CVE-2021-46934

In the Linux kernel, the following vulnerability has been resolved: i2c: validate user data in compat ioctl Wrong user data may cause warning in i2c_transfer(), ex: zero msgs. Userspace should not be able to trigger warnings, so this patch adds validation checks for user data in compact ioctl to prevent reported warnings
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

21 Nov 2024, 06:34

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/407c8708fb1bf2d4afc5337ef50635cf540c364b - Patch () https://git.kernel.org/stable/c/407c8708fb1bf2d4afc5337ef50635cf540c364b - Patch
References () https://git.kernel.org/stable/c/8d31cbab4c295d7010ebb729e9d02d0e9cece18f - Patch () https://git.kernel.org/stable/c/8d31cbab4c295d7010ebb729e9d02d0e9cece18f - Patch
References () https://git.kernel.org/stable/c/9e4a3f47eff476097e0c7faac04d1831fc70237d - Patch () https://git.kernel.org/stable/c/9e4a3f47eff476097e0c7faac04d1831fc70237d - Patch
References () https://git.kernel.org/stable/c/bb436283e25aaf1533ce061605d23a9564447bdf - Patch () https://git.kernel.org/stable/c/bb436283e25aaf1533ce061605d23a9564447bdf - Patch
References () https://git.kernel.org/stable/c/f68599581067e8a5a8901ba9eb270b4519690e26 - Patch () https://git.kernel.org/stable/c/f68599581067e8a5a8901ba9eb270b4519690e26 - Patch

10 Apr 2024, 18:19

Type Values Removed Values Added
CWE CWE-754
First Time Linux
Linux linux Kernel
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/407c8708fb1bf2d4afc5337ef50635cf540c364b - () https://git.kernel.org/stable/c/407c8708fb1bf2d4afc5337ef50635cf540c364b - Patch
References () https://git.kernel.org/stable/c/8d31cbab4c295d7010ebb729e9d02d0e9cece18f - () https://git.kernel.org/stable/c/8d31cbab4c295d7010ebb729e9d02d0e9cece18f - Patch
References () https://git.kernel.org/stable/c/9e4a3f47eff476097e0c7faac04d1831fc70237d - () https://git.kernel.org/stable/c/9e4a3f47eff476097e0c7faac04d1831fc70237d - Patch
References () https://git.kernel.org/stable/c/bb436283e25aaf1533ce061605d23a9564447bdf - () https://git.kernel.org/stable/c/bb436283e25aaf1533ce061605d23a9564447bdf - Patch
References () https://git.kernel.org/stable/c/f68599581067e8a5a8901ba9eb270b4519690e26 - () https://git.kernel.org/stable/c/f68599581067e8a5a8901ba9eb270b4519690e26 - Patch
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 3.3

27 Feb 2024, 14:20

Type Values Removed Values Added
New CVE

Information

Published : 2024-02-27 10:15

Updated : 2024-11-21 06:34


NVD link : CVE-2021-46934

Mitre link : CVE-2021-46934

CVE.ORG link : CVE-2021-46934


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-754

Improper Check for Unusual or Exceptional Conditions