CVE-2021-47055 Affecting kernel-debug package, versions <0:4.18.0-553.5.1.el8_10
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-RHEL8-KERNELDEBUG-6349852
- published 1 Mar 2024
- disclosed 29 Feb 2024
Introduced: 29 Feb 2024
CVE-2021-47055 Open this link in a new tabHow to fix?
Upgrade RHEL:8
kernel-debug
to version 0:4.18.0-553.5.1.el8_10 or higher.
This issue was patched in RHSA-2024:3618
.
NVD Description
Note: Versions mentioned in the description apply only to the upstream kernel-debug
package and not the kernel-debug
package as distributed by RHEL
.
See How to fix?
for RHEL:8
relevant fixed versions and status.
In the Linux kernel, the following vulnerability has been resolved:
mtd: require write permissions for locking and badblock ioctls
MEMLOCK, MEMUNLOCK and OTPLOCK modify protection bits. Thus require write permission. Depending on the hardware MEMLOCK might even be write-once, e.g. for SPI-NOR flashes with their WP# tied to GND. OTPLOCK is always write-once.
MEMSETBADBLOCK modifies the bad block table.
References
- https://access.redhat.com/security/cve/CVE-2021-47055
- https://git.kernel.org/stable/c/077259f5e777c3c8821f6b41dee709fcda27306b
- https://git.kernel.org/stable/c/1e97743fd180981bef5f01402342bb54bf1c6366
- https://git.kernel.org/stable/c/5880afefe0cb9b2d5e801816acd58bfe91a96981
- https://git.kernel.org/stable/c/75ed985bd6c8ac1d4e673e93ea9d96c9908c1d37
- https://git.kernel.org/stable/c/7b6552719c0ccbbea29dde4be141da54fdb5877e
- https://git.kernel.org/stable/c/9625b00cac6630479c0ff4b9fafa88bee636e1f0
- https://git.kernel.org/stable/c/a08799d3e8c8088640956237c183f83463c39668
- https://git.kernel.org/stable/c/f4d28d8b9b0e7c4ae04214b8d7e0b0466ec6bcaf
- https://git.kernel.org/stable/c/f73b29819c6314c0ba8b7d5892dfb03487424bee