CVE-2021-47609

Updated: 2024-10-30 23:41:59.685569

Description:

In the Linux kernel, the following vulnerability has been resolved: firmware: arm_scpi: Fix string overflow in SCPI genpd driver Without the bound checks for scpi_pd->name, it could result in the buffer overflow when copying the SCPI device name from the corresponding device tree node as the name string is set at maximum size of 30. Let us fix it by using devm_kasprintf so that the string buffer is allocated dynamically.


Links NIST CIRCL RHEL Ubuntu

Severity

Severity Score
CVSS Version 2.x 0
CVSS Version 3.x HIGH 7.8

Status

OS name Project name Version Score Severity Status Errata Last updated
AlmaLinux 9.2 ESU kernel 5.14.0 7.8 HIGH Ignored 2024-09-25 12:26:57
AlmaLinux 9.2 FIPS kernel 5.14.0 7.8 HIGH Ignored 2024-09-25 12:26:57
CentOS 6 ELS kernel 2.6.32 7.8 HIGH Not Vulnerable 2024-11-01 03:43:37
CentOS 7 ELS kernel 3.10.0 7.8 HIGH Not Vulnerable 2024-11-01 03:43:37
CentOS 8.4 ELS kernel 4.18.0 7.8 HIGH Not Vulnerable 2024-11-01 03:43:37
CentOS 8.5 ELS kernel 4.18.0 7.8 HIGH Not Vulnerable 2024-11-01 03:43:37
CentOS Stream 8 ELS kernel 4.18.0 7.8 HIGH Not Vulnerable 2024-11-01 03:43:36
CloudLinux 6 ELS kernel 2.6.32 7.8 HIGH Not Vulnerable 2024-11-01 03:43:37
CloudLinux 7 ELS kernel 3.10.0 7.8 HIGH Not Vulnerable 2024-11-01 03:43:36
Oracle Linux 6 ELS kernel 2.6.32 7.8 HIGH Not Vulnerable 2024-11-01 03:43:36
Total: 11