CVE-2021-47609

In the Linux kernel, the following vulnerability has been resolved: firmware: arm_scpi: Fix string overflow in SCPI genpd driver Without the bound checks for scpi_pd->name, it could result in the buffer overflow when copying the SCPI device name from the corresponding device tree node as the name string is set at maximum size of 30. Let us fix it by using devm_kasprintf so that the string buffer is allocated dynamically.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.16:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.16:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.16:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.16:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.16:rc5:*:*:*:*:*:*

History

21 Nov 2024, 06:36

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/4694b1ec425a2d20d6f8ca3db594829fdf5f2672 - Patch () https://git.kernel.org/stable/c/4694b1ec425a2d20d6f8ca3db594829fdf5f2672 - Patch
References () https://git.kernel.org/stable/c/639901b9429a3195e0fead981ed74b51f5f31538 - Patch () https://git.kernel.org/stable/c/639901b9429a3195e0fead981ed74b51f5f31538 - Patch
References () https://git.kernel.org/stable/c/7e8645ca2c0046f7cd2f0f7d569fc036c8abaedb - Patch () https://git.kernel.org/stable/c/7e8645ca2c0046f7cd2f0f7d569fc036c8abaedb - Patch
References () https://git.kernel.org/stable/c/802a1a8501563714a5fe8824f4ed27fec04a0719 - Patch () https://git.kernel.org/stable/c/802a1a8501563714a5fe8824f4ed27fec04a0719 - Patch
References () https://git.kernel.org/stable/c/865ed67ab955428b9aa771d8b4f1e4fb7fd08945 - Patch () https://git.kernel.org/stable/c/865ed67ab955428b9aa771d8b4f1e4fb7fd08945 - Patch
References () https://git.kernel.org/stable/c/976389cbb16cee46847e5d06250a3a0b5506781e - Patch () https://git.kernel.org/stable/c/976389cbb16cee46847e5d06250a3a0b5506781e - Patch
References () https://git.kernel.org/stable/c/f0f484714f35d24ffa0ecb4afe3df1c5b225411d - Patch () https://git.kernel.org/stable/c/f0f484714f35d24ffa0ecb4afe3df1c5b225411d - Patch

30 Oct 2024, 21:31

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/4694b1ec425a2d20d6f8ca3db594829fdf5f2672 - () https://git.kernel.org/stable/c/4694b1ec425a2d20d6f8ca3db594829fdf5f2672 - Patch
References () https://git.kernel.org/stable/c/639901b9429a3195e0fead981ed74b51f5f31538 - () https://git.kernel.org/stable/c/639901b9429a3195e0fead981ed74b51f5f31538 - Patch
References () https://git.kernel.org/stable/c/7e8645ca2c0046f7cd2f0f7d569fc036c8abaedb - () https://git.kernel.org/stable/c/7e8645ca2c0046f7cd2f0f7d569fc036c8abaedb - Patch
References () https://git.kernel.org/stable/c/802a1a8501563714a5fe8824f4ed27fec04a0719 - () https://git.kernel.org/stable/c/802a1a8501563714a5fe8824f4ed27fec04a0719 - Patch
References () https://git.kernel.org/stable/c/865ed67ab955428b9aa771d8b4f1e4fb7fd08945 - () https://git.kernel.org/stable/c/865ed67ab955428b9aa771d8b4f1e4fb7fd08945 - Patch
References () https://git.kernel.org/stable/c/976389cbb16cee46847e5d06250a3a0b5506781e - () https://git.kernel.org/stable/c/976389cbb16cee46847e5d06250a3a0b5506781e - Patch
References () https://git.kernel.org/stable/c/f0f484714f35d24ffa0ecb4afe3df1c5b225411d - () https://git.kernel.org/stable/c/f0f484714f35d24ffa0ecb4afe3df1c5b225411d - Patch
First Time Linux
Linux linux Kernel
CWE CWE-120
CPE cpe:2.3:o:linux:linux_kernel:5.16:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.16:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.16:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.16:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.16:rc4:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8

20 Jun 2024, 12:43

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: firmware: arm_scpi: corrige el desbordamiento de cadena en el controlador SCPI genpd. Sin las comprobaciones vinculadas para scpi_pd->name, podría provocar un desbordamiento del búfer al copiar el nombre del dispositivo SCPI del dispositivo correspondiente. El nodo del árbol como cadena de nombre se establece en un tamaño máximo de 30. Arreglemoslo usando devm_kasprintf para que el búfer de cadena se asigne dinámicamente.

19 Jun 2024, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-06-19 15:15

Updated : 2024-11-21 06:36


NVD link : CVE-2021-47609

Mitre link : CVE-2021-47609

CVE.ORG link : CVE-2021-47609


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')