Use After Free Affecting kernel-rt-modules package, versions *
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-CENTOS8-KERNELRTMODULES-7036002
- published 23 May 2024
- disclosed 22 May 2024
Introduced: 22 May 2024
CVE-2021-47480 Open this link in a new tabHow to fix?
There is no fixed version for Centos:8
kernel-rt-modules
.
NVD Description
Note: Versions mentioned in the description apply only to the upstream kernel-rt-modules
package and not the kernel-rt-modules
package as distributed by Centos
.
See How to fix?
for Centos:8
relevant fixed versions and status.
In the Linux kernel, the following vulnerability has been resolved:
scsi: core: Put LLD module refcnt after SCSI device is released
SCSI host release is triggered when SCSI device is freed. We have to make sure that the low-level device driver module won't be unloaded before SCSI host instance is released because shost->hostt is required in the release handler.
Make sure to put LLD module refcnt after SCSI device is released.
Fixes a kernel panic of 'BUG: unable to handle page fault for address' reported by Changhui and Yi.
References
- https://access.redhat.com/security/cve/CVE-2021-47480
- https://git.kernel.org/stable/c/1105573d964f7b78734348466b01f5f6ba8a1813
- https://git.kernel.org/stable/c/1ce287eff9f23181d5644db787f472463a61f68b
- https://git.kernel.org/stable/c/61a0faa89f21861d1f8d059123b5c285a5d9ffee
- https://git.kernel.org/stable/c/7b57c38d12aed1b5d92f74748bed25e0d041729f
- https://git.kernel.org/stable/c/8e4814a461787e15a31d322d9efbe0d4f6822428
- https://git.kernel.org/stable/c/c2df161f69fb1c67f63adbd193368b47f511edc0
- https://git.kernel.org/stable/c/f2b85040acec9a928b4eb1b57a989324e8e38d3f
- https://git.kernel.org/stable/c/f30822c0b4c35ec86187ab055263943dc71a6836