In the Linux kernel, the following vulnerability has been resolved:
mtd: physmap: physmap-bt1-rom: Fix unintentional stack access
Cast &data to (char *) in order to avoid unintentionally accessing
the stack.
Notice that data is of type u32, so any increment to &data
will be in the order of 4-byte chunks, and this piece of code
is actually intended to be a byte offset.
Addresses-Coverity-ID: 1497765 ("Out-of-bounds access")
Metrics
Affected Vendors & Products
References
History
Wed, 08 Jan 2025 17:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Linux
Linux linux Kernel |
|
CPEs | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
Vendors & Products |
Linux
Linux linux Kernel |
|
Metrics |
cvssV3_1
|
cvssV3_1
|
Mon, 04 Nov 2024 12:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: Linux
Published: 2024-02-27T18:47:03.022Z
Updated: 2025-05-04T07:01:19.305Z
Reserved: 2024-02-27T18:42:55.942Z
Link: CVE-2021-46965

Updated: 2024-08-04T05:17:42.990Z

Status : Analyzed
Published: 2024-02-27T19:04:07.087
Modified: 2025-01-08T17:16:07.213
Link: CVE-2021-46965
