CVE-2021-47339
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
21/05/2024
Last modified:
06/03/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
media: v4l2-core: explicitly clear ioctl input data<br />
<br />
As seen from a recent syzbot bug report, mistakes in the compat ioctl<br />
implementation can lead to uninitialized kernel stack data getting used<br />
as input for driver ioctl handlers.<br />
<br />
The reported bug is now fixed, but it&#39;s possible that other related<br />
bugs are still present or get added in the future. As the drivers need<br />
to check user input already, the possible impact is fairly low, but it<br />
might still cause an information leak.<br />
<br />
To be on the safe side, always clear the entire ioctl buffer before<br />
calling the conversion handler functions that are meant to initialize<br />
them.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.12.18 (excluding) | |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.13 (including) | 5.13.3 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/7b53cca764f9b291b7907fcd39d9e66ad728ee0b
- https://git.kernel.org/stable/c/bfb48b54db25c3b4ef4bef5e0691464ebc4aa335
- https://git.kernel.org/stable/c/dc02c0b2bd6096f2f3ce63e1fc317aeda05f74d8
- https://git.kernel.org/stable/c/7b53cca764f9b291b7907fcd39d9e66ad728ee0b
- https://git.kernel.org/stable/c/bfb48b54db25c3b4ef4bef5e0691464ebc4aa335
- https://git.kernel.org/stable/c/dc02c0b2bd6096f2f3ce63e1fc317aeda05f74d8



