An Out-of-Bounds Read was discovered in arch/arm/mach-footbridge/personal-pci.c in the Linux kernel through 5.12.11 because of the lack of a check for a value that shouldn't be negative, e.g., access to element -2 of an array, aka CID-298a58e165e4.
References
Link | Resource |
---|---|
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=298a58e165e447ccfaae35fe9f651f9d7e15166f | Patch Third Party Advisory |
https://github.com/torvalds/linux/commit/298a58e165e447ccfaae35fe9f651f9d7e15166f | Patch Third Party Advisory |
https://kirtikumarar.com/CVE-2021-32078.txt | Exploit Third Party Advisory |
https://security.netapp.com/advisory/ntap-20210813-0002/ | Third Party Advisory |
Configurations
Information
Published : 2021-06-17 08:15
Updated : 2021-09-20 10:08
NVD link : CVE-2021-32078
Mitre link : CVE-2021-32078
JSON object : View
CWE
CWE-125
Out-of-bounds Read
Products Affected
linux
- linux_kernel