CVE-2021-47339

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
21/05/2024
Last modified:
06/03/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> media: v4l2-core: explicitly clear ioctl input data<br /> <br /> As seen from a recent syzbot bug report, mistakes in the compat ioctl<br /> implementation can lead to uninitialized kernel stack data getting used<br /> as input for driver ioctl handlers.<br /> <br /> The reported bug is now fixed, but it&amp;#39;s possible that other related<br /> bugs are still present or get added in the future. As the drivers need<br /> to check user input already, the possible impact is fairly low, but it<br /> might still cause an information leak.<br /> <br /> To be on the safe side, always clear the entire ioctl buffer before<br /> calling the conversion handler functions that are meant to initialize<br /> them.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.12.18 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.13 (including) 5.13.3 (excluding)