Resource Injection Affecting kernel-doc package, versions <0:4.18.0-553.8.1.el8_10
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-RHEL8-KERNELDOC-6366705
- published 3 Mar 2024
- disclosed 1 Mar 2024
Introduced: 1 Mar 2024
CVE-2021-47073 Open this link in a new tabHow to fix?
Upgrade RHEL:8
kernel-doc
to version 0:4.18.0-553.8.1.el8_10 or higher.
This issue was patched in RHSA-2024:4211
.
NVD Description
Note: Versions mentioned in the description apply only to the upstream kernel-doc
package and not the kernel-doc
package as distributed by RHEL
.
See How to fix?
for RHEL:8
relevant fixed versions and status.
In the Linux kernel, the following vulnerability has been resolved:
platform/x86: dell-smbios-wmi: Fix oops on rmmod dell_smbios
init_dell_smbios_wmi() only registers the dell_smbios_wmi_driver on systems where the Dell WMI interface is supported. While exit_dell_smbios_wmi() unregisters it unconditionally, this leads to the following oops:
[ 175.722921] ------------[ cut here ]------------ [ 175.722925] Unexpected driver unregister! [ 175.722939] WARNING: CPU: 1 PID: 3630 at drivers/base/driver.c:194 driver_unregister+0x38/0x40 ... [ 175.723089] Call Trace: [ 175.723094] cleanup_module+0x5/0xedd [dell_smbios] ... [ 175.723148] ---[ end trace 064c34e1ad49509d ]---
Make the unregister happen on the same condition the register happens to fix this.
References
- https://access.redhat.com/security/cve/CVE-2021-47073
- https://git.kernel.org/stable/c/0cf036a0d325200e6c27b90908e51195bbc557b1
- https://git.kernel.org/stable/c/3a53587423d25c87af4b4126a806a0575104b45e
- https://git.kernel.org/stable/c/6fa78a6b9a3beb676a010dc489c1257f7e432525
- https://git.kernel.org/stable/c/75cfc833da4a2111106d4c134e93e0c7f41e35e7
- https://git.kernel.org/stable/c/8d746ea7c687bab060a2c05a35c449302406cd52