In the Linux kernel, the following vulnerability has been resolved:
media: v4l2-core: explicitly clear ioctl input data
As seen from a recent syzbot bug report, mistakes in the compat ioctl
implementation can lead to uninitialized kernel stack data getting used
as input for driver ioctl handlers.
The reported bug is now fixed, but it's possible that other related
bugs are still present or get added in the future. As the drivers need
to check user input already, the possible impact is fairly low, but it
might still cause an information leak.
To be on the safe side, always clear the entire ioctl buffer before
calling the conversion handler functions that are meant to initialize
them.
Metrics
Affected Vendors & Products
References
History
Wed, 11 Sep 2024 18:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 11 Sep 2024 13:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
MITRE
Status: PUBLISHED
Assigner: Linux
Published: 2024-05-21T14:35:47.683Z
Updated: 2024-09-11T17:33:49.514Z
Reserved: 2024-05-21T14:28:16.978Z
Link: CVE-2021-47339
Vulnrichment
Updated: 2024-08-04T05:32:08.498Z
NVD
Status : Awaiting Analysis
Published: 2024-05-21T15:15:20.693
Modified: 2024-05-21T16:54:26.047
Link: CVE-2021-47339
Redhat