CVE-2021-47172

In the Linux kernel, the following vulnerability has been resolved: iio: adc: ad7124: Fix potential overflow due to non sequential channel numbers Channel numbering must start at 0 and then not have any holes, or it is possible to overflow the available storage. Note this bug was introduced as part of a fix to ensure we didn't rely on the ordering of child nodes. So we need to support arbitrary ordering but they all need to be there somewhere. Note I hit this when using qemu to test the rest of this series. Arguably this isn't the best fix, but it is probably the most minimal option for backporting etc. Alexandru's sign-off is here because he carried this patch in a larger set that Jonathan then applied.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc3:*:*:*:*:*:*

History

30 Apr 2025, 16:35

Type Values Removed Values Added
First Time Linux linux Kernel
Linux
References () https://git.kernel.org/stable/c/26da8040eccc6c6b0e415e9a3baf72fd39eb2fdc - () https://git.kernel.org/stable/c/26da8040eccc6c6b0e415e9a3baf72fd39eb2fdc - Patch
References () https://git.kernel.org/stable/c/f2a772c51206b0c3f262e4f6a3812c89a650191b - () https://git.kernel.org/stable/c/f2a772c51206b0c3f262e4f6a3812c89a650191b - Patch
References () https://git.kernel.org/stable/c/f49149964d2423fb618fb6b755bb1eaa431cca2c - () https://git.kernel.org/stable/c/f49149964d2423fb618fb6b755bb1eaa431cca2c - Patch
References () https://git.kernel.org/stable/c/f70122825076117787b91e7f219e21c09f11a5b9 - () https://git.kernel.org/stable/c/f70122825076117787b91e7f219e21c09f11a5b9 - Patch
CPE cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

21 Nov 2024, 06:35

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/26da8040eccc6c6b0e415e9a3baf72fd39eb2fdc - () https://git.kernel.org/stable/c/26da8040eccc6c6b0e415e9a3baf72fd39eb2fdc -
References () https://git.kernel.org/stable/c/f2a772c51206b0c3f262e4f6a3812c89a650191b - () https://git.kernel.org/stable/c/f2a772c51206b0c3f262e4f6a3812c89a650191b -
References () https://git.kernel.org/stable/c/f49149964d2423fb618fb6b755bb1eaa431cca2c - () https://git.kernel.org/stable/c/f49149964d2423fb618fb6b755bb1eaa431cca2c -
References () https://git.kernel.org/stable/c/f70122825076117787b91e7f219e21c09f11a5b9 - () https://git.kernel.org/stable/c/f70122825076117787b91e7f219e21c09f11a5b9 -

06 Nov 2024, 16:35

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CWE CWE-120

25 Mar 2024, 10:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-03-25 10:15

Updated : 2025-04-30 16:35


NVD link : CVE-2021-47172

Mitre link : CVE-2021-47172

CVE.ORG link : CVE-2021-47172


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')