CVE-2021-47477

In the Linux kernel, the following vulnerability has been resolved: comedi: dt9812: fix DMA buffers on stack USB transfer buffers are typically mapped for DMA and must not be allocated on the stack or transfers will fail. Allocate proper transfer buffers in the various command helpers and return an error on short transfers instead of acting on random stack data. Note that this also fixes a stack info leak on systems where DMA is not used as 32 bytes are always sent to the device regardless of how short the command is.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

24 Sep 2025, 19:00

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/20cebb8b620dc987e55ddc46801de986e081757e - () https://git.kernel.org/stable/c/20cebb8b620dc987e55ddc46801de986e081757e - Patch
References () https://git.kernel.org/stable/c/365a346cda82f51d835c49136a00a9df8a78c7f2 - () https://git.kernel.org/stable/c/365a346cda82f51d835c49136a00a9df8a78c7f2 - Patch
References () https://git.kernel.org/stable/c/39ea61037ae78f14fa121228dd962ea3280eacf3 - () https://git.kernel.org/stable/c/39ea61037ae78f14fa121228dd962ea3280eacf3 - Patch
References () https://git.kernel.org/stable/c/3ac273d154d634e2034508a14db82a95d7ad12ed - () https://git.kernel.org/stable/c/3ac273d154d634e2034508a14db82a95d7ad12ed - Patch
References () https://git.kernel.org/stable/c/3efb7af8ac437085b6c776e5b54830b149d86efe - () https://git.kernel.org/stable/c/3efb7af8ac437085b6c776e5b54830b149d86efe - Patch
References () https://git.kernel.org/stable/c/536de747bc48262225889a533db6650731ab25d3 - () https://git.kernel.org/stable/c/536de747bc48262225889a533db6650731ab25d3 - Patch
References () https://git.kernel.org/stable/c/786f5b03450454557ff858a8bead5d7c0cbf78d6 - () https://git.kernel.org/stable/c/786f5b03450454557ff858a8bead5d7c0cbf78d6 - Patch
References () https://git.kernel.org/stable/c/8a52bc480992c7c9da3ebfea456af731f50a4b97 - () https://git.kernel.org/stable/c/8a52bc480992c7c9da3ebfea456af731f50a4b97 - Patch
References () https://git.kernel.org/stable/c/a6af69768d5cb4b2528946d53be5fa19ade37723 - () https://git.kernel.org/stable/c/a6af69768d5cb4b2528946d53be5fa19ade37723 - Patch
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CWE CWE-787
CVSS v2 : unknown
v3 : 5.3
v2 : unknown
v3 : 7.8
First Time Linux
Linux linux Kernel

21 Nov 2024, 06:36

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/20cebb8b620dc987e55ddc46801de986e081757e - () https://git.kernel.org/stable/c/20cebb8b620dc987e55ddc46801de986e081757e -
References () https://git.kernel.org/stable/c/365a346cda82f51d835c49136a00a9df8a78c7f2 - () https://git.kernel.org/stable/c/365a346cda82f51d835c49136a00a9df8a78c7f2 -
References () https://git.kernel.org/stable/c/39ea61037ae78f14fa121228dd962ea3280eacf3 - () https://git.kernel.org/stable/c/39ea61037ae78f14fa121228dd962ea3280eacf3 -
References () https://git.kernel.org/stable/c/3ac273d154d634e2034508a14db82a95d7ad12ed - () https://git.kernel.org/stable/c/3ac273d154d634e2034508a14db82a95d7ad12ed -
References () https://git.kernel.org/stable/c/3efb7af8ac437085b6c776e5b54830b149d86efe - () https://git.kernel.org/stable/c/3efb7af8ac437085b6c776e5b54830b149d86efe -
References () https://git.kernel.org/stable/c/536de747bc48262225889a533db6650731ab25d3 - () https://git.kernel.org/stable/c/536de747bc48262225889a533db6650731ab25d3 -
References () https://git.kernel.org/stable/c/786f5b03450454557ff858a8bead5d7c0cbf78d6 - () https://git.kernel.org/stable/c/786f5b03450454557ff858a8bead5d7c0cbf78d6 -
References () https://git.kernel.org/stable/c/8a52bc480992c7c9da3ebfea456af731f50a4b97 - () https://git.kernel.org/stable/c/8a52bc480992c7c9da3ebfea456af731f50a4b97 -
References () https://git.kernel.org/stable/c/a6af69768d5cb4b2528946d53be5fa19ade37723 - () https://git.kernel.org/stable/c/a6af69768d5cb4b2528946d53be5fa19ade37723 -

06 Nov 2024, 20:35

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.3
Summary
  • (es) En el kernel de Linux, se resolvió la siguiente vulnerabilidad: comedi: dt9812: corrige los búferes DMA en la pila Los búferes de transferencia USB generalmente están asignados para DMA y no deben asignarse en la pila o las transferencias fallarán. Asigne búferes de transferencia adecuados en los distintos asistentes de comando y devuelva un error en transferencias cortas en lugar de actuar sobre datos de pila aleatorios. Tenga en cuenta que esto también soluciona una fuga de información de la pila en sistemas donde no se usa DMA, ya que siempre se envían 32 bytes al dispositivo, independientemente de cuán corto sea el comando.

22 May 2024, 09:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-22 09:15

Updated : 2025-09-24 19:00


NVD link : CVE-2021-47477

Mitre link : CVE-2021-47477

CVE.ORG link : CVE-2021-47477


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-787

Out-of-bounds Write