CVE-2021-47210

In the Linux kernel, the following vulnerability has been resolved: usb: typec: tipd: Remove WARN_ON in tps6598x_block_read Calling tps6598x_block_read with a higher than allowed len can be handled by just returning an error. There's no need to crash systems with panic-on-warn enabled.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

27 Mar 2025, 21:17

Type Values Removed Values Added
First Time Linux
Linux linux Kernel
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CWE CWE-125
References () https://git.kernel.org/stable/c/2a897d384513ba7f7ef05611338b9a6ec6aeac00 - () https://git.kernel.org/stable/c/2a897d384513ba7f7ef05611338b9a6ec6aeac00 - Patch
References () https://git.kernel.org/stable/c/2c71811c963b6c310a29455d521d31a7ea6c5b5e - () https://git.kernel.org/stable/c/2c71811c963b6c310a29455d521d31a7ea6c5b5e - Patch
References () https://git.kernel.org/stable/c/30dcfcda8992dc42f18e7d35b6a1fa72372d382d - () https://git.kernel.org/stable/c/30dcfcda8992dc42f18e7d35b6a1fa72372d382d - Patch
References () https://git.kernel.org/stable/c/b7a0a63f3fed57d413bb857de164ea9c3984bc4e - () https://git.kernel.org/stable/c/b7a0a63f3fed57d413bb857de164ea9c3984bc4e - Patch
References () https://git.kernel.org/stable/c/eff8b7628410cb2eb562ca0d5d1f12e27063733e - () https://git.kernel.org/stable/c/eff8b7628410cb2eb562ca0d5d1f12e27063733e - Patch

21 Nov 2024, 06:35

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/2a897d384513ba7f7ef05611338b9a6ec6aeac00 - () https://git.kernel.org/stable/c/2a897d384513ba7f7ef05611338b9a6ec6aeac00 -
References () https://git.kernel.org/stable/c/2c71811c963b6c310a29455d521d31a7ea6c5b5e - () https://git.kernel.org/stable/c/2c71811c963b6c310a29455d521d31a7ea6c5b5e -
References () https://git.kernel.org/stable/c/30dcfcda8992dc42f18e7d35b6a1fa72372d382d - () https://git.kernel.org/stable/c/30dcfcda8992dc42f18e7d35b6a1fa72372d382d -
References () https://git.kernel.org/stable/c/b7a0a63f3fed57d413bb857de164ea9c3984bc4e - () https://git.kernel.org/stable/c/b7a0a63f3fed57d413bb857de164ea9c3984bc4e -
References () https://git.kernel.org/stable/c/eff8b7628410cb2eb562ca0d5d1f12e27063733e - () https://git.kernel.org/stable/c/eff8b7628410cb2eb562ca0d5d1f12e27063733e -
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: usb: typec: tipd: Eliminar WARN_ON en tps6598x_block_read Llamar a tps6598x_block_read con una longitud mayor que la permitida se puede solucionar simplemente devolviendo un error. No es necesario bloquear los sistemas con la función de pánico al advertir habilitada.

10 Apr 2024, 19:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-04-10 19:15

Updated : 2025-03-27 21:17


NVD link : CVE-2021-47210

Mitre link : CVE-2021-47210

CVE.ORG link : CVE-2021-47210


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-125

Out-of-bounds Read