In the Linux kernel, the following vulnerability has been resolved:
mtd: physmap: physmap-bt1-rom: Fix unintentional stack access
Cast &data to (char *) in order to avoid unintentionally accessing
the stack.
Notice that data is of type u32, so any increment to &data
will be in the order of 4-byte chunks, and this piece of code
is actually intended to be a byte offset.
Addresses-Coverity-ID: 1497765 ("Out-of-bounds access")
Metrics
Affected Vendors & Products
References
History
Mon, 04 Nov 2024 12:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
MITRE
Status: PUBLISHED
Assigner: Linux
Published: 2024-02-27T18:47:03.022Z
Updated: 2024-11-04T11:56:47.594Z
Reserved: 2024-02-27T18:42:55.942Z
Link: CVE-2021-46965
Vulnrichment
Updated: 2024-08-04T05:17:42.990Z
NVD
Status : Awaiting Analysis
Published: 2024-02-27T19:04:07.087
Modified: 2024-02-28T14:06:45.783
Link: CVE-2021-46965
Redhat