{"id":"CVE-2021-46965","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nmtd: physmap: physmap-bt1-rom: Fix unintentional stack access\n\nCast &data to (char *) in order to avoid unintentionally accessing\nthe stack.\n\nNotice that data is of type u32, so any increment to &data\nwill be in the order of 4-byte chunks, and this piece of code\nis actually intended to be a byte offset.\n\nAddresses-Coverity-ID: 1497765 (\"Out-of-bounds access\")","modified":"2026-03-15T22:42:42.913071Z","published":"2024-02-27T19:04:07.087Z","references":[{"type":"FIX","url":"https://git.kernel.org/stable/c/34ec706bf0b7c4ca249a729c1bcb91f706c7a7be"},{"type":"FIX","url":"https://git.kernel.org/stable/c/4d786870e3262ec098a3b4ed10b895176bc66ecb"},{"type":"FIX","url":"https://git.kernel.org/stable/c/4e4ebb827bf09311469ffd9d0c14ed40ed9747aa"},{"type":"FIX","url":"https://git.kernel.org/stable/c/683313993dbe1651c7aa00bb42a041d70e914925"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"5.10"},{"fixed":"5.10.36"}]},{"events":[{"introduced":"5.11"},{"fixed":"5.11.20"}]},{"events":[{"introduced":"5.12"},{"fixed":"5.12.3"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-46965.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"}]}