NULL Pointer Dereference Affecting kernel-doc package, versions *
Threat Intelligence
EPSS
0.05% (17th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-RHEL8-KERNELDOC-7236838
- published 10 Jun 2024
- disclosed 21 May 2024
Introduced: 21 May 2024
CVE-2021-47307 Open this link in a new tabHow to fix?
There is no fixed version for RHEL:8
kernel-doc
.
NVD Description
Note: Versions mentioned in the description apply only to the upstream kernel-doc
package and not the kernel-doc
package as distributed by RHEL
.
See How to fix?
for RHEL:8
relevant fixed versions and status.
In the Linux kernel, the following vulnerability has been resolved:
cifs: prevent NULL deref in cifs_compose_mount_options()
The optional @ref parameter might contain an NULL node_name, so prevent dereferencing it in cifs_compose_mount_options().
Addresses-Coverity: 1476408 ("Explicit null dereferenced")
References
- https://access.redhat.com/security/cve/CVE-2021-47307
- https://git.kernel.org/stable/c/03313d1c3a2f086bb60920607ab79ac8f8578306
- https://git.kernel.org/stable/c/ae3d181f4e912f51af7776ea165f199b16fc165d
- https://git.kernel.org/stable/c/e58c162789becede894d3e94c0ce6695a2ef5796
- https://git.kernel.org/stable/c/f7d1fa65e74263d11f90ddd33b4d4cd905a93759
CVSS Scores
version 3.1