7.8
CVE-2021-47485
- EPSS 0.03%
- Published 22.05.2024 09:15:10
- Last modified 06.01.2025 19:53:06
- Source 416baaa9-dc9f-4396-8d5f-8c081f
- CVE-Watchlists
- Open
In the Linux kernel, the following vulnerability has been resolved: IB/qib: Protect from buffer overflow in struct qib_user_sdma_pkt fields Overflowing either addrlimit or bytes_togo can allow userspace to trigger a buffer overflow of kernel memory. Check for overflows in all the places doing math on user controlled buffers.
Data is provided by the National Vulnerability Database (NVD)
Linux ≫ Linux Kernel Version >= 2.6.35 < 4.4.292
Linux ≫ Linux Kernel Version >= 4.5 < 4.9.290
Linux ≫ Linux Kernel Version >= 4.10 < 4.14.255
Linux ≫ Linux Kernel Version >= 4.15 < 4.19.216
Linux ≫ Linux Kernel Version >= 4.20 < 5.4.157
Linux ≫ Linux Kernel Version >= 5.5 < 5.10.77
Linux ≫ Linux Kernel Version >= 5.11 < 5.14.16
Linux ≫ Linux Kernel Version5.15 Updaterc1
Linux ≫ Linux Kernel Version5.15 Updaterc2
Linux ≫ Linux Kernel Version5.15 Updaterc3
Linux ≫ Linux Kernel Version5.15 Updaterc4
Linux ≫ Linux Kernel Version5.15 Updaterc5
Linux ≫ Linux Kernel Version5.15 Updaterc6
Linux ≫ Linux Kernel Version5.15 Updaterc7
| Type | Source | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.03% | 0.076 |
| Source | Base Score | Exploit Score | Impact Score | Vector string |
|---|---|---|---|---|
| nvd@nist.gov | 7.8 | 1.8 | 5.9 |
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
|
CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.