CVE-2021-46965

In the Linux kernel, the following vulnerability has been resolved: mtd: physmap: physmap-bt1-rom: Fix unintentional stack access Cast &data to (char *) in order to avoid unintentionally accessing the stack. Notice that data is of type u32, so any increment to &data will be in the order of 4-byte chunks, and this piece of code is actually intended to be a byte offset. Addresses-Coverity-ID: 1497765 ("Out-of-bounds access")
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

08 Jan 2025, 17:16

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/34ec706bf0b7c4ca249a729c1bcb91f706c7a7be - () https://git.kernel.org/stable/c/34ec706bf0b7c4ca249a729c1bcb91f706c7a7be - Patch
References () https://git.kernel.org/stable/c/4d786870e3262ec098a3b4ed10b895176bc66ecb - () https://git.kernel.org/stable/c/4d786870e3262ec098a3b4ed10b895176bc66ecb - Patch
References () https://git.kernel.org/stable/c/4e4ebb827bf09311469ffd9d0c14ed40ed9747aa - () https://git.kernel.org/stable/c/4e4ebb827bf09311469ffd9d0c14ed40ed9747aa - Patch
References () https://git.kernel.org/stable/c/683313993dbe1651c7aa00bb42a041d70e914925 - () https://git.kernel.org/stable/c/683313993dbe1651c7aa00bb42a041d70e914925 - Patch
First Time Linux
Linux linux Kernel
CWE CWE-125
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.1
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

21 Nov 2024, 06:35

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/34ec706bf0b7c4ca249a729c1bcb91f706c7a7be - () https://git.kernel.org/stable/c/34ec706bf0b7c4ca249a729c1bcb91f706c7a7be -
References () https://git.kernel.org/stable/c/4d786870e3262ec098a3b4ed10b895176bc66ecb - () https://git.kernel.org/stable/c/4d786870e3262ec098a3b4ed10b895176bc66ecb -
References () https://git.kernel.org/stable/c/4e4ebb827bf09311469ffd9d0c14ed40ed9747aa - () https://git.kernel.org/stable/c/4e4ebb827bf09311469ffd9d0c14ed40ed9747aa -
References () https://git.kernel.org/stable/c/683313993dbe1651c7aa00bb42a041d70e914925 - () https://git.kernel.org/stable/c/683313993dbe1651c7aa00bb42a041d70e914925 -

28 Feb 2024, 14:06

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mtd: physmap: physmap-bt1-rom: corrige el acceso involuntario a la pila. Transmite &data a (char *) para evitar el acceso involuntario a la pila. Tenga en cuenta que los datos son de tipo u32, por lo que cualquier incremento en &data será del orden de fragmentos de 4 bytes, y este fragmento de código en realidad está destinado a ser un desplazamiento de bytes. Direcciones-Coverity-ID: 1497765 ("Acceso fuera de límites")

27 Feb 2024, 19:04

Type Values Removed Values Added
New CVE

Information

Published : 2024-02-27 19:04

Updated : 2025-01-08 17:16


NVD link : CVE-2021-46965

Mitre link : CVE-2021-46965

CVE.ORG link : CVE-2021-46965


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-125

Out-of-bounds Read