In the Linux kernel, the following vulnerability has been resolved:
bus: mhi: core: Validate channel ID when processing command completions
MHI reads the channel ID from the event ring element sent by the
device which can be any value between 0 and 255. In order to
prevent any out of bound accesses, add a check against the maximum
number of channels supported by the controller and those channels
not configured yet so as to skip processing of that event ring
element.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: Linux
Published:
Updated: 2024-12-19T07:39:00.472Z
Reserved: 2024-05-21T13:27:52.129Z
Link: CVE-2021-47286

Updated: 2024-08-04T05:32:08.191Z

Status : Awaiting Analysis
Published: 2024-05-21T15:15:16.723
Modified: 2024-11-21T06:35:48.023
Link: CVE-2021-47286
