CVE-2021-47210
"TPS6598X USB Type-C Buffer Overflow Vulnerability"
Description
In the Linux kernel, the following vulnerability has been resolved: usb: typec: tipd: Remove WARN_ON in tps6598x_block_read Calling tps6598x_block_read with a higher than allowed len can be handled by just returning an error. There's no need to crash systems with panic-on-warn enabled.
INFO
Published Date :
April 10, 2024, 7:15 p.m.
Last Modified :
March 27, 2025, 9:17 p.m.
Remotely Exploit :
No
Source :
416baaa9-dc9f-4396-8d5f-8c081fb06d67
CVSS Scores
Score | Version | Severity | Vector | Exploitability Score | Impact Score | Source |
---|---|---|---|---|---|---|
CVSS 3.1 | MEDIUM | [email protected] |
Solution
- Update the affected Linux kernel packages.
References to Advisories, Solutions, and Tools
Here, you will find a curated list of external links that provide in-depth
information, practical solutions, and valuable tools related to
CVE-2021-47210
.
CWE - Common Weakness Enumeration
While CVE identifies
specific instances of vulnerabilities, CWE categorizes the common flaws or
weaknesses that can lead to vulnerabilities. CVE-2021-47210
is
associated with the following CWEs:
Common Attack Pattern Enumeration and Classification (CAPEC)
Common Attack Pattern Enumeration and Classification
(CAPEC)
stores attack patterns, which are descriptions of the common attributes and
approaches employed by adversaries to exploit the CVE-2021-47210
weaknesses.
We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).
Results are limited to the first 15 repositories due to potential performance issues.
The following list is the news that have been mention
CVE-2021-47210
vulnerability anywhere in the article.
The following table lists the changes that have been made to the
CVE-2021-47210
vulnerability over time.
Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.
-
Initial Analysis by [email protected]
Mar. 27, 2025
Action Type Old Value New Value Added CVSS V3.1 AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Added CWE CWE-125 Added CPE Configuration OR *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.11 up to (excluding) 5.15.5 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.5 up to (excluding) 5.10.82 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 4.20 up to (excluding) 5.4.162 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions up to (excluding) 4.19.218 Added Reference Type CVE: https://git.kernel.org/stable/c/2a897d384513ba7f7ef05611338b9a6ec6aeac00 Types: Patch Added Reference Type kernel.org: https://git.kernel.org/stable/c/2a897d384513ba7f7ef05611338b9a6ec6aeac00 Types: Patch Added Reference Type CVE: https://git.kernel.org/stable/c/2c71811c963b6c310a29455d521d31a7ea6c5b5e Types: Patch Added Reference Type kernel.org: https://git.kernel.org/stable/c/2c71811c963b6c310a29455d521d31a7ea6c5b5e Types: Patch Added Reference Type CVE: https://git.kernel.org/stable/c/30dcfcda8992dc42f18e7d35b6a1fa72372d382d Types: Patch Added Reference Type kernel.org: https://git.kernel.org/stable/c/30dcfcda8992dc42f18e7d35b6a1fa72372d382d Types: Patch Added Reference Type CVE: https://git.kernel.org/stable/c/b7a0a63f3fed57d413bb857de164ea9c3984bc4e Types: Patch Added Reference Type kernel.org: https://git.kernel.org/stable/c/b7a0a63f3fed57d413bb857de164ea9c3984bc4e Types: Patch Added Reference Type CVE: https://git.kernel.org/stable/c/eff8b7628410cb2eb562ca0d5d1f12e27063733e Types: Patch Added Reference Type kernel.org: https://git.kernel.org/stable/c/eff8b7628410cb2eb562ca0d5d1f12e27063733e Types: Patch -
CVE Modified by af854a3a-2127-422b-91ae-364da2661108
Nov. 21, 2024
Action Type Old Value New Value Added Reference https://git.kernel.org/stable/c/2a897d384513ba7f7ef05611338b9a6ec6aeac00 Added Reference https://git.kernel.org/stable/c/2c71811c963b6c310a29455d521d31a7ea6c5b5e Added Reference https://git.kernel.org/stable/c/30dcfcda8992dc42f18e7d35b6a1fa72372d382d Added Reference https://git.kernel.org/stable/c/b7a0a63f3fed57d413bb857de164ea9c3984bc4e Added Reference https://git.kernel.org/stable/c/eff8b7628410cb2eb562ca0d5d1f12e27063733e -
CVE Modified by 416baaa9-dc9f-4396-8d5f-8c081fb06d67
May. 28, 2024
Action Type Old Value New Value -
CVE Modified by 416baaa9-dc9f-4396-8d5f-8c081fb06d67
May. 14, 2024
Action Type Old Value New Value -
CVE Received by 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Apr. 10, 2024
Action Type Old Value New Value Added Description In the Linux kernel, the following vulnerability has been resolved: usb: typec: tipd: Remove WARN_ON in tps6598x_block_read Calling tps6598x_block_read with a higher than allowed len can be handled by just returning an error. There's no need to crash systems with panic-on-warn enabled. Added Reference kernel.org https://git.kernel.org/stable/c/2a897d384513ba7f7ef05611338b9a6ec6aeac00 [No types assigned] Added Reference kernel.org https://git.kernel.org/stable/c/30dcfcda8992dc42f18e7d35b6a1fa72372d382d [No types assigned] Added Reference kernel.org https://git.kernel.org/stable/c/eff8b7628410cb2eb562ca0d5d1f12e27063733e [No types assigned] Added Reference kernel.org https://git.kernel.org/stable/c/2c71811c963b6c310a29455d521d31a7ea6c5b5e [No types assigned] Added Reference kernel.org https://git.kernel.org/stable/c/b7a0a63f3fed57d413bb857de164ea9c3984bc4e [No types assigned]