CVE-2021-47609

high

Description

In the Linux kernel, the following vulnerability has been resolved: firmware: arm_scpi: Fix string overflow in SCPI genpd driver Without the bound checks for scpi_pd->name, it could result in the buffer overflow when copying the SCPI device name from the corresponding device tree node as the name string is set at maximum size of 30. Let us fix it by using devm_kasprintf so that the string buffer is allocated dynamically.

References

https://git.kernel.org/stable/c/f0f484714f35d24ffa0ecb4afe3df1c5b225411d

https://git.kernel.org/stable/c/976389cbb16cee46847e5d06250a3a0b5506781e

https://git.kernel.org/stable/c/865ed67ab955428b9aa771d8b4f1e4fb7fd08945

https://git.kernel.org/stable/c/802a1a8501563714a5fe8824f4ed27fec04a0719

https://git.kernel.org/stable/c/7e8645ca2c0046f7cd2f0f7d569fc036c8abaedb

https://git.kernel.org/stable/c/639901b9429a3195e0fead981ed74b51f5f31538

https://git.kernel.org/stable/c/4694b1ec425a2d20d6f8ca3db594829fdf5f2672

Details

Source: Mitre, NVD

Published: 2024-06-19

Updated: 2024-10-30

Risk Information

CVSS v2

Base Score: 6.8

Vector: CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:C

Severity: Medium

CVSS v3

Base Score: 7.8

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Severity: High