NULL Pointer Dereference Affecting kernel-doc package, versions *
Threat Intelligence
EPSS
0.04% (6th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-CENTOS7-KERNELDOC-6302018
- published 28 Feb 2024
- disclosed 27 Feb 2024
Introduced: 27 Feb 2024
CVE-2021-46948 Open this link in a new tabHow to fix?
There is no fixed version for Centos:7
kernel-doc
.
NVD Description
Note: Versions mentioned in the description apply only to the upstream kernel-doc
package and not the kernel-doc
package as distributed by Centos
.
See How to fix?
for Centos:7
relevant fixed versions and status.
In the Linux kernel, the following vulnerability has been resolved:
sfc: farch: fix TX queue lookup in TX event handling
We're starting from a TXQ label, not a TXQ type, so efx_channel_get_tx_queue() is inappropriate (and could return NULL, leading to panics).
References
- https://access.redhat.com/security/cve/CVE-2021-46948
- https://git.kernel.org/stable/c/35c7a83ad1bb1d48ae249346e61b1132bcbf9052
- https://git.kernel.org/stable/c/83b09a1807415608b387c7bc748d329fefc5617e
- https://git.kernel.org/stable/c/bf2b941d0a6f2d3b9f5fa3c4c21bdd54f71ce253
- https://git.kernel.org/stable/c/e531db1ea6f98c9612cb2de093a107c7eadfb96c
CVSS Scores
version 3.1