CVE-2021-47232 Affecting kernel-zfcpdump-modules-internal package, versions *
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-RHEL9-KERNELZFCPDUMPMODULESINTERNAL-7090383
- published 24 May 2024
- disclosed 21 May 2024
How to fix?
There is no fixed version for RHEL:9
kernel-zfcpdump-modules-internal
.
NVD Description
Note: Versions mentioned in the description apply only to the upstream kernel-zfcpdump-modules-internal
package and not the kernel-zfcpdump-modules-internal
package as distributed by RHEL
.
See How to fix?
for RHEL:9
relevant fixed versions and status.
In the Linux kernel, the following vulnerability has been resolved:
can: j1939: fix Use-after-Free, hold skb ref while in use
This patch fixes a Use-after-Free found by the syzbot.
The problem is that a skb is taken from the per-session skb queue, without incrementing the ref count. This leads to a Use-after-Free if the skb is taken concurrently from the session queue due to a CTS.
References
- https://access.redhat.com/security/cve/CVE-2021-47232
- https://git.kernel.org/stable/c/1071065eeb33d32b7d98c2ce7591881ae7381705
- https://git.kernel.org/stable/c/2030043e616cab40f510299f09b636285e0a3678
- https://git.kernel.org/stable/c/22cba878abf646cd3a02ee7c8c2cef7afe66a256
- https://git.kernel.org/stable/c/509ab6bfdd0c76daebbad0f0af07da712116de22