CVE-2021-47347
Severity CVSS v4.0:
Pending analysis
Type:
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Publication date:
21/05/2024
Last modified:
02/04/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
wl1251: Fix possible buffer overflow in wl1251_cmd_scan<br />
<br />
Function wl1251_cmd_scan calls memcpy without checking the length.<br />
Harden by checking the length is within the maximum allowed size.
Impact
Base Score 3.x
8.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.4.276 (excluding) | |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.5 (including) | 4.9.276 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.10 (including) | 4.14.240 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.15 (including) | 4.19.198 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.20 (including) | 5.4.133 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.5 (including) | 5.10.51 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.12.18 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.13 (including) | 5.13.3 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/0f6c0488368c9ac1aa685821916fadba32f5d1ef
- https://git.kernel.org/stable/c/115103f6e3f1c26c473766c16439c7c8b235529a
- https://git.kernel.org/stable/c/302e2ee34c5f7c5d805b7f835d9a6f2b43474e2a
- https://git.kernel.org/stable/c/40af3960a15339e8bbd3be50c3bc7b35e1a0b6ea
- https://git.kernel.org/stable/c/57ad99ae3c6738ba87bad259bb57c641ca68ebf6
- https://git.kernel.org/stable/c/c5e4a10d7bd5d4f419d8b9705dff60cf69b302a1
- https://git.kernel.org/stable/c/d10a87a3535cce2b890897914f5d0d83df669c63
- https://git.kernel.org/stable/c/d3d8b9c9c7843dce31e284927d4c9904fd5a510a
- https://git.kernel.org/stable/c/d71dddeb5380613f9ef199f3e7368fd78fb1a46e
- https://git.kernel.org/stable/c/0f6c0488368c9ac1aa685821916fadba32f5d1ef
- https://git.kernel.org/stable/c/115103f6e3f1c26c473766c16439c7c8b235529a
- https://git.kernel.org/stable/c/302e2ee34c5f7c5d805b7f835d9a6f2b43474e2a
- https://git.kernel.org/stable/c/40af3960a15339e8bbd3be50c3bc7b35e1a0b6ea
- https://git.kernel.org/stable/c/57ad99ae3c6738ba87bad259bb57c641ca68ebf6
- https://git.kernel.org/stable/c/c5e4a10d7bd5d4f419d8b9705dff60cf69b302a1
- https://git.kernel.org/stable/c/d10a87a3535cce2b890897914f5d0d83df669c63
- https://git.kernel.org/stable/c/d3d8b9c9c7843dce31e284927d4c9904fd5a510a
- https://git.kernel.org/stable/c/d71dddeb5380613f9ef199f3e7368fd78fb1a46e



