In the Linux kernel, the following vulnerability has been resolved: bus:
mhi: core: Validate channel ID when processing command completions MHI
reads the channel ID from the event ring element sent by the device which
can be any value between 0 and 255. In order to prevent any out of bound
accesses, add a check against the maximum number of channels supported by
the controller and those channels not configured yet so as to skip
processing of that event ring element.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 23.10 | noarch | linux | < any | UNKNOWN |
ubuntu | 24.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 14.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 16.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 18.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-aws | < any | UNKNOWN |
git.kernel.org/linus/546362a9ef2ef40b57c6605f14e88ced507f8dd0 (5.14-rc3)
git.kernel.org/stable/c/3efec3b4b16fc7af25676a94230a8ab2a3bb867c
git.kernel.org/stable/c/546362a9ef2ef40b57c6605f14e88ced507f8dd0
git.kernel.org/stable/c/aed4f5b51aba41e2afd7cfda20a0571a6a67dfe9
launchpad.net/bugs/cve/CVE-2021-47286
nvd.nist.gov/vuln/detail/CVE-2021-47286
security-tracker.debian.org/tracker/CVE-2021-47286
www.cve.org/CVERecord?id=CVE-2021-47286