CVE-2021-47485

In the Linux kernel, the following vulnerability has been resolved: IB/qib: Protect from buffer overflow in struct qib_user_sdma_pkt fields Overflowing either addrlimit or bytes_togo can allow userspace to trigger a buffer overflow of kernel memory. Check for overflows in all the places doing math on user controlled buffers.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.15:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.15:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.15:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.15:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.15:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.15:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.15:rc7:*:*:*:*:*:*

History

06 Jan 2025, 19:53

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/0d4395477741608d123dad51def9fe50b7ebe952 - () https://git.kernel.org/stable/c/0d4395477741608d123dad51def9fe50b7ebe952 - Patch
References () https://git.kernel.org/stable/c/0f8cdfff06829a0b0348b6debc29ff6a61967724 - () https://git.kernel.org/stable/c/0f8cdfff06829a0b0348b6debc29ff6a61967724 - Patch
References () https://git.kernel.org/stable/c/3f57c3f67fd93b4da86aeffea1ca32c484d054ad - () https://git.kernel.org/stable/c/3f57c3f67fd93b4da86aeffea1ca32c484d054ad - Patch
References () https://git.kernel.org/stable/c/60833707b968d5ae02a75edb7886dcd4a957cf0d - () https://git.kernel.org/stable/c/60833707b968d5ae02a75edb7886dcd4a957cf0d - Patch
References () https://git.kernel.org/stable/c/73d2892148aa4397a885b4f4afcfc5b27a325c42 - () https://git.kernel.org/stable/c/73d2892148aa4397a885b4f4afcfc5b27a325c42 - Patch
References () https://git.kernel.org/stable/c/bda41654b6e0c125a624ca35d6d20beb8015b5d0 - () https://git.kernel.org/stable/c/bda41654b6e0c125a624ca35d6d20beb8015b5d0 - Patch
References () https://git.kernel.org/stable/c/c3e17e58f571f34c51aeb17274ed02c2ed5cf780 - () https://git.kernel.org/stable/c/c3e17e58f571f34c51aeb17274ed02c2ed5cf780 - Patch
References () https://git.kernel.org/stable/c/d39bf40e55e666b5905fdbd46a0dced030ce87be - () https://git.kernel.org/stable/c/d39bf40e55e666b5905fdbd46a0dced030ce87be - Patch
CWE CWE-120
CPE cpe:2.3:o:linux:linux_kernel:5.15:rc7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.15:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.15:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.15:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.15:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.15:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.15:rc4:*:*:*:*:*:*
First Time Linux linux Kernel
Linux
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8

21 Nov 2024, 06:36

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/0d4395477741608d123dad51def9fe50b7ebe952 - () https://git.kernel.org/stable/c/0d4395477741608d123dad51def9fe50b7ebe952 -
References () https://git.kernel.org/stable/c/0f8cdfff06829a0b0348b6debc29ff6a61967724 - () https://git.kernel.org/stable/c/0f8cdfff06829a0b0348b6debc29ff6a61967724 -
References () https://git.kernel.org/stable/c/3f57c3f67fd93b4da86aeffea1ca32c484d054ad - () https://git.kernel.org/stable/c/3f57c3f67fd93b4da86aeffea1ca32c484d054ad -
References () https://git.kernel.org/stable/c/60833707b968d5ae02a75edb7886dcd4a957cf0d - () https://git.kernel.org/stable/c/60833707b968d5ae02a75edb7886dcd4a957cf0d -
References () https://git.kernel.org/stable/c/73d2892148aa4397a885b4f4afcfc5b27a325c42 - () https://git.kernel.org/stable/c/73d2892148aa4397a885b4f4afcfc5b27a325c42 -
References () https://git.kernel.org/stable/c/bda41654b6e0c125a624ca35d6d20beb8015b5d0 - () https://git.kernel.org/stable/c/bda41654b6e0c125a624ca35d6d20beb8015b5d0 -
References () https://git.kernel.org/stable/c/c3e17e58f571f34c51aeb17274ed02c2ed5cf780 - () https://git.kernel.org/stable/c/c3e17e58f571f34c51aeb17274ed02c2ed5cf780 -
References () https://git.kernel.org/stable/c/d39bf40e55e666b5905fdbd46a0dced030ce87be - () https://git.kernel.org/stable/c/d39bf40e55e666b5905fdbd46a0dced030ce87be -
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: IB/qib: Protege contra el desbordamiento del búfer en los campos de struct qib_user_sdma_pkt. El desbordamiento de addrlimit o bytes_togo puede permitir que el espacio de usuario desencadene un desbordamiento del búfer de la memoria del kernel. Compruebe si hay desbordamientos en todos los lugares que realizan cálculos en búferes controlados por el usuario.

22 May 2024, 09:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-22 09:15

Updated : 2025-01-06 19:53


NVD link : CVE-2021-47485

Mitre link : CVE-2021-47485

CVE.ORG link : CVE-2021-47485


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')