In the Linux kernel, the following vulnerability has been resolved:
bus: mhi: core: Validate channel ID when processing command completions
MHI reads the channel ID from the event ring element sent by the
device which can be any value between 0 and 255. In order to
prevent any out of bound accesses, add a check against the maximum
number of channels supported by the controller and those channels
not configured yet so as to skip processing of that event ring
element.
Metrics
Affected Vendors & Products
References
History
Wed, 30 Apr 2025 14:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Linux
Linux linux Kernel |
|
Weaknesses | CWE-787 | |
CPEs | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.14:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.14:rc2:*:*:*:*:*:* |
|
Vendors & Products |
Linux
Linux linux Kernel |
|
Metrics |
cvssV3_1
|
cvssV3_1
|

Status: PUBLISHED
Assigner: Linux
Published: 2024-05-21T14:34:47.372Z
Updated: 2024-12-19T07:39:00.472Z
Reserved: 2024-05-21T13:27:52.129Z
Link: CVE-2021-47286

Updated: 2024-08-04T05:32:08.191Z

Status : Analyzed
Published: 2024-05-21T15:15:16.723
Modified: 2025-04-30T14:26:35.967
Link: CVE-2021-47286
