CVE-2021-47347

In the Linux kernel, the following vulnerability has been resolved: wl1251: Fix possible buffer overflow in wl1251_cmd_scan Function wl1251_cmd_scan calls memcpy without checking the length. Harden by checking the length is within the maximum allowed size.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

02 Apr 2025, 14:31

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/0f6c0488368c9ac1aa685821916fadba32f5d1ef - () https://git.kernel.org/stable/c/0f6c0488368c9ac1aa685821916fadba32f5d1ef - Patch
References () https://git.kernel.org/stable/c/115103f6e3f1c26c473766c16439c7c8b235529a - () https://git.kernel.org/stable/c/115103f6e3f1c26c473766c16439c7c8b235529a - Patch
References () https://git.kernel.org/stable/c/302e2ee34c5f7c5d805b7f835d9a6f2b43474e2a - () https://git.kernel.org/stable/c/302e2ee34c5f7c5d805b7f835d9a6f2b43474e2a - Patch
References () https://git.kernel.org/stable/c/40af3960a15339e8bbd3be50c3bc7b35e1a0b6ea - () https://git.kernel.org/stable/c/40af3960a15339e8bbd3be50c3bc7b35e1a0b6ea - Patch
References () https://git.kernel.org/stable/c/57ad99ae3c6738ba87bad259bb57c641ca68ebf6 - () https://git.kernel.org/stable/c/57ad99ae3c6738ba87bad259bb57c641ca68ebf6 - Patch
References () https://git.kernel.org/stable/c/c5e4a10d7bd5d4f419d8b9705dff60cf69b302a1 - () https://git.kernel.org/stable/c/c5e4a10d7bd5d4f419d8b9705dff60cf69b302a1 - Patch
References () https://git.kernel.org/stable/c/d10a87a3535cce2b890897914f5d0d83df669c63 - () https://git.kernel.org/stable/c/d10a87a3535cce2b890897914f5d0d83df669c63 - Patch
References () https://git.kernel.org/stable/c/d3d8b9c9c7843dce31e284927d4c9904fd5a510a - () https://git.kernel.org/stable/c/d3d8b9c9c7843dce31e284927d4c9904fd5a510a - Patch
References () https://git.kernel.org/stable/c/d71dddeb5380613f9ef199f3e7368fd78fb1a46e - () https://git.kernel.org/stable/c/d71dddeb5380613f9ef199f3e7368fd78fb1a46e - Patch
First Time Linux linux Kernel
Linux

21 Nov 2024, 06:35

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/0f6c0488368c9ac1aa685821916fadba32f5d1ef - () https://git.kernel.org/stable/c/0f6c0488368c9ac1aa685821916fadba32f5d1ef -
References () https://git.kernel.org/stable/c/115103f6e3f1c26c473766c16439c7c8b235529a - () https://git.kernel.org/stable/c/115103f6e3f1c26c473766c16439c7c8b235529a -
References () https://git.kernel.org/stable/c/302e2ee34c5f7c5d805b7f835d9a6f2b43474e2a - () https://git.kernel.org/stable/c/302e2ee34c5f7c5d805b7f835d9a6f2b43474e2a -
References () https://git.kernel.org/stable/c/40af3960a15339e8bbd3be50c3bc7b35e1a0b6ea - () https://git.kernel.org/stable/c/40af3960a15339e8bbd3be50c3bc7b35e1a0b6ea -
References () https://git.kernel.org/stable/c/57ad99ae3c6738ba87bad259bb57c641ca68ebf6 - () https://git.kernel.org/stable/c/57ad99ae3c6738ba87bad259bb57c641ca68ebf6 -
References () https://git.kernel.org/stable/c/c5e4a10d7bd5d4f419d8b9705dff60cf69b302a1 - () https://git.kernel.org/stable/c/c5e4a10d7bd5d4f419d8b9705dff60cf69b302a1 -
References () https://git.kernel.org/stable/c/d10a87a3535cce2b890897914f5d0d83df669c63 - () https://git.kernel.org/stable/c/d10a87a3535cce2b890897914f5d0d83df669c63 -
References () https://git.kernel.org/stable/c/d3d8b9c9c7843dce31e284927d4c9904fd5a510a - () https://git.kernel.org/stable/c/d3d8b9c9c7843dce31e284927d4c9904fd5a510a -
References () https://git.kernel.org/stable/c/d71dddeb5380613f9ef199f3e7368fd78fb1a46e - () https://git.kernel.org/stable/c/d71dddeb5380613f9ef199f3e7368fd78fb1a46e -

13 Nov 2024, 22:35

Type Values Removed Values Added
CWE CWE-120
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.8
Summary
  • (es) En el kernel de Linux se ha resuelto la siguiente vulnerabilidad: wl1251: corrige posible desbordamiento del buffer en wl1251_cmd_scan. La función wl1251_cmd_scan llama a memcpy sin comprobar la longitud. Endurecer comprobando que el largo esté dentro del tamaño máximo permitido.

21 May 2024, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-21 15:15

Updated : 2025-04-02 14:31


NVD link : CVE-2021-47347

Mitre link : CVE-2021-47347

CVE.ORG link : CVE-2021-47347


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')