Lucene search

K
cvelistLinuxCVELIST:CVE-2021-47172
HistoryMar 25, 2024 - 9:16 a.m.

CVE-2021-47172 iio: adc: ad7124: Fix potential overflow due to non sequential channel numbers

2024-03-2509:16:23
Linux
www.cve.org
1
linux kernel
vulnerability
channel numbering
potential overflow
storage
arbitrary ordering
qemu testing
backporting
patch

7 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

15.6%

In the Linux kernel, the following vulnerability has been resolved:

iio: adc: ad7124: Fix potential overflow due to non sequential channel numbers

Channel numbering must start at 0 and then not have any holes, or
it is possible to overflow the available storage. Note this bug was
introduced as part of a fix to ensure we didn’t rely on the ordering
of child nodes. So we need to support arbitrary ordering but they all
need to be there somewhere.

Note I hit this when using qemu to test the rest of this series.
Arguably this isn’t the best fix, but it is probably the most minimal
option for backporting etc.

Alexandru’s sign-off is here because he carried this patch in a larger
set that Jonathan then applied.

CNA Affected

[
  {
    "product": "Linux",
    "vendor": "Linux",
    "defaultStatus": "unaffected",
    "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
    "programFiles": [
      "drivers/iio/adc/ad7124.c"
    ],
    "versions": [
      {
        "version": "5408cbc63373",
        "lessThan": "f49149964d24",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "d7857e4ee1ba",
        "lessThan": "f70122825076",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "d7857e4ee1ba",
        "lessThan": "26da8040eccc",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "d7857e4ee1ba",
        "lessThan": "f2a772c51206",
        "status": "affected",
        "versionType": "git"
      }
    ]
  },
  {
    "product": "Linux",
    "vendor": "Linux",
    "defaultStatus": "affected",
    "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
    "programFiles": [
      "drivers/iio/adc/ad7124.c"
    ],
    "versions": [
      {
        "version": "5.5",
        "status": "affected"
      },
      {
        "version": "0",
        "lessThan": "5.5",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "5.4.124",
        "lessThanOrEqual": "5.4.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "5.10.42",
        "lessThanOrEqual": "5.10.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "5.12.9",
        "lessThanOrEqual": "5.12.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "5.13",
        "lessThanOrEqual": "*",
        "status": "unaffected",
        "versionType": "original_commit_for_fix"
      }
    ]
  }
]

7 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

15.6%

Related for CVELIST:CVE-2021-47172