NULL Pointer Dereference Affecting kernel-tools package, versions <0:4.18.0-348.el8
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-RHEL8-KERNELTOOLS-7148861
- published 28 May 2024
- disclosed 26 Feb 2024
Introduced: 26 Feb 2024
CVE-2021-46905 Open this link in a new tabHow to fix?
Upgrade RHEL:8
kernel-tools
to version 0:4.18.0-348.el8 or higher.
This issue was patched in RHSA-2021:4356
.
NVD Description
Note: Versions mentioned in the description apply only to the upstream kernel-tools
package and not the kernel-tools
package as distributed by RHEL
.
See How to fix?
for RHEL:8
relevant fixed versions and status.
In the Linux kernel, the following vulnerability has been resolved:
net: hso: fix NULL-deref on disconnect regression
Commit 8a12f8836145 ("net: hso: fix null-ptr-deref during tty device unregistration") fixed the racy minor allocation reported by syzbot, but introduced an unconditional NULL-pointer dereference on every disconnect instead.
Specifically, the serial device table must no longer be accessed after the minor has been released by hso_serial_tty_unregister().
References
- https://access.redhat.com/security/cve/CVE-2021-46905
- https://git.kernel.org/stable/c/0c71d4c89559f72cec2592d078681a843bce570e
- https://git.kernel.org/stable/c/0f000005da31f6947f843ce6b3e3a960540c6e00
- https://git.kernel.org/stable/c/24b699bea7553fc0b98dad9d864befb6005ac7f1
- https://git.kernel.org/stable/c/2ad5692db72874f02b9ad551d26345437ea4f7f3
- https://git.kernel.org/stable/c/41c44e1f3112d7265dae522c026399b2a42d19ef
- https://git.kernel.org/stable/c/5871761c5f0f20d6e98bf3b6bd7486d857589554
- https://git.kernel.org/stable/c/5c17cfe155d21954b4c7e2a78fa771cebcd86725
- https://git.kernel.org/stable/c/90642ee9eb581a13569b1c0bd57e85d962215273
- https://git.kernel.org/stable/c/d7fad2ce15bdbbd0fec3ebe999fd7cab2267f53e