CVE-2021-47620

In the Linux kernel, the following vulnerability has been resolved: Bluetooth: refactor malicious adv data check Check for out-of-bound read was being performed at the end of while num_reports loop, and would fill journal with false positives. Added check to beginning of loop processing so that it doesn't get checked after ptr has been advanced.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

18 Sep 2024, 17:07

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/305e92f525450f3e1b5f5c9dc7eadb152d66a082 - () https://git.kernel.org/stable/c/305e92f525450f3e1b5f5c9dc7eadb152d66a082 - Patch
References () https://git.kernel.org/stable/c/5a539c08d743d9910631448da78af5e961664c0e - () https://git.kernel.org/stable/c/5a539c08d743d9910631448da78af5e961664c0e - Patch
References () https://git.kernel.org/stable/c/5c968affa804ba98c3c603f37ffea6fba618025e - () https://git.kernel.org/stable/c/5c968affa804ba98c3c603f37ffea6fba618025e - Patch
References () https://git.kernel.org/stable/c/7889b38a7f21ed19314f83194622b195d328465c - () https://git.kernel.org/stable/c/7889b38a7f21ed19314f83194622b195d328465c - Patch
References () https://git.kernel.org/stable/c/835d3706852537bf92eb23eb8635b8dee0c0aa67 - () https://git.kernel.org/stable/c/835d3706852537bf92eb23eb8635b8dee0c0aa67 - Patch
References () https://git.kernel.org/stable/c/83d5196b65d1b29e27d7dd16a3b9b439fb1d2dba - () https://git.kernel.org/stable/c/83d5196b65d1b29e27d7dd16a3b9b439fb1d2dba - Patch
References () https://git.kernel.org/stable/c/8819f93cd4a443dfe547aa622b21f723757df3fb - () https://git.kernel.org/stable/c/8819f93cd4a443dfe547aa622b21f723757df3fb - Patch
References () https://git.kernel.org/stable/c/899663be5e75dc0174dc8bda0b5e6826edf0b29a - () https://git.kernel.org/stable/c/899663be5e75dc0174dc8bda0b5e6826edf0b29a - Patch
References () https://git.kernel.org/stable/c/bcea886771c3f22a590c8c8b9139a107bd7f1e1c - () https://git.kernel.org/stable/c/bcea886771c3f22a590c8c8b9139a107bd7f1e1c - Patch
First Time Linux
Linux linux Kernel
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CWE CWE-125
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5

20 Jun 2024, 12:43

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se resolvió la siguiente vulnerabilidad: Bluetooth: refactorización de verificación de datos publicitarios maliciosos. Se estaba realizando una verificación de lectura fuera de los límites al final del bucle while num_reports y llenaría el diario con falsos positivos. Se agregó una verificación al comienzo del procesamiento del bucle para que no se verifique después de que se haya avanzado ptr.

20 Jun 2024, 11:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-06-20 11:15

Updated : 2024-09-18 17:07


NVD link : CVE-2021-47620

Mitre link : CVE-2021-47620

CVE.ORG link : CVE-2021-47620


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-125

Out-of-bounds Read