{ "id": "CVE-2021-47039", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-28T09:15:39.950", "lastModified": "2024-02-28T14:06:45.783", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nataflop: potential out of bounds in do_format()\n\nThe function uses \"type\" as an array index:\n\n\tq = unit[drive].disk[type]->queue;\n\nUnfortunately the bounds check on \"type\" isn't done until later in the\nfunction. Fix this by moving the bounds check to the start." }, { "lang": "es", "value": "En el kernel de Linux se ha resuelto la siguiente vulnerabilidad: ataflop: potencial fuera de los l\u00edmites en do_format() La funci\u00f3n utiliza \"tipo\" como \u00edndice de matriz: q = unidad[unidad].disco[tipo]->cola; Desafortunadamente, la verificaci\u00f3n de los l\u00edmites en \"tipo\" no se realiza hasta m\u00e1s adelante en la funci\u00f3n. Solucione este problema moviendo la verificaci\u00f3n de los l\u00edmites al inicio." } ], "metrics": {}, "references": [ { "url": "https://git.kernel.org/stable/c/07f86aa8f4fe077be1b018cc177eb8c6573e5671", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" }, { "url": "https://git.kernel.org/stable/c/1ffec389a6431782a8a28805830b6fae9bf00af1", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" }, { "url": "https://git.kernel.org/stable/c/2a3a8bbca28b899806844c00d49ed1b7ccb50957", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] }