CVE-2021-47166
"Linux Kernel NFS Data Corruption Vulnerability"
Description
In the Linux kernel, the following vulnerability has been resolved: NFS: Don't corrupt the value of pg_bytes_written in nfs_do_recoalesce() The value of mirror->pg_bytes_written should only be updated after a successful attempt to flush out the requests on the list.
INFO
Published Date :
March 25, 2024, 10:15 a.m.
Last Modified :
March 17, 2025, 3:03 p.m.
Remotely Exploit :
No
Source :
416baaa9-dc9f-4396-8d5f-8c081fb06d67
CVSS Scores
Score | Version | Severity | Vector | Exploitability Score | Impact Score | Source |
---|---|---|---|---|---|---|
CVSS 3.1 | MEDIUM | [email protected] |
Solution
- Update the Linux kernel packages.
- Reboot the system if required.
References to Advisories, Solutions, and Tools
Here, you will find a curated list of external links that provide in-depth
information, practical solutions, and valuable tools related to
CVE-2021-47166
.
CWE - Common Weakness Enumeration
While CVE identifies
specific instances of vulnerabilities, CWE categorizes the common flaws or
weaknesses that can lead to vulnerabilities. CVE-2021-47166
is
associated with the following CWEs:
Common Attack Pattern Enumeration and Classification (CAPEC)
Common Attack Pattern Enumeration and Classification
(CAPEC)
stores attack patterns, which are descriptions of the common attributes and
approaches employed by adversaries to exploit the CVE-2021-47166
weaknesses.
We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).
Results are limited to the first 15 repositories due to potential performance issues.
The following list is the news that have been mention
CVE-2021-47166
vulnerability anywhere in the article.
The following table lists the changes that have been made to the
CVE-2021-47166
vulnerability over time.
Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.
-
Initial Analysis by [email protected]
Mar. 17, 2025
Action Type Old Value New Value Added CVSS V3.1 AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Added CWE CWE-787 Added CPE Configuration OR *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.11 from (excluding) 5.12.9 *cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:* *cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:* *cpe:2.3:o:linux:linux_kernel:5.13:rc3:*:*:*:*:*:* *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.5 from (excluding) 5.10.42 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 4.20 from (excluding) 5.4.124 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 4.0 from (excluding) 4.4.271 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 4.5 from (excluding) 4.9.271 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 4.10 from (excluding) 4.14.235 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 4.15 from (excluding) 4.19.193 Added Reference Type CVE: https://git.kernel.org/stable/c/0d0ea309357dea0d85a82815f02157eb7fcda39f Types: Patch Added Reference Type kernel.org: https://git.kernel.org/stable/c/0d0ea309357dea0d85a82815f02157eb7fcda39f Types: Patch Added Reference Type CVE: https://git.kernel.org/stable/c/2fe1cac336b55a1f79e603e9ce3552c3623e90eb Types: Patch Added Reference Type kernel.org: https://git.kernel.org/stable/c/2fe1cac336b55a1f79e603e9ce3552c3623e90eb Types: Patch Added Reference Type CVE: https://git.kernel.org/stable/c/40f139a6d50c232c0d1fd1c5e65a845c62db0ede Types: Patch Added Reference Type kernel.org: https://git.kernel.org/stable/c/40f139a6d50c232c0d1fd1c5e65a845c62db0ede Types: Patch Added Reference Type CVE: https://git.kernel.org/stable/c/7087db95c0a06ab201b8ebfac6a7ec1e34257997 Types: Patch Added Reference Type kernel.org: https://git.kernel.org/stable/c/7087db95c0a06ab201b8ebfac6a7ec1e34257997 Types: Patch Added Reference Type CVE: https://git.kernel.org/stable/c/785917316b25685c9b3a2a88f933139f2de75e33 Types: Patch Added Reference Type kernel.org: https://git.kernel.org/stable/c/785917316b25685c9b3a2a88f933139f2de75e33 Types: Patch Added Reference Type CVE: https://git.kernel.org/stable/c/b291baae24f876acd5a5dd57d0bb2bbac8a68b0c Types: Patch Added Reference Type kernel.org: https://git.kernel.org/stable/c/b291baae24f876acd5a5dd57d0bb2bbac8a68b0c Types: Patch Added Reference Type CVE: https://git.kernel.org/stable/c/c757c1f1e65d89429db1409429436cf40d47c008 Types: Patch Added Reference Type kernel.org: https://git.kernel.org/stable/c/c757c1f1e65d89429db1409429436cf40d47c008 Types: Patch Added Reference Type CVE: https://git.kernel.org/stable/c/e8b8418ce14ae66ee55179901edd12191ab06a9e Types: Patch Added Reference Type kernel.org: https://git.kernel.org/stable/c/e8b8418ce14ae66ee55179901edd12191ab06a9e Types: Patch -
CVE Modified by af854a3a-2127-422b-91ae-364da2661108
Nov. 21, 2024
Action Type Old Value New Value Added Reference https://git.kernel.org/stable/c/0d0ea309357dea0d85a82815f02157eb7fcda39f Added Reference https://git.kernel.org/stable/c/2fe1cac336b55a1f79e603e9ce3552c3623e90eb Added Reference https://git.kernel.org/stable/c/40f139a6d50c232c0d1fd1c5e65a845c62db0ede Added Reference https://git.kernel.org/stable/c/7087db95c0a06ab201b8ebfac6a7ec1e34257997 Added Reference https://git.kernel.org/stable/c/785917316b25685c9b3a2a88f933139f2de75e33 Added Reference https://git.kernel.org/stable/c/b291baae24f876acd5a5dd57d0bb2bbac8a68b0c Added Reference https://git.kernel.org/stable/c/c757c1f1e65d89429db1409429436cf40d47c008 Added Reference https://git.kernel.org/stable/c/e8b8418ce14ae66ee55179901edd12191ab06a9e -
CVE Modified by 416baaa9-dc9f-4396-8d5f-8c081fb06d67
May. 28, 2024
Action Type Old Value New Value -
CVE Modified by 416baaa9-dc9f-4396-8d5f-8c081fb06d67
May. 14, 2024
Action Type Old Value New Value -
CVE Received by 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Mar. 25, 2024
Action Type Old Value New Value Added Description In the Linux kernel, the following vulnerability has been resolved: NFS: Don't corrupt the value of pg_bytes_written in nfs_do_recoalesce() The value of mirror->pg_bytes_written should only be updated after a successful attempt to flush out the requests on the list. Added Reference kernel.org https://git.kernel.org/stable/c/e8b8418ce14ae66ee55179901edd12191ab06a9e [No types assigned] Added Reference kernel.org https://git.kernel.org/stable/c/b291baae24f876acd5a5dd57d0bb2bbac8a68b0c [No types assigned] Added Reference kernel.org https://git.kernel.org/stable/c/c757c1f1e65d89429db1409429436cf40d47c008 [No types assigned] Added Reference kernel.org https://git.kernel.org/stable/c/40f139a6d50c232c0d1fd1c5e65a845c62db0ede [No types assigned] Added Reference kernel.org https://git.kernel.org/stable/c/785917316b25685c9b3a2a88f933139f2de75e33 [No types assigned] Added Reference kernel.org https://git.kernel.org/stable/c/7087db95c0a06ab201b8ebfac6a7ec1e34257997 [No types assigned] Added Reference kernel.org https://git.kernel.org/stable/c/2fe1cac336b55a1f79e603e9ce3552c3623e90eb [No types assigned] Added Reference kernel.org https://git.kernel.org/stable/c/0d0ea309357dea0d85a82815f02157eb7fcda39f [No types assigned]