Use After Free Affecting kernel package, versions *
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-CENTOS7-KERNEL-6330769
- published 29 Feb 2024
- disclosed 28 Feb 2024
Introduced: 28 Feb 2024
CVE-2021-47049 Open this link in a new tabHow to fix?
There is no fixed version for Centos:7
kernel
.
NVD Description
Note: Versions mentioned in the description apply only to the upstream kernel
package and not the kernel
package as distributed by Centos
.
See How to fix?
for Centos:7
relevant fixed versions and status.
In the Linux kernel, the following vulnerability has been resolved:
Drivers: hv: vmbus: Use after free in __vmbus_open()
The "open_info" variable is added to the &vmbus_connection.chn_msg_list, but the error handling frees "open_info" without removing it from the list. This will result in a use after free. First remove it from the list, and then free it.
References
- https://access.redhat.com/security/cve/CVE-2021-47049
- https://git.kernel.org/stable/c/2728f289b3270b0e273292b46c534421a33bbfd5
- https://git.kernel.org/stable/c/3e9bf43f7f7a46f21ec071cb47be92d0874c48da
- https://git.kernel.org/stable/c/d5c7b42c9f56ca46b286daa537d181bd7f69214f
- https://git.kernel.org/stable/c/f37dd5d1b5d38a79a4f7b8dd7bbb705505f05560