Vulnerabilities > CVE-2021-47286 - Out-of-bounds Write vulnerability in Linux Kernel
Attack vector
LOCAL Attack complexity
LOW Privileges required
LOW Confidentiality impact
HIGH Integrity impact
HIGH Availability impact
HIGH Summary
In the Linux kernel, the following vulnerability has been resolved: bus: mhi: core: Validate channel ID when processing command completions MHI reads the channel ID from the event ring element sent by the device which can be any value between 0 and 255. In order to prevent any out of bound accesses, add a check against the maximum number of channels supported by the controller and those channels not configured yet so as to skip processing of that event ring element.
Vulnerable Configurations
Common Weakness Enumeration (CWE)
References
- https://git.kernel.org/stable/c/3efec3b4b16fc7af25676a94230a8ab2a3bb867c
- https://git.kernel.org/stable/c/3efec3b4b16fc7af25676a94230a8ab2a3bb867c
- https://git.kernel.org/stable/c/546362a9ef2ef40b57c6605f14e88ced507f8dd0
- https://git.kernel.org/stable/c/546362a9ef2ef40b57c6605f14e88ced507f8dd0
- https://git.kernel.org/stable/c/aed4f5b51aba41e2afd7cfda20a0571a6a67dfe9
- https://git.kernel.org/stable/c/aed4f5b51aba41e2afd7cfda20a0571a6a67dfe9