First published: Wed Jun 19 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: firmware: arm_scpi: Fix string overflow in SCPI genpd driver The Linux kernel CVE team has assigned <a href="https://access.redhat.com/security/cve/CVE-2021-47609">CVE-2021-47609</a> to this issue. Upstream advisory: <a href="https://lore.kernel.org/linux-cve-announce/2024061907-CVE-2021-47609-5ebf@gregkh/T">https://lore.kernel.org/linux-cve-announce/2024061907-CVE-2021-47609-5ebf@gregkh/T</a>
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <4.9.294 | 4.9.294 |
redhat/kernel | <4.14.259 | 4.14.259 |
redhat/kernel | <4.19.222 | 4.19.222 |
redhat/kernel | <5.4.168 | 5.4.168 |
redhat/kernel | <5.10.88 | 5.10.88 |
redhat/kernel | <5.15.11 | 5.15.11 |
redhat/kernel | <5.16 | 5.16 |
Linux Kernel | >=4.8<4.9.294 | |
Linux Kernel | >=4.10<4.14.259 | |
Linux Kernel | >=4.15<4.19.222 | |
Linux Kernel | >=4.20<5.4.168 | |
Linux Kernel | >=5.5<5.10.88 | |
Linux Kernel | >=5.11<5.15.11 | |
Linux Kernel | =5.16-rc1 | |
Linux Kernel | =5.16-rc2 | |
Linux Kernel | =5.16-rc3 | |
Linux Kernel | =5.16-rc4 | |
Linux Kernel | =5.16-rc5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-47609 is classified as medium due to the potential for string overflow in the SCPI genpd driver in the Linux kernel.
To fix CVE-2021-47609, update the Linux kernel to the latest version as specified in the advisory, for example, kernel versions 4.9.294, 4.14.259, 4.19.222, 5.4.168, 5.10.88, 5.15.11, or 5.16.
CVE-2021-47609 affects Linux kernel versions before 4.9.294, 4.14.259, 4.19.222, 5.4.168, 5.10.88, 5.15.11, and 5.16.
CVE-2021-47609 is not considered to be remotely exploitable as it requires local access to the affected system.
CVE-2021-47609 specifically affects the SCPI genpd driver in the Linux kernel, leading to potential string overflow issues.