First published: Tue May 21 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: hwmon: (w83793) Fix NULL pointer dereference by removing unnecessary structure field If driver read tmp value sufficient for (tmp & 0x08) && (!(tmp & 0x80)) && ((tmp & 0x7) == ((tmp >> 4) & 0x7)) from device then Null pointer dereference occurs. (It is possible if tmp = 0b0xyz1xyz, where same literals mean same numbers) Also lm75[] does not serve a purpose anymore after switching to devm_i2c_new_dummy_device() in w83791d_detect_subclients(). The patch fixes possible NULL pointer dereference by removing lm75[]. Found by Linux Driver Verification project (linuxtesting.org). [groeck: Dropped unnecessary continuation lines, fixed multi-line alignments]
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <5.4.151 | 5.4.151 |
redhat/kernel | <5.10.71 | 5.10.71 |
redhat/kernel | <5.14.10 | 5.14.10 |
redhat/kernel | <5.15 | 5.15 |
Linux Kernel | <5.4.151 | |
Linux Kernel | >=5.5<5.10.71 | |
Linux Kernel | >=5.11<5.14.10 | |
Linux Kernel | =5.15-rc1 | |
Linux Kernel | =5.15-rc2 | |
Linux Kernel | =5.15-rc3 | |
IBM Security Verify Governance - Identity Manager | <=ISVG 10.0.2 | |
IBM Security Verify Governance, Identity Manager Software Stack | <=ISVG 10.0.2 | |
IBM Security Verify Governance, Identity Manager Virtual Appliance | <=ISVG 10.0.2 | |
IBM Security Verify Governance Identity Manager Container | <=ISVG 10.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-47384 has been classified as a low-severity vulnerability in the Linux kernel.
To fix CVE-2021-47384, you need to update the Linux kernel to versions 5.4.151, 5.10.71, 5.14.10, or 5.15.
CVE-2021-47384 affects Linux kernel versions prior to 5.4.151, 5.10.71, 5.14.10, and 5.15.
The impact of CVE-2021-47384 is a potential NULL pointer dereference vulnerability when certain driver conditions are met.
CVE-2021-47384 is relevant to multiple Linux distributions that use the affected kernel versions, including Red Hat.