U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

CVE-2021-47347 Detail

Description

In the Linux kernel, the following vulnerability has been resolved: wl1251: Fix possible buffer overflow in wl1251_cmd_scan Function wl1251_cmd_scan calls memcpy without checking the length. Harden by checking the length is within the maximum allowed size.


Metrics

NVD enrichment efforts reference publicly available information to associate vector strings. CVSS information contributed by other sources is also displayed.
CVSS 4.0 Severity and Vector Strings:

NIST CVSS score
NIST: NVD
N/A
NVD assessment not yet provided.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

Hyperlink Resource
https://git.kernel.org/stable/c/0f6c0488368c9ac1aa685821916fadba32f5d1ef
https://git.kernel.org/stable/c/0f6c0488368c9ac1aa685821916fadba32f5d1ef
https://git.kernel.org/stable/c/115103f6e3f1c26c473766c16439c7c8b235529a
https://git.kernel.org/stable/c/115103f6e3f1c26c473766c16439c7c8b235529a
https://git.kernel.org/stable/c/302e2ee34c5f7c5d805b7f835d9a6f2b43474e2a
https://git.kernel.org/stable/c/302e2ee34c5f7c5d805b7f835d9a6f2b43474e2a
https://git.kernel.org/stable/c/40af3960a15339e8bbd3be50c3bc7b35e1a0b6ea
https://git.kernel.org/stable/c/40af3960a15339e8bbd3be50c3bc7b35e1a0b6ea
https://git.kernel.org/stable/c/57ad99ae3c6738ba87bad259bb57c641ca68ebf6
https://git.kernel.org/stable/c/57ad99ae3c6738ba87bad259bb57c641ca68ebf6
https://git.kernel.org/stable/c/c5e4a10d7bd5d4f419d8b9705dff60cf69b302a1
https://git.kernel.org/stable/c/c5e4a10d7bd5d4f419d8b9705dff60cf69b302a1
https://git.kernel.org/stable/c/d10a87a3535cce2b890897914f5d0d83df669c63
https://git.kernel.org/stable/c/d10a87a3535cce2b890897914f5d0d83df669c63
https://git.kernel.org/stable/c/d3d8b9c9c7843dce31e284927d4c9904fd5a510a
https://git.kernel.org/stable/c/d3d8b9c9c7843dce31e284927d4c9904fd5a510a
https://git.kernel.org/stable/c/d71dddeb5380613f9ef199f3e7368fd78fb1a46e
https://git.kernel.org/stable/c/d71dddeb5380613f9ef199f3e7368fd78fb1a46e

Weakness Enumeration

CWE-ID CWE Name Source
CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') CISA-ADP  

Change History

4 change records found show changes

Quick Info

CVE Dictionary Entry:
CVE-2021-47347
NVD Published Date:
05/21/2024
NVD Last Modified:
11/21/2024
Source:
kernel.org