An Out-of-Bounds Read was discovered in arch/arm/mach-footbridge/personal-pci.c in the Linux kernel through 5.12.11 because of the lack of a check for a value that shouldn't be negative, e.g., access to element -2 of an array, aka CID-298a58e165e4.
The product reads data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://kirtikumarar.com/CVE-2021-32078.txt | third party advisory exploit |
https://github.com/torvalds/linux/commit/298a58e165e447ccfaae35fe9f651f9d7e15166f | third party advisory patch |
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=298a58e165e447ccfaae35fe9f651f9d7e15166f | third party advisory patch |
https://security.netapp.com/advisory/ntap-20210813-0002/ | third party advisory |