First published: Mon May 17 2021(Updated: )
A flaw was found in the Linux kernel. A incorrect size check in decode_nfs_fh() may lead to an overwrite of 2 bytes beyond destination. References: <a href="https://lore.kernel.org/lkml/20210517140244.822185482@linuxfoundation.org/">https://lore.kernel.org/lkml/20210517140244.822185482@linuxfoundation.org/</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel-rt | <0:4.18.0-372.9.1.rt7.166.el8 | 0:4.18.0-372.9.1.rt7.166.el8 |
redhat/kernel | <0:4.18.0-372.9.1.el8 | 0:4.18.0-372.9.1.el8 |
redhat/kernel | <5.13 | 5.13 |
Linux Kernel | >=4.0<4.4.269 | |
Linux Kernel | >=4.5<4.9.269 | |
Linux Kernel | >=4.10<4.14.233 | |
Linux Kernel | >=4.15<4.19.191 | |
Linux Kernel | >=4.20<5.4.120 | |
Linux Kernel | >=5.5<5.10.38 | |
Linux Kernel | >=5.11<5.11.22 | |
Linux Kernel | >=5.12<5.12.5 | |
Red Hat Fedora | =35 | |
All of | ||
NetApp H300E | ||
NetApp H300E Firmware | ||
All of | ||
NetApp H300S Firmware | ||
NetApp H300S Firmware | ||
All of | ||
NetApp H500S Firmware | ||
NetApp H500e Firmware | ||
All of | ||
NetApp H500e Firmware | ||
NetApp H500e Firmware | ||
All of | ||
NetApp H700E | ||
NetApp H700E | ||
All of | ||
NetApp H700S | ||
NetApp H700S | ||
All of | ||
NetApp H410S | ||
NetApp H410S Firmware | ||
Oracle Communications Cloud Native Core Binding Support Function | =22.1.1 | |
Oracle Communications Cloud Native Core Binding Support Function | =22.1.3 | |
Oracle Communications Cloud Native Core Binding Support Function | =22.2.0 | |
NetApp H300E | ||
NetApp H300E Firmware | ||
NetApp H300S Firmware | ||
NetApp H300S Firmware | ||
NetApp H500S Firmware | ||
NetApp H500e Firmware | ||
NetApp H500e Firmware | ||
NetApp H500e Firmware | ||
NetApp H700E | ||
NetApp H700E | ||
NetApp H700S | ||
NetApp H700S | ||
NetApp H410S | ||
NetApp H410S Firmware | ||
debian/linux | 5.10.223-1 5.10.234-1 6.1.129-1 6.1.133-1 6.12.21-1 6.12.22-1 |
Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-4157 has been classified as a medium severity vulnerability due to the potential for memory corruption leading to arbitrary code execution.
To remediate CVE-2021-4157, update to the patched version of the Linux kernel as indicated in the vulnerability details.
CVE-2021-4157 affects various versions of the Linux kernel, specifically those before 4.18.0-372.9.1.el8 and across several other version ranges.
Exploitation of CVE-2021-4157 may lead to a crash of the affected system or potentially allow an attacker to execute arbitrary code.
Yes, CVE-2021-4157 primarily affects Red Hat-based distributions of the Linux kernel, but may impact other distributions that use vulnerable kernel versions.