CVE-2021-47373 Affecting kernel-debug-core package, versions <0:4.18.0-553.16.1.el8_10
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-ROCKY8-KERNELDEBUGCORE-7781942
- published 22 Aug 2024
- disclosed 21 May 2024
Introduced: 21 May 2024
CVE-2021-47373 Open this link in a new tabHow to fix?
Upgrade Rocky-Linux:8
kernel-debug-core
to version 0:4.18.0-553.16.1.el8_10 or higher.
This issue was patched in RLSA-2024:5101
.
NVD Description
Note: Versions mentioned in the description apply only to the upstream kernel-debug-core
package and not the kernel-debug-core
package as distributed by Rocky-Linux
.
See How to fix?
for Rocky-Linux:8
relevant fixed versions and status.
In the Linux kernel, the following vulnerability has been resolved:
irqchip/gic-v3-its: Fix potential VPE leak on error
In its_vpe_irq_domain_alloc, when its_vpe_init() returns an error, there is an off-by-one in the number of VPEs to be freed.
Fix it by simply passing the number of VPEs allocated, which is the index of the loop iterating over the VPEs.
[maz: fixed commit message]
References
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47373
- https://git.kernel.org/stable/c/280bef512933b2dda01d681d8cbe499b98fc5bdd
- https://git.kernel.org/stable/c/42d3711c23781045e7a5cd28536c774b9a66d20b
- https://git.kernel.org/stable/c/568662e37f927e3dc3e475f3ff7cf4ab7719c5e7
- https://git.kernel.org/stable/c/5701e8bff314c155e7afdc467b1e0389d86853d0
- https://git.kernel.org/stable/c/7d39992d45acd6f2d6b2f62389c55b61fb3d486b
- https://git.kernel.org/stable/c/e0c1c2e5da19685a20557a50f10c6aa4fa26aa84