In the Linux kernel, the following vulnerability has been resolved:
NFS: fix an incorrect limit in filelayoutdecodelayout()
The "sizeof(struct nfsfh)" is two bytes too large and could lead to memory corruption. It should be NFSMAXFHSIZE because that's the size of the ->data[] buffer.
I reversed the size of the arguments to put the variable on the left.
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-47168.json"
[
{
"events": [
{
"introduced": "2.6.37"
},
{
"fixed": "4.4.271"
}
]
},
{
"events": [
{
"introduced": "4.5"
},
{
"fixed": "4.9.271"
}
]
},
{
"events": [
{
"introduced": "4.10"
},
{
"fixed": "4.14.235"
}
]
},
{
"events": [
{
"introduced": "4.15"
},
{
"fixed": "4.19.193"
}
]
},
{
"events": [
{
"introduced": "4.20"
},
{
"fixed": "5.4.124"
}
]
},
{
"events": [
{
"introduced": "5.5"
},
{
"fixed": "5.10.42"
}
]
},
{
"events": [
{
"introduced": "5.11"
},
{
"fixed": "5.12.9"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "5.13-rc1"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "5.13-rc2"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "5.13-rc3"
}
]
}
]