CVE-2021-47286

In the Linux kernel, the following vulnerability has been resolved: bus: mhi: core: Validate channel ID when processing command completions MHI reads the channel ID from the event ring element sent by the device which can be any value between 0 and 255. In order to prevent any out of bound accesses, add a check against the maximum number of channels supported by the controller and those channels not configured yet so as to skip processing of that event ring element.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.14:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.14:rc2:*:*:*:*:*:*

History

30 Apr 2025, 14:26

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:5.14:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.14:rc2:*:*:*:*:*:*
CWE CWE-787
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
First Time Linux linux Kernel
Linux
References () https://git.kernel.org/stable/c/3efec3b4b16fc7af25676a94230a8ab2a3bb867c - () https://git.kernel.org/stable/c/3efec3b4b16fc7af25676a94230a8ab2a3bb867c - Patch
References () https://git.kernel.org/stable/c/546362a9ef2ef40b57c6605f14e88ced507f8dd0 - () https://git.kernel.org/stable/c/546362a9ef2ef40b57c6605f14e88ced507f8dd0 - Patch
References () https://git.kernel.org/stable/c/aed4f5b51aba41e2afd7cfda20a0571a6a67dfe9 - () https://git.kernel.org/stable/c/aed4f5b51aba41e2afd7cfda20a0571a6a67dfe9 - Patch

21 Nov 2024, 06:35

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: bus: mhi: core: valida el ID del canal al procesar la finalización del comando MHI lee el ID del canal del elemento del anillo de eventos enviado por el dispositivo, que puede tener cualquier valor entre 0 y 255. Para evitar accesos fuera de los límites, agregue una verificación del número máximo de canales admitidos por el controlador y aquellos canales que aún no están configurados para omitir el procesamiento de ese elemento del anillo de eventos.
References () https://git.kernel.org/stable/c/3efec3b4b16fc7af25676a94230a8ab2a3bb867c - () https://git.kernel.org/stable/c/3efec3b4b16fc7af25676a94230a8ab2a3bb867c -
References () https://git.kernel.org/stable/c/546362a9ef2ef40b57c6605f14e88ced507f8dd0 - () https://git.kernel.org/stable/c/546362a9ef2ef40b57c6605f14e88ced507f8dd0 -
References () https://git.kernel.org/stable/c/aed4f5b51aba41e2afd7cfda20a0571a6a67dfe9 - () https://git.kernel.org/stable/c/aed4f5b51aba41e2afd7cfda20a0571a6a67dfe9 -

21 May 2024, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-21 15:15

Updated : 2025-04-30 14:26


NVD link : CVE-2021-47286

Mitre link : CVE-2021-47286

CVE.ORG link : CVE-2021-47286


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-787

Out-of-bounds Write