Vulnerability Details : CVE-2021-47347
In the Linux kernel, the following vulnerability has been resolved:
wl1251: Fix possible buffer overflow in wl1251_cmd_scan
Function wl1251_cmd_scan calls memcpy without checking the length.
Harden by checking the length is within the maximum allowed size.
Vulnerability category: Overflow
Products affected by CVE-2021-47347
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2021-47347
0.77%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 71 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2021-47347
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
8.8
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
134c704f-9b21-4f2e-91b3-4a467353bcc0 | 2024-11-13 |
CWE ids for CVE-2021-47347
-
The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.Assigned by: 134c704f-9b21-4f2e-91b3-4a467353bcc0 (Secondary)
References for CVE-2021-47347
-
https://git.kernel.org/stable/c/0f6c0488368c9ac1aa685821916fadba32f5d1ef
wl1251: Fix possible buffer overflow in wl1251_cmd_scan - kernel/git/stable/linux.git - Linux kernel stable treePatch
-
https://git.kernel.org/stable/c/40af3960a15339e8bbd3be50c3bc7b35e1a0b6ea
wl1251: Fix possible buffer overflow in wl1251_cmd_scan - kernel/git/stable/linux.git - Linux kernel stable treePatch
-
https://git.kernel.org/stable/c/302e2ee34c5f7c5d805b7f835d9a6f2b43474e2a
wl1251: Fix possible buffer overflow in wl1251_cmd_scan - kernel/git/stable/linux.git - Linux kernel stable treePatch
-
https://git.kernel.org/stable/c/d10a87a3535cce2b890897914f5d0d83df669c63
wl1251: Fix possible buffer overflow in wl1251_cmd_scan - kernel/git/stable/linux.git - Linux kernel stable treePatch
-
https://git.kernel.org/stable/c/c5e4a10d7bd5d4f419d8b9705dff60cf69b302a1
wl1251: Fix possible buffer overflow in wl1251_cmd_scan - kernel/git/stable/linux.git - Linux kernel stable treePatch
-
https://git.kernel.org/stable/c/115103f6e3f1c26c473766c16439c7c8b235529a
wl1251: Fix possible buffer overflow in wl1251_cmd_scan - kernel/git/stable/linux.git - Linux kernel stable treePatch
-
https://git.kernel.org/stable/c/57ad99ae3c6738ba87bad259bb57c641ca68ebf6
wl1251: Fix possible buffer overflow in wl1251_cmd_scan - kernel/git/stable/linux.git - Linux kernel stable treePatch
-
https://git.kernel.org/stable/c/d3d8b9c9c7843dce31e284927d4c9904fd5a510a
wl1251: Fix possible buffer overflow in wl1251_cmd_scan - kernel/git/stable/linux.git - Linux kernel stable treePatch
-
https://git.kernel.org/stable/c/d71dddeb5380613f9ef199f3e7368fd78fb1a46e
wl1251: Fix possible buffer overflow in wl1251_cmd_scan - kernel/git/stable/linux.git - Linux kernel stable treePatch
Jump to