Resource Injection Affecting kernel-zfcpdump-devel package, versions *
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-RHEL8-KERNELZFCPDUMPDEVEL-6497502
- published 27 Mar 2024
- disclosed 25 Mar 2024
Introduced: 25 Mar 2024
CVE-2021-47176 Open this link in a new tabHow to fix?
There is no fixed version for RHEL:8
kernel-zfcpdump-devel
.
NVD Description
Note: Versions mentioned in the description apply only to the upstream kernel-zfcpdump-devel
package and not the kernel-zfcpdump-devel
package as distributed by RHEL
.
See How to fix?
for RHEL:8
relevant fixed versions and status.
In the Linux kernel, the following vulnerability has been resolved:
s390/dasd: add missing discipline function
Fix crash with illegal operation exception in dasd_device_tasklet. Commit b72949328869 ("s390/dasd: Prepare for additional path event handling") renamed the verify_path function for ECKD but not for FBA and DIAG. This leads to a panic when the path verification function is called for a FBA or DIAG device.
Fix by defining a wrapper function for dasd_generic_verify_path().
References
- https://access.redhat.com/security/cve/CVE-2021-47176
- https://git.kernel.org/stable/c/6a16810068e70959bc1df686424aa35ce05578f1
- https://git.kernel.org/stable/c/a16be88a3d7e5efcb59a15edea87a8bd369630c6
- https://git.kernel.org/stable/c/aa8579bc084673c651204f7cd0d6308a47dffc16
- https://git.kernel.org/stable/c/c0c8a8397fa8a74d04915f4d3d28cb4a5d401427