CVE-2021-47347

In the Linux kernel, the following vulnerability has been resolved: wl1251: Fix possible buffer overflow in wl1251_cmd_scan Function wl1251_cmd_scan calls memcpy without checking the length. Harden by checking the length is within the maximum allowed size.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

02 Apr 2025, 14:31

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/0f6c0488368c9ac1aa685821916fadba32f5d1ef - () https://git.kernel.org/stable/c/0f6c0488368c9ac1aa685821916fadba32f5d1ef - Patch
References () https://git.kernel.org/stable/c/115103f6e3f1c26c473766c16439c7c8b235529a - () https://git.kernel.org/stable/c/115103f6e3f1c26c473766c16439c7c8b235529a - Patch
References () https://git.kernel.org/stable/c/302e2ee34c5f7c5d805b7f835d9a6f2b43474e2a - () https://git.kernel.org/stable/c/302e2ee34c5f7c5d805b7f835d9a6f2b43474e2a - Patch
References () https://git.kernel.org/stable/c/40af3960a15339e8bbd3be50c3bc7b35e1a0b6ea - () https://git.kernel.org/stable/c/40af3960a15339e8bbd3be50c3bc7b35e1a0b6ea - Patch
References () https://git.kernel.org/stable/c/57ad99ae3c6738ba87bad259bb57c641ca68ebf6 - () https://git.kernel.org/stable/c/57ad99ae3c6738ba87bad259bb57c641ca68ebf6 - Patch
References () https://git.kernel.org/stable/c/c5e4a10d7bd5d4f419d8b9705dff60cf69b302a1 - () https://git.kernel.org/stable/c/c5e4a10d7bd5d4f419d8b9705dff60cf69b302a1 - Patch
References () https://git.kernel.org/stable/c/d10a87a3535cce2b890897914f5d0d83df669c63 - () https://git.kernel.org/stable/c/d10a87a3535cce2b890897914f5d0d83df669c63 - Patch
References () https://git.kernel.org/stable/c/d3d8b9c9c7843dce31e284927d4c9904fd5a510a - () https://git.kernel.org/stable/c/d3d8b9c9c7843dce31e284927d4c9904fd5a510a - Patch
References () https://git.kernel.org/stable/c/d71dddeb5380613f9ef199f3e7368fd78fb1a46e - () https://git.kernel.org/stable/c/d71dddeb5380613f9ef199f3e7368fd78fb1a46e - Patch
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
First Time Linux linux Kernel
Linux

Information

Published : 2024-05-21 15:15

Updated : 2025-04-02 14:31


NVD link : CVE-2021-47347

Mitre link : CVE-2021-47347

CVE.ORG link : CVE-2021-47347


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')