First published: Wed Feb 28 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: ataflop: potential out of bounds in do_format() The function uses "type" as an array index: q = unit[drive].disk[type]->queue; Unfortunately the bounds check on "type" isn't done until later in the function. Fix this by moving the bounds check to the start.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | >=5.11<5.11.21 | |
Linux Kernel | >=5.12<5.12.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-47039 has been classified as a medium severity vulnerability affecting the Linux kernel.
To mitigate CVE-2021-47039, ensure that your Linux kernel is updated to version 5.11.21 or later, or version 5.12.4 or later.
CVE-2021-47039 affects Linux kernel versions from 5.11 to 5.11.21 and from 5.12 to 5.12.4.
The impact of CVE-2021-47039 may include potential out of bounds access that could lead to memory corruption.
CVE-2021-47039 is a vulnerability in the Linux kernel, so it can impact any Linux distribution utilizing the affected kernel versions.