CVE-2021-47039

In the Linux kernel, the following vulnerability has been resolved: ataflop: potential out of bounds in do_format() The function uses "type" as an array index: q = unit[drive].disk[type]->queue; Unfortunately the bounds check on "type" isn't done until later in the function. Fix this by moving the bounds check to the start.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

09 Jan 2025, 15:31

Type Values Removed Values Added
CWE CWE-125
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/07f86aa8f4fe077be1b018cc177eb8c6573e5671 - () https://git.kernel.org/stable/c/07f86aa8f4fe077be1b018cc177eb8c6573e5671 - Patch
References () https://git.kernel.org/stable/c/1ffec389a6431782a8a28805830b6fae9bf00af1 - () https://git.kernel.org/stable/c/1ffec389a6431782a8a28805830b6fae9bf00af1 - Patch
References () https://git.kernel.org/stable/c/2a3a8bbca28b899806844c00d49ed1b7ccb50957 - () https://git.kernel.org/stable/c/2a3a8bbca28b899806844c00d49ed1b7ccb50957 - Patch
First Time Linux
Linux linux Kernel
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.1

21 Nov 2024, 06:35

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/07f86aa8f4fe077be1b018cc177eb8c6573e5671 - () https://git.kernel.org/stable/c/07f86aa8f4fe077be1b018cc177eb8c6573e5671 -
References () https://git.kernel.org/stable/c/1ffec389a6431782a8a28805830b6fae9bf00af1 - () https://git.kernel.org/stable/c/1ffec389a6431782a8a28805830b6fae9bf00af1 -
References () https://git.kernel.org/stable/c/2a3a8bbca28b899806844c00d49ed1b7ccb50957 - () https://git.kernel.org/stable/c/2a3a8bbca28b899806844c00d49ed1b7ccb50957 -
Summary
  • (es) En el kernel de Linux se ha resuelto la siguiente vulnerabilidad: ataflop: potencial fuera de los límites en do_format() La función utiliza "tipo" como índice de matriz: q = unidad[unidad].disco[tipo]->cola; Desafortunadamente, la verificación de los límites en "tipo" no se realiza hasta más adelante en la función. Solucione este problema moviendo la verificación de los límites al inicio.

28 Feb 2024, 09:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-02-28 09:15

Updated : 2025-01-09 15:31


NVD link : CVE-2021-47039

Mitre link : CVE-2021-47039

CVE.ORG link : CVE-2021-47039


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-125

Out-of-bounds Read