Executive Summary

Informations
Name CVE-2021-46969 First vendor Publication 2024-02-27
Vendor Cve Last vendor Modification 2024-02-28

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

In the Linux kernel, the following vulnerability has been resolved:

bus: mhi: core: Fix invalid error returning in mhi_queue

mhi_queue returns an error when the doorbell is not accessible in the current state. This can happen when the device is in non M0 state, like M3, and needs to be waken-up prior ringing the DB. This case is managed earlier by triggering an asynchronous M3 exit via controller resume/suspend callbacks, that in turn will cause M0 transition and DB update.

So, since it's not an error but just delaying of doorbell update, there is no reason to return an error.

This also fixes a use after free error for skb case, indeed a caller queuing skb will try to free the skb if the queueing fails, but in that case queueing has been done.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46969

Sources (Detail)

https://git.kernel.org/stable/c/0ecc1c70dcd32c0f081b173a1a5d89952686f271
https://git.kernel.org/stable/c/a99b661c3187365f81026d89b1133a76cd2652b3
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
Date Informations
2024-02-28 17:27:37
  • Multiple Updates
2024-02-28 00:27:27
  • First insertion