CVE-2021-47172 Vulnerability Details

  /     /     /  

CVE-2021-47172 Metadata Quick Info

CVE Published: 25/03/2024 | CVE Updated: 06/11/2024 | CVE Year: 2021
Source: Linux | Vendor: Linux | Product: Linux
Status : PUBLISHED

CVE-2021-47172 Description

In the Linux kernel, the following vulnerability has been resolved: iio: adc: ad7124: Fix potential overflow due to non sequential channel numbers Channel numbering must start at 0 and then not have any holes, or it is possible to overflow the available storage. Note this bug was introduced as part of a fix to ensure we didn\'t rely on the ordering of child nodes. So we need to support arbitrary ordering but they all need to be there somewhere. Note I hit this when using qemu to test the rest of this series. Arguably this isn\'t the best fix, but it is probably the most minimal option for backporting etc. Alexandru\'s sign-off is here because he carried this patch in a larger set that Jonathan then applied.

Metrics

CVSS Version: 3.1 | Base Score: n/a
Vector: n/a

l➤ Exploitability Metrics:
    Attack Vector (AV)*
    Attack Complexity (AC)*
    Privileges Required (PR)*
    User Interaction (UI)*
    Scope (S)*

l➤ Impact Metrics:
    Confidentiality Impact (C)*
    Integrity Impact (I)*
    Availability Impact (A)*

Weakness Enumeration (CWE)

CWE-ID:
CWE Name:
Source: Linux

Common Attack Pattern Enumeration and Classification (CAPEC)

CAPEC-ID:
CAPEC Description:


Source: NVD (National Vulnerability Database).