CVE-2021-47286
Severity CVSS v4.0:
Pending analysis
Type:
CWE-787
Out-of-bounds Write
Publication date:
21/05/2024
Last modified:
30/04/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
bus: mhi: core: Validate channel ID when processing command completions<br />
<br />
MHI reads the channel ID from the event ring element sent by the<br />
device which can be any value between 0 and 255. In order to<br />
prevent any out of bound accesses, add a check against the maximum<br />
number of channels supported by the controller and those channels<br />
not configured yet so as to skip processing of that event ring<br />
element.
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.7 (including) | 5.10.54 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.13.6 (excluding) |
| cpe:2.3:o:linux:linux_kernel:5.14:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.14:rc2:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/3efec3b4b16fc7af25676a94230a8ab2a3bb867c
- https://git.kernel.org/stable/c/546362a9ef2ef40b57c6605f14e88ced507f8dd0
- https://git.kernel.org/stable/c/aed4f5b51aba41e2afd7cfda20a0571a6a67dfe9
- https://git.kernel.org/stable/c/3efec3b4b16fc7af25676a94230a8ab2a3bb867c
- https://git.kernel.org/stable/c/546362a9ef2ef40b57c6605f14e88ced507f8dd0
- https://git.kernel.org/stable/c/aed4f5b51aba41e2afd7cfda20a0571a6a67dfe9



