In the Linux kernel, the following vulnerability has been resolved:
wl1251: Fix possible buffer overflow in wl1251_cmd_scan
Function wl1251_cmd_scan calls memcpy without checking the length.
Harden by checking the length is within the maximum allowed size.
References
Configurations
Configuration 1 (hide)
|
History
02 Apr 2025, 14:31
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
References | () https://git.kernel.org/stable/c/0f6c0488368c9ac1aa685821916fadba32f5d1ef - Patch | |
References | () https://git.kernel.org/stable/c/115103f6e3f1c26c473766c16439c7c8b235529a - Patch | |
References | () https://git.kernel.org/stable/c/302e2ee34c5f7c5d805b7f835d9a6f2b43474e2a - Patch | |
References | () https://git.kernel.org/stable/c/40af3960a15339e8bbd3be50c3bc7b35e1a0b6ea - Patch | |
References | () https://git.kernel.org/stable/c/57ad99ae3c6738ba87bad259bb57c641ca68ebf6 - Patch | |
References | () https://git.kernel.org/stable/c/c5e4a10d7bd5d4f419d8b9705dff60cf69b302a1 - Patch | |
References | () https://git.kernel.org/stable/c/d10a87a3535cce2b890897914f5d0d83df669c63 - Patch | |
References | () https://git.kernel.org/stable/c/d3d8b9c9c7843dce31e284927d4c9904fd5a510a - Patch | |
References | () https://git.kernel.org/stable/c/d71dddeb5380613f9ef199f3e7368fd78fb1a46e - Patch | |
First Time |
Linux linux Kernel
Linux |
21 Nov 2024, 06:35
Type | Values Removed | Values Added |
---|---|---|
References | () https://git.kernel.org/stable/c/0f6c0488368c9ac1aa685821916fadba32f5d1ef - | |
References | () https://git.kernel.org/stable/c/115103f6e3f1c26c473766c16439c7c8b235529a - | |
References | () https://git.kernel.org/stable/c/302e2ee34c5f7c5d805b7f835d9a6f2b43474e2a - | |
References | () https://git.kernel.org/stable/c/40af3960a15339e8bbd3be50c3bc7b35e1a0b6ea - | |
References | () https://git.kernel.org/stable/c/57ad99ae3c6738ba87bad259bb57c641ca68ebf6 - | |
References | () https://git.kernel.org/stable/c/c5e4a10d7bd5d4f419d8b9705dff60cf69b302a1 - | |
References | () https://git.kernel.org/stable/c/d10a87a3535cce2b890897914f5d0d83df669c63 - | |
References | () https://git.kernel.org/stable/c/d3d8b9c9c7843dce31e284927d4c9904fd5a510a - | |
References | () https://git.kernel.org/stable/c/d71dddeb5380613f9ef199f3e7368fd78fb1a46e - |
13 Nov 2024, 22:35
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-120 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
Summary |
|
21 May 2024, 15:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-05-21 15:15
Updated : 2025-04-02 14:31
NVD link : CVE-2021-47347
Mitre link : CVE-2021-47347
CVE.ORG link : CVE-2021-47347
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')