CVE-2021-47477
Severity CVSS v4.0:
Pending analysis
Type:
CWE-787
Out-of-bounds Write
Publication date:
22/05/2024
Last modified:
24/09/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
comedi: dt9812: fix DMA buffers on stack<br />
<br />
USB transfer buffers are typically mapped for DMA and must not be<br />
allocated on the stack or transfers will fail.<br />
<br />
Allocate proper transfer buffers in the various command helpers and<br />
return an error on short transfers instead of acting on random stack<br />
data.<br />
<br />
Note that this also fixes a stack info leak on systems where DMA is not<br />
used as 32 bytes are always sent to the device regardless of how short<br />
the command is.
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 2.6.29 (including) | 4.4.292 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.5 (including) | 4.9.290 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.10 (including) | 4.14.255 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.15 (including) | 4.19.217 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.20 (including) | 5.4.159 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.5 (including) | 5.10.79 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.14.18 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.15 (including) | 5.15.2 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/20cebb8b620dc987e55ddc46801de986e081757e
- https://git.kernel.org/stable/c/365a346cda82f51d835c49136a00a9df8a78c7f2
- https://git.kernel.org/stable/c/39ea61037ae78f14fa121228dd962ea3280eacf3
- https://git.kernel.org/stable/c/3ac273d154d634e2034508a14db82a95d7ad12ed
- https://git.kernel.org/stable/c/3efb7af8ac437085b6c776e5b54830b149d86efe
- https://git.kernel.org/stable/c/536de747bc48262225889a533db6650731ab25d3
- https://git.kernel.org/stable/c/786f5b03450454557ff858a8bead5d7c0cbf78d6
- https://git.kernel.org/stable/c/8a52bc480992c7c9da3ebfea456af731f50a4b97
- https://git.kernel.org/stable/c/a6af69768d5cb4b2528946d53be5fa19ade37723
- https://git.kernel.org/stable/c/20cebb8b620dc987e55ddc46801de986e081757e
- https://git.kernel.org/stable/c/365a346cda82f51d835c49136a00a9df8a78c7f2
- https://git.kernel.org/stable/c/39ea61037ae78f14fa121228dd962ea3280eacf3
- https://git.kernel.org/stable/c/3ac273d154d634e2034508a14db82a95d7ad12ed
- https://git.kernel.org/stable/c/3efb7af8ac437085b6c776e5b54830b149d86efe
- https://git.kernel.org/stable/c/536de747bc48262225889a533db6650731ab25d3
- https://git.kernel.org/stable/c/786f5b03450454557ff858a8bead5d7c0cbf78d6
- https://git.kernel.org/stable/c/8a52bc480992c7c9da3ebfea456af731f50a4b97
- https://git.kernel.org/stable/c/a6af69768d5cb4b2528946d53be5fa19ade37723



