0xb0<br /> path_mount+0x454/0xa20<br /> __x64_sys_mount+0x103/0x140<br /> do_syscall_64+0x3b/0xc0<br /> entry_SYSCALL_64_after_hwframe+0x44/0xae

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.4.290 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.5 (including) 4.9.288 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.10 (including) 4.14.253 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.15 (including) 4.19.214 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.20 (including) 5.4.156 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.5 (including) 5.10.76 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.11 (including) 5.14.15 (excluding)
cpe:2.3:o:linux:linux_kernel:5.15:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.15:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.15:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.15:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.15:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.15:rc6:*:*:*:*:*:*