In the Linux kernel, the following vulnerability has been resolved: wl1251:
Fix possible buffer overflow in wl1251_cmd_scan Function wl1251_cmd_scan
calls memcpy without checking the length. Harden by checking the length is
within the maximum allowed size.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 18.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 18.04 | noarch | linux-aws-5.4 | < any | UNKNOWN |
ubuntu | 16.04 | noarch | linux-aws-hwe | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-azure | < any | UNKNOWN |
ubuntu | 14.04 | noarch | linux-azure | < any | UNKNOWN |
ubuntu | 16.04 | noarch | linux-azure | < any | UNKNOWN |
ubuntu | 18.04 | noarch | linux-azure-4.15 | < any | UNKNOWN |
git.kernel.org/linus/d10a87a3535cce2b890897914f5d0d83df669c63 (5.14-rc1)
git.kernel.org/stable/c/0f6c0488368c9ac1aa685821916fadba32f5d1ef
git.kernel.org/stable/c/115103f6e3f1c26c473766c16439c7c8b235529a
git.kernel.org/stable/c/302e2ee34c5f7c5d805b7f835d9a6f2b43474e2a
git.kernel.org/stable/c/40af3960a15339e8bbd3be50c3bc7b35e1a0b6ea
git.kernel.org/stable/c/57ad99ae3c6738ba87bad259bb57c641ca68ebf6
git.kernel.org/stable/c/c5e4a10d7bd5d4f419d8b9705dff60cf69b302a1
git.kernel.org/stable/c/d10a87a3535cce2b890897914f5d0d83df669c63
git.kernel.org/stable/c/d3d8b9c9c7843dce31e284927d4c9904fd5a510a
git.kernel.org/stable/c/d71dddeb5380613f9ef199f3e7368fd78fb1a46e
launchpad.net/bugs/cve/CVE-2021-47347
nvd.nist.gov/vuln/detail/CVE-2021-47347
security-tracker.debian.org/tracker/CVE-2021-47347
www.cve.org/CVERecord?id=CVE-2021-47347