ALT-BU-2021-4033-14
Branch sisyphus update bulletin.
Closed vulnerabilities
Modified: 2024-09-16
BDU:2021-03559
Уязвимость модуля pdo_firebase интерпретатора языка программирования PHP, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-09-13
BDU:2021-03703
Уязвимость функции php_url_parse_ex() интерпретатора языка программирования PHP, позволяющая нарушителю осуществить SSRF-атаку
Modified: 2024-11-21
CVE-2021-21704
In PHP versions 7.3.x below 7.3.29, 7.4.x below 7.4.21 and 8.0.x below 8.0.8, when using Firebird PDO driver extension, a malicious database server could cause crashes in various database functions, such as getAttribute(), execute(), fetch() and others by returning invalid response data that is not parsed correctly by the driver. This can result in crashes, denial of service or potentially memory corruption.
- https://bugs.php.net/bug.php?id=76448
- https://bugs.php.net/bug.php?id=76449
- https://bugs.php.net/bug.php?id=76450
- https://bugs.php.net/bug.php?id=76452
- https://security.gentoo.org/glsa/202209-20
- https://security.netapp.com/advisory/ntap-20211029-0006/
- https://bugs.php.net/bug.php?id=76448
- https://bugs.php.net/bug.php?id=76449
- https://bugs.php.net/bug.php?id=76450
- https://bugs.php.net/bug.php?id=76452
- https://security.gentoo.org/glsa/202209-20
- https://security.netapp.com/advisory/ntap-20211029-0006/
Modified: 2024-11-21
CVE-2021-21705
In PHP versions 7.3.x below 7.3.29, 7.4.x below 7.4.21 and 8.0.x below 8.0.8, when using URL validation functionality via filter_var() function with FILTER_VALIDATE_URL parameter, an URL with invalid password field can be accepted as valid. This can lead to the code incorrectly parsing the URL and potentially leading to other security implications - like contacting a wrong server or making a wrong access decision.
- https://bugs.php.net/bug.php?id=81122
- https://security.gentoo.org/glsa/202209-20
- https://security.netapp.com/advisory/ntap-20211029-0006/
- https://www.oracle.com/security-alerts/cpujan2022.html
- https://bugs.php.net/bug.php?id=81122
- https://security.gentoo.org/glsa/202209-20
- https://security.netapp.com/advisory/ntap-20211029-0006/
- https://www.oracle.com/security-alerts/cpujan2022.html
Closed vulnerabilities
Modified: 2025-08-13
CVE-2018-13440
The audiofile Audio File Library 0.3.6 has a NULL pointer dereference bug in ModuleState::setup in modules/ModuleState.cpp, which allows an attacker to cause a denial of service via a crafted caf file, as demonstrated by sfconvert.
Modified: 2025-08-13
CVE-2018-17095
An issue has been discovered in mpruett Audio File Library (aka audiofile) 0.3.6, 0.3.5, 0.3.4, 0.3.3, 0.3.2, 0.3.1, 0.3.0. A heap-based buffer overflow in Expand3To4Module::run has occurred when running sfconvert.
Package claws-mail updated to version 3.18.0-alt1 for branch sisyphus in task 278168.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2021-37746
textview_uri_security_check in textview.c in Claws Mail before 3.18.0, and Sylpheed through 3.7.0, does not have sufficient link checks before accepting a click.
- https://claws-mail.org/download.php?file=releases/claws-mail-3.18.0.tar.xz
- https://git.claws-mail.org/?p=claws.git%3Ba=commit%3Bh=ac286a71ed78429e16c612161251b9ea90ccd431
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L2QNUIWASJLPUZZKWICGCEGYJZCQE7NH/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RCJXHUSYHGVBSH2ULD7HNXLM7QNRECZ6/
- https://sylpheed.sraoss.jp/sylpheed/v3.7/sylpheed-3.7.0.tar.xz
- https://claws-mail.org/download.php?file=releases/claws-mail-3.18.0.tar.xz
- https://git.claws-mail.org/?p=claws.git%3Ba=commit%3Bh=ac286a71ed78429e16c612161251b9ea90ccd431
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L2QNUIWASJLPUZZKWICGCEGYJZCQE7NH/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RCJXHUSYHGVBSH2ULD7HNXLM7QNRECZ6/
- https://sylpheed.sraoss.jp/sylpheed/v3.7/sylpheed-3.7.0.tar.xz
Closed vulnerabilities
Modified: 2024-07-30
BDU:2021-02957
Уязвимость библиотеки Lasso, связанная с небезопасным управлением привилегиями, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
Modified: 2024-11-21
CVE-2021-28091
Lasso all versions prior to 2.7.0 has improper verification of a cryptographic signature.
- http://listes.entrouvert.com/arc/lasso/
- https://git.entrouvert.org/lasso.git/commit/?id=076a37d7f0eb74001127481da2d355683693cde9
- https://git.entrouvert.org/lasso.git/tree/NEWS?id=v2.7.0
- https://lists.debian.org/debian-lts-announce/2021/06/msg00013.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SI4YAQF4VEV2KHQ6OXXZL7CJK7IZQ3EG/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YSVWOHBBWLI2RB5C6TXINFEJRT4YSD3D/
- https://www.debian.org/security/2021/dsa-4926
- http://listes.entrouvert.com/arc/lasso/
- https://git.entrouvert.org/lasso.git/commit/?id=076a37d7f0eb74001127481da2d355683693cde9
- https://git.entrouvert.org/lasso.git/tree/NEWS?id=v2.7.0
- https://lists.debian.org/debian-lts-announce/2021/06/msg00013.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SI4YAQF4VEV2KHQ6OXXZL7CJK7IZQ3EG/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YSVWOHBBWLI2RB5C6TXINFEJRT4YSD3D/
- https://www.debian.org/security/2021/dsa-4926
Closed bugs
Сломалась сборка getfemxx
Closed bugs
libx86 FTBFS on aarch64, armh, and ppc64le
Package libspandsp updated to version 0.0.6-alt2 for branch sisyphus in task 278574.
Closed bugs
libspandsp FTBFS: duplicate provides
Package kernel-image-mp updated to version 5.12.16-alt1 for branch sisyphus in task 278594.
Closed vulnerabilities
Modified: 2025-01-29
BDU:2021-03232
Уязвимость подсистемы еBPF ядра операционной системы Linux, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
Modified: 2026-01-20
BDU:2021-03938
Уязвимость компонента kernel/module.c ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
Modified: 2024-06-03
BDU:2021-04244
Уязвимость компонента drivers/net/ethernet/xilinx/ll_temac_main.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-06-03
BDU:2021-04712
Уязвимость компонента arch/powerpc/perf/core-book3s.c ядра операционной системы Linux, связанная с ошибками разыменования указателя, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-22
BDU:2021-04859
Уязвимость синтаксического анализатора radiotap подсистемы mac80211 ядра операционной системы Linux, связанная с ошибками разыменования указателя, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2022-10-20
BDU:2022-00513
Уязвимость функции nf_tables_newset (net/netfilter/nf_tables_api.c) ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2025-00793
Уязвимость компонента subflow_error_report() ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2025-00794
Уязвимость ядра операционной системы Linux, связанная с ошибками при блокировке потоков, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2025-03664
Уязвимость функции __fpu__restore_sig() модуля arch/x86/kernel/fpu/signal.c поддержки платформы x86 ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2025-07312
Уязвимость функции j1939_session_skb_drop_old() модуля net/can/j1939/transport.c поддержки сокетов j1939 шины CAN ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2025-07315
Уязвимость функции ec_bhf_remove() драйвера drivers/net/ethernet/ec_bhf.c поддержки сетевых адаптеров Ethernet ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2025-07317
Уязвимость функции smsc75xx_bind() драйвера drivers/net/usb/smsc75xx.c поддержки сетевых адаптеров USB ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-06-25
BDU:2025-07331
Уязвимость функции strset_reply_size() модуля net/ethtool/strset.c реализации сетевых функций ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2025-07333
Уязвимость функции qrtr_endpoint_post() модуля net/qrtr/qrtr.c поддержки маршрутизатора Qualcomm IPC ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2025-07334
Уязвимость функции cake_get_tcphdr() модуля net/sched/sch_cake.c подсистемы управления трафиком net/sched ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2025-07335
Уязвимость функции synproxy_parse_options() модуля net/netfilter/nf_synproxy_core.c компонента netfilter ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2025-07341
Уязвимость функции mlx5e_rep_neigh_update() модуля drivers/net/ethernet/mellanox/mlx5/core/en/rep/neigh.c - драйвера поддержки сетевых адаптеров Ethernet Mellanox ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2025-07344
Уязвимость функции emulator_get_hflags() модуля arch/x86/kvm/x86.c подсистемы виртуализации на платформе x86 ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на целостность и доступность защищаемой информации
BDU:2025-07348
Уязвимость функции temac_start_xmit() модуля drivers/net/ethernet/xilinx/ll_temac_main.c - драйвера поддержки сетевых адаптеров Ethernet ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2025-07349
Уязвимость функции __ioremap_check_other() модуля arch/x86/mm/ioremap.c на платформе x86 ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2025-07350
Уязвимость функции mptcp_get_options() модуля net/mptcp/options.c реализации сетевых функций ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2025-07369
Уязвимость функции br_vlan_tunnel_lookup() модуля net/bridge/br_vlan_tunnel.c реализации сетевых функций ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2025-07371
Уязвимость функции mcba_usb_start() модуля drivers/net/can/usb/mcba_usb.c - драйвера поддержки сетевых устройств CAN ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2025-07372
Уязвимость функции rt4801_enable() модуля drivers/regulator/rt4801-regulator.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2025-07373
Уязвимость функции mkiss_close() модуля drivers/net/hamradio/mkiss.c - драйвера поддержки сетевых адаптеров ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность и доступность защищаемой информации
Modified: 2025-06-25
BDU:2025-07374
Уязвимость функции ip_mc_destroy_dev() модуля net/ipv4/igmp.c реализации протокола IPv4 ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2025-07375
Уязвимость функции rds_recvmsg() модуля net/rds/recv.c реализации сетевых функций ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность и доступность защищаемой информации
BDU:2025-07376
Уязвимость функции cipso_v4_doi_free() модуля net/ipv4/cipso_ipv4.c реализации протокола IPv4 ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность и доступность защищаемой информации
BDU:2025-13715
Уязвимость функции calculate_sizes() модуля mm/slub.c подсистемы управления памятью ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании.
BDU:2025-13716
Уязвимость функции br_handle_egress_vlan_tunnel() модуля net/bridge/br_vlan_tunnel.c реализации сетевых функций ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании.
BDU:2025-13717
Уязвимость функции __fpu__restore_sig() модуля arch/x86/kernel/fpu/signal.c на платформе x86 ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании.
BDU:2025-13718
Уязвимость функции mtk_phy_init() модуля drivers/phy/mediatek/phy-mtk-tphy.c - драйвера поддержки PHY ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность и доступность защищаемой информации.
BDU:2025-13719
Уязвимость функции advk_pcie_wait_pio() модуля drivers/pci/host/pci-aardvark.c - драйвера поддержки утройств PCI ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании.
BDU:2025-13720
Уязвимость функции udp_destroy_sock() модуля net/ipv4/udp.c реализации протокола IPv4 ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации.
BDU:2025-13721
Уязвимость функции mlx5e_tc_hairpin_update_dead_peer() модуля drivers/net/ethernet/mellanox/mlx5/core/en_tc.c - драйвера поддержки сетевых адаптеров Ethernet Mellanox ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании.
BDU:2025-13722
Уязвимость функции ieee80211_scan_rx() модуля net/mac80211/scan.c реализации стека mac80211 ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании.
BDU:2025-13723
Уязвимость функции eem_tx_fixup() модуля drivers/net/usb/cdc_eem.c - драйвера поддержки сетевых адаптеров USB ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность и доступность защищаемой информации.
BDU:2025-13745
Уязвимость функции kvm_lapic_reg_read() модуля arch/x86/kvm/lapic.c ядра операционной системы Linux, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2025-14612
Уязвимость функции memory_failure() модуля mm/memory-failure.c подсистемы управления памятью ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2025-14614
Уязвимость функции batadv_iv_ogm_emit() модуля net/batman-adv/bat_iv_ogm.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-11-11
CVE-2021-33624
In kernel/bpf/verifier.c in the Linux kernel before 5.12.13, a branch can be mispredicted (e.g., because of type confusion) and consequently an unprivileged BPF program can read arbitrary memory locations via a side-channel attack, aka CID-9183671af6db.
- http://www.openwall.com/lists/oss-security/2021/06/21/1
- https://github.com/benschlueter/CVE-2021-33624
- https://github.com/torvalds/linux/commit/9183671af6dbf60a1219371d4ed73e23f43b49db
- https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html
- https://www.usenix.org/conference/usenixsecurity21/presentation/kirzner
- http://www.openwall.com/lists/oss-security/2021/06/21/1
- https://github.com/torvalds/linux/commit/9183671af6dbf60a1219371d4ed73e23f43b49db
- https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html
- https://www.usenix.org/conference/usenixsecurity21/presentation/kirzner
Modified: 2024-11-21
CVE-2021-35039
kernel/module.c in the Linux kernel before 5.12.14 mishandles Signature Verification, aka CID-0c18f29aae7c. Without CONFIG_MODULE_SIG, verification that a kernel module is signed, for loading via init_module, does not occur for a module.sig_enforce=1 command-line argument.
- http://www.openwall.com/lists/oss-security/2021/07/06/3
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.12.14
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0c18f29aae7ce3dadd26d8ee3505d07cc982df75
- https://github.com/torvalds/linux/commit/0c18f29aae7ce3dadd26d8ee3505d07cc982df75
- https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html
- https://security.netapp.com/advisory/ntap-20210813-0004/
- https://www.openwall.com/lists/oss-security/2021/07/06/3
- http://www.openwall.com/lists/oss-security/2021/07/06/3
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.12.14
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0c18f29aae7ce3dadd26d8ee3505d07cc982df75
- https://github.com/torvalds/linux/commit/0c18f29aae7ce3dadd26d8ee3505d07cc982df75
- https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html
- https://security.netapp.com/advisory/ntap-20210813-0004/
- https://www.openwall.com/lists/oss-security/2021/07/06/3
Modified: 2024-11-21
CVE-2021-38200
arch/powerpc/perf/core-book3s.c in the Linux kernel before 5.12.13, on systems with perf_event_paranoid=-1 and no specific PMU driver support registered, allows local users to cause a denial of service (perf_instruction_pointer NULL pointer dereference and OOPS) via a "perf record" command.
Modified: 2024-11-21
CVE-2021-38206
The mac80211 subsystem in the Linux kernel before 5.12.13, when a device supporting only 5 GHz is used, allows attackers to cause a denial of service (NULL pointer dereference in the radiotap parser) by injecting a frame with 802.11a rates.
Modified: 2024-11-21
CVE-2021-38207
drivers/net/ethernet/xilinx/ll_temac_main.c in the Linux kernel before 5.12.13 allows remote attackers to cause a denial of service (buffer overflow and lockup) by sending heavy network traffic for about ten minutes.
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.12.13
- https://github.com/torvalds/linux/commit/c364df2489b8ef2f5e3159b1dff1ff1fdb16040d
- https://security.netapp.com/advisory/ntap-20210902-0007/
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.12.13
- https://github.com/torvalds/linux/commit/c364df2489b8ef2f5e3159b1dff1ff1fdb16040d
- https://security.netapp.com/advisory/ntap-20210902-0007/
Modified: 2024-11-21
CVE-2021-46283
nf_tables_newset in net/netfilter/nf_tables_api.c in the Linux kernel before 5.12.13 allows local users to cause a denial of service (NULL pointer dereference and general protection fault) because of the missing initialization for nft_set_elem_expr_alloc. A local user can set a netfilter table expression in their own namespace.
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.12.13
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ad9f151e560b016b6ad3280b48e42fa11e1a5440
- https://syzkaller.appspot.com/bug?id=22c3987f75a7b90e238a26b5a5920525c2d1f345
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.12.13
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ad9f151e560b016b6ad3280b48e42fa11e1a5440
- https://syzkaller.appspot.com/bug?id=22c3987f75a7b90e238a26b5a5920525c2d1f345
Modified: 2025-04-29
CVE-2021-47221
In the Linux kernel, the following vulnerability has been resolved: mm/slub: actually fix freelist pointer vs redzoning It turns out that SLUB redzoning ("slub_debug=Z") checks from s->object_size rather than from s->inuse (which is normally bumped to make room for the freelist pointer), so a cache created with an object size less than 24 would have the freelist pointer written beyond s->object_size, causing the redzone to be corrupted by the freelist pointer. This was very visible with "slub_debug=ZF": BUG test (Tainted: G B ): Right Redzone overwritten ----------------------------------------------------------------------------- INFO: 0xffff957ead1c05de-0xffff957ead1c05df @offset=1502. First byte 0x1a instead of 0xbb INFO: Slab 0xffffef3950b47000 objects=170 used=170 fp=0x0000000000000000 flags=0x8000000000000200 INFO: Object 0xffff957ead1c05d8 @offset=1496 fp=0xffff957ead1c0620 Redzone (____ptrval____): bb bb bb bb bb bb bb bb ........ Object (____ptrval____): 00 00 00 00 00 f6 f4 a5 ........ Redzone (____ptrval____): 40 1d e8 1a aa @.... Padding (____ptrval____): 00 00 00 00 00 00 00 00 ........ Adjust the offset to stay within s->object_size. (Note that no caches of in this size range are known to exist in the kernel currently.)
- https://git.kernel.org/stable/c/ce6e8bee7a3883e8008b30f5887dbb426aac6a35
- https://git.kernel.org/stable/c/e41a49fadbc80b60b48d3c095d9e2ee7ef7c9a8e
- https://git.kernel.org/stable/c/f6ed2357541612a13a5841b3af4dc32ed984a25f
- https://git.kernel.org/stable/c/ce6e8bee7a3883e8008b30f5887dbb426aac6a35
- https://git.kernel.org/stable/c/e41a49fadbc80b60b48d3c095d9e2ee7ef7c9a8e
- https://git.kernel.org/stable/c/f6ed2357541612a13a5841b3af4dc32ed984a25f
Modified: 2025-04-29
CVE-2021-47222
In the Linux kernel, the following vulnerability has been resolved: net: bridge: fix vlan tunnel dst refcnt when egressing The egress tunnel code uses dst_clone() and directly sets the result which is wrong because the entry might have 0 refcnt or be already deleted, causing number of problems. It also triggers the WARN_ON() in dst_hold()[1] when a refcnt couldn't be taken. Fix it by using dst_hold_safe() and checking if a reference was actually taken before setting the dst. [1] dmesg WARN_ON log and following refcnt errors WARNING: CPU: 5 PID: 38 at include/net/dst.h:230 br_handle_egress_vlan_tunnel+0x10b/0x134 [bridge] Modules linked in: 8021q garp mrp bridge stp llc bonding ipv6 virtio_net CPU: 5 PID: 38 Comm: ksoftirqd/5 Kdump: loaded Tainted: G W 5.13.0-rc3+ #360 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.14.0-1.fc33 04/01/2014 RIP: 0010:br_handle_egress_vlan_tunnel+0x10b/0x134 [bridge] Code: e8 85 bc 01 e1 45 84 f6 74 90 45 31 f6 85 db 48 c7 c7 a0 02 19 a0 41 0f 94 c6 31 c9 31 d2 44 89 f6 e8 64 bc 01 e1 85 db 75 02 <0f> 0b 31 c9 31 d2 44 89 f6 48 c7 c7 70 02 19 a0 e8 4b bc 01 e1 49 RSP: 0018:ffff8881003d39e8 EFLAGS: 00010246 RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000 RDX: 0000000000000000 RSI: 0000000000000001 RDI: ffffffffa01902a0 RBP: ffff8881040c6700 R08: 0000000000000000 R09: 0000000000000001 R10: 2ce93d0054fe0d00 R11: 54fe0d00000e0000 R12: ffff888109515000 R13: 0000000000000000 R14: 0000000000000001 R15: 0000000000000401 FS: 0000000000000000(0000) GS:ffff88822bf40000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f42ba70f030 CR3: 0000000109926000 CR4: 00000000000006e0 Call Trace: br_handle_vlan+0xbc/0xca [bridge] __br_forward+0x23/0x164 [bridge] deliver_clone+0x41/0x48 [bridge] br_handle_frame_finish+0x36f/0x3aa [bridge] ? skb_dst+0x2e/0x38 [bridge] ? br_handle_ingress_vlan_tunnel+0x3e/0x1c8 [bridge] ? br_handle_frame_finish+0x3aa/0x3aa [bridge] br_handle_frame+0x2c3/0x377 [bridge] ? __skb_pull+0x33/0x51 ? vlan_do_receive+0x4f/0x36a ? br_handle_frame_finish+0x3aa/0x3aa [bridge] __netif_receive_skb_core+0x539/0x7c6 ? __list_del_entry_valid+0x16e/0x1c2 __netif_receive_skb_list_core+0x6d/0xd6 netif_receive_skb_list_internal+0x1d9/0x1fa gro_normal_list+0x22/0x3e dev_gro_receive+0x55b/0x600 ? detach_buf_split+0x58/0x140 napi_gro_receive+0x94/0x12e virtnet_poll+0x15d/0x315 [virtio_net] __napi_poll+0x2c/0x1c9 net_rx_action+0xe6/0x1fb __do_softirq+0x115/0x2d8 run_ksoftirqd+0x18/0x20 smpboot_thread_fn+0x183/0x19c ? smpboot_unregister_percpu_thread+0x66/0x66 kthread+0x10a/0x10f ? kthread_mod_delayed_work+0xb6/0xb6 ret_from_fork+0x22/0x30 ---[ end trace 49f61b07f775fd2b ]--- dst_release: dst:00000000c02d677a refcnt:-1 dst_release underflow
- https://git.kernel.org/stable/c/25053a8404ba17ca48f5553d487afc1882e9f56c
- https://git.kernel.org/stable/c/42020f7f37a90d24b9551f5f7eba3f7c7c102968
- https://git.kernel.org/stable/c/79855be6445b6592bddb7bd7167083ec8cdbd73f
- https://git.kernel.org/stable/c/84fc1c944e45ab317e2e70a0e7f76fa2a5e43b6e
- https://git.kernel.org/stable/c/cfc579f9d89af4ada58c69b03bcaa4887840f3b3
- https://git.kernel.org/stable/c/fc7fdd8c5c2ad2fe3e297698be9d4dbe4a4e0579
- https://git.kernel.org/stable/c/25053a8404ba17ca48f5553d487afc1882e9f56c
- https://git.kernel.org/stable/c/42020f7f37a90d24b9551f5f7eba3f7c7c102968
- https://git.kernel.org/stable/c/79855be6445b6592bddb7bd7167083ec8cdbd73f
- https://git.kernel.org/stable/c/84fc1c944e45ab317e2e70a0e7f76fa2a5e43b6e
- https://git.kernel.org/stable/c/cfc579f9d89af4ada58c69b03bcaa4887840f3b3
- https://git.kernel.org/stable/c/fc7fdd8c5c2ad2fe3e297698be9d4dbe4a4e0579
Modified: 2025-02-03
CVE-2021-47223
In the Linux kernel, the following vulnerability has been resolved: net: bridge: fix vlan tunnel dst null pointer dereference This patch fixes a tunnel_dst null pointer dereference due to lockless access in the tunnel egress path. When deleting a vlan tunnel the tunnel_dst pointer is set to NULL without waiting a grace period (i.e. while it's still usable) and packets egressing are dereferencing it without checking. Use READ/WRITE_ONCE to annotate the lockless use of tunnel_id, use RCU for accessing tunnel_dst and make sure it is read only once and checked in the egress path. The dst is already properly RCU protected so we don't need to do anything fancy than to make sure tunnel_id and tunnel_dst are read only once and checked in the egress path.
- https://git.kernel.org/stable/c/24a6e55f17aa123bc1fc54b7d3c410b41bc16530
- https://git.kernel.org/stable/c/58e2071742e38f29f051b709a5cca014ba51166f
- https://git.kernel.org/stable/c/a2241e62f6b4a774d8a92048fdf59c45f6c2fe5c
- https://git.kernel.org/stable/c/abb02e05cb1c0a30dd873a29f33bc092067dc35d
- https://git.kernel.org/stable/c/ad7feefe7164892db424c45687472db803d87f79
- https://git.kernel.org/stable/c/fe0448a3fad365a747283a00a1d1ad5e8d6675b7
- https://git.kernel.org/stable/c/24a6e55f17aa123bc1fc54b7d3c410b41bc16530
- https://git.kernel.org/stable/c/58e2071742e38f29f051b709a5cca014ba51166f
- https://git.kernel.org/stable/c/a2241e62f6b4a774d8a92048fdf59c45f6c2fe5c
- https://git.kernel.org/stable/c/abb02e05cb1c0a30dd873a29f33bc092067dc35d
- https://git.kernel.org/stable/c/ad7feefe7164892db424c45687472db803d87f79
- https://git.kernel.org/stable/c/fe0448a3fad365a747283a00a1d1ad5e8d6675b7
Modified: 2025-04-04
CVE-2021-47224
In the Linux kernel, the following vulnerability has been resolved: net: ll_temac: Make sure to free skb when it is completely used With the skb pointer piggy-backed on the TX BD, we have a simple and efficient way to free the skb buffer when the frame has been transmitted. But in order to avoid freeing the skb while there are still fragments from the skb in use, we need to piggy-back on the TX BD of the skb, not the first. Without this, we are doing use-after-free on the DMA side, when the first BD of a multi TX BD packet is seen as completed in xmit_done, and the remaining BDs are still being processed.
- https://git.kernel.org/stable/c/019ab7d044d0ebf97e1236bb8935b7809be92358
- https://git.kernel.org/stable/c/6aa32217a9a446275440ee8724b1ecaf1838df47
- https://git.kernel.org/stable/c/6d120ab4dc39a543c6b63361e1d0541c382900a3
- https://git.kernel.org/stable/c/e8afe05bd359ebe12a61dbdc94c06c00ea3e8d4b
- https://git.kernel.org/stable/c/019ab7d044d0ebf97e1236bb8935b7809be92358
- https://git.kernel.org/stable/c/6aa32217a9a446275440ee8724b1ecaf1838df47
- https://git.kernel.org/stable/c/6d120ab4dc39a543c6b63361e1d0541c382900a3
- https://git.kernel.org/stable/c/e8afe05bd359ebe12a61dbdc94c06c00ea3e8d4b
Modified: 2025-04-04
CVE-2021-47225
In the Linux kernel, the following vulnerability has been resolved: mac80211: fix deadlock in AP/VLAN handling Syzbot reports that when you have AP_VLAN interfaces that are up and close the AP interface they belong to, we get a deadlock. No surprise - since we dev_close() them with the wiphy mutex held, which goes back into the netdev notifier in cfg80211 and tries to acquire the wiphy mutex there. To fix this, we need to do two things: 1) prevent changing iftype while AP_VLANs are up, we can't easily fix this case since cfg80211 already calls us with the wiphy mutex held, but change_interface() is relatively rare in drivers anyway, so changing iftype isn't used much (and userspace has to fall back to down/change/up anyway) 2) pull the dev_close() loop over VLANs out of the wiphy mutex section in the normal stop case
Modified: 2025-04-29
CVE-2021-47226
In the Linux kernel, the following vulnerability has been resolved: x86/fpu: Invalidate FPU state after a failed XRSTOR from a user buffer Both Intel and AMD consider it to be architecturally valid for XRSTOR to fail with #PF but nonetheless change the register state. The actual conditions under which this might occur are unclear [1], but it seems plausible that this might be triggered if one sibling thread unmaps a page and invalidates the shared TLB while another sibling thread is executing XRSTOR on the page in question. __fpu__restore_sig() can execute XRSTOR while the hardware registers are preserved on behalf of a different victim task (using the fpu_fpregs_owner_ctx mechanism), and, in theory, XRSTOR could fail but modify the registers. If this happens, then there is a window in which __fpu__restore_sig() could schedule out and the victim task could schedule back in without reloading its own FPU registers. This would result in part of the FPU state that __fpu__restore_sig() was attempting to load leaking into the victim task's user-visible state. Invalidate preserved FPU registers on XRSTOR failure to prevent this situation from corrupting any state. [1] Frequent readers of the errata lists might imagine "complex microarchitectural conditions".
- https://git.kernel.org/stable/c/002665dcba4bbec8c82f0aeb4bd3f44334ed2c14
- https://git.kernel.org/stable/c/a7748e021b9fb7739e3cb88449296539de0b6817
- https://git.kernel.org/stable/c/d8778e393afa421f1f117471144f8ce6deb6953a
- https://git.kernel.org/stable/c/002665dcba4bbec8c82f0aeb4bd3f44334ed2c14
- https://git.kernel.org/stable/c/a7748e021b9fb7739e3cb88449296539de0b6817
- https://git.kernel.org/stable/c/d8778e393afa421f1f117471144f8ce6deb6953a
Modified: 2025-04-29
CVE-2021-47227
In the Linux kernel, the following vulnerability has been resolved: x86/fpu: Prevent state corruption in __fpu__restore_sig() The non-compacted slowpath uses __copy_from_user() and copies the entire user buffer into the kernel buffer, verbatim. This means that the kernel buffer may now contain entirely invalid state on which XRSTOR will #GP. validate_user_xstate_header() can detect some of that corruption, but that leaves the onus on callers to clear the buffer. Prior to XSAVES support, it was possible just to reinitialize the buffer, completely, but with supervisor states that is not longer possible as the buffer clearing code split got it backwards. Fixing that is possible but not corrupting the state in the first place is more robust. Avoid corruption of the kernel XSAVE buffer by using copy_user_to_xstate() which validates the XSAVE header contents before copying the actual states to the kernel. copy_user_to_xstate() was previously only called for compacted-format kernel buffers, but it works for both compacted and non-compacted forms. Using it for the non-compacted form is slower because of multiple __copy_from_user() operations, but that cost is less important than robust code in an already slow path. [ Changelog polished by Dave Hansen ]
- https://git.kernel.org/stable/c/076f732b16a5bf842686e1b43ab6021a2d98233e
- https://git.kernel.org/stable/c/484cea4f362e1eeb5c869abbfb5f90eae6421b38
- https://git.kernel.org/stable/c/ec25ea1f3f05d6f8ee51d1277efea986eafd4f2a
- https://git.kernel.org/stable/c/076f732b16a5bf842686e1b43ab6021a2d98233e
- https://git.kernel.org/stable/c/484cea4f362e1eeb5c869abbfb5f90eae6421b38
- https://git.kernel.org/stable/c/ec25ea1f3f05d6f8ee51d1277efea986eafd4f2a
Modified: 2025-04-29
CVE-2021-47228
In the Linux kernel, the following vulnerability has been resolved: x86/ioremap: Map EFI-reserved memory as encrypted for SEV Some drivers require memory that is marked as EFI boot services data. In order for this memory to not be re-used by the kernel after ExitBootServices(), efi_mem_reserve() is used to preserve it by inserting a new EFI memory descriptor and marking it with the EFI_MEMORY_RUNTIME attribute. Under SEV, memory marked with the EFI_MEMORY_RUNTIME attribute needs to be mapped encrypted by Linux, otherwise the kernel might crash at boot like below: EFI Variables Facility v0.08 2004-May-17 general protection fault, probably for non-canonical address 0x3597688770a868b2: 0000 [#1] SMP NOPTI CPU: 13 PID: 1 Comm: swapper/0 Not tainted 5.12.4-2-default #1 openSUSE Tumbleweed Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 0.0.0 02/06/2015 RIP: 0010:efi_mokvar_entry_next [...] Call Trace: efi_mokvar_sysfs_init ? efi_mokvar_table_init do_one_initcall ? __kmalloc kernel_init_freeable ? rest_init kernel_init ret_from_fork Expand the __ioremap_check_other() function to additionally check for this other type of boot data reserved at runtime and indicate that it should be mapped encrypted for an SEV guest. [ bp: Massage commit message. ]
- https://git.kernel.org/stable/c/208bb686e7fa7fff16e8fa78ff0db34aa9acdbd7
- https://git.kernel.org/stable/c/8d651ee9c71bb12fc0c8eb2786b66cbe5aa3e43b
- https://git.kernel.org/stable/c/b7a05aba39f733ec337c5b952e112dd2dc4fc404
- https://git.kernel.org/stable/c/208bb686e7fa7fff16e8fa78ff0db34aa9acdbd7
- https://git.kernel.org/stable/c/8d651ee9c71bb12fc0c8eb2786b66cbe5aa3e43b
- https://git.kernel.org/stable/c/b7a05aba39f733ec337c5b952e112dd2dc4fc404
Modified: 2025-04-29
CVE-2021-47229
In the Linux kernel, the following vulnerability has been resolved: PCI: aardvark: Fix kernel panic during PIO transfer Trying to start a new PIO transfer by writing value 0 in PIO_START register when previous transfer has not yet completed (which is indicated by value 1 in PIO_START) causes an External Abort on CPU, which results in kernel panic: SError Interrupt on CPU0, code 0xbf000002 -- SError Kernel panic - not syncing: Asynchronous SError Interrupt To prevent kernel panic, it is required to reject a new PIO transfer when previous one has not finished yet. If previous PIO transfer is not finished yet, the kernel may issue a new PIO request only if the previous PIO transfer timed out. In the past the root cause of this issue was incorrectly identified (as it often happens during link retraining or after link down event) and special hack was implemented in Trusted Firmware to catch all SError events in EL3, to ignore errors with code 0xbf000002 and not forwarding any other errors to kernel and instead throw panic from EL3 Trusted Firmware handler. Links to discussion and patches about this issue: https://git.trustedfirmware.org/TF-A/trusted-firmware-a.git/commit/?id=3c7dcdac5c50 https://lore.kernel.org/linux-pci/20190316161243.29517-1-repk@triplefau.lt/ https://lore.kernel.org/linux-pci/971be151d24312cc533989a64bd454b4@www.loen.fr/ https://review.trustedfirmware.org/c/TF-A/trusted-firmware-a/+/1541 But the real cause was the fact that during link retraining or after link down event the PIO transfer may take longer time, up to the 1.44s until it times out. This increased probability that a new PIO transfer would be issued by kernel while previous one has not finished yet. After applying this change into the kernel, it is possible to revert the mentioned TF-A hack and SError events do not have to be caught in TF-A EL3.
- https://git.kernel.org/stable/c/1a1dbc4473974867fe8c5f195c17b341c8e82867
- https://git.kernel.org/stable/c/3d213a4ddf49a860be6e795482c17f87e0c82b2a
- https://git.kernel.org/stable/c/400e6b1860c8be61388d0b77814c53260f96e17a
- https://git.kernel.org/stable/c/4c90f90a91d75c3c73dd633827c90e8746d9f54d
- https://git.kernel.org/stable/c/b00a9aaa4be20ad6e3311fb78a485eae0899e89a
- https://git.kernel.org/stable/c/f18139966d072dab8e4398c95ce955a9742e04f7
- https://git.kernel.org/stable/c/1a1dbc4473974867fe8c5f195c17b341c8e82867
- https://git.kernel.org/stable/c/3d213a4ddf49a860be6e795482c17f87e0c82b2a
- https://git.kernel.org/stable/c/400e6b1860c8be61388d0b77814c53260f96e17a
- https://git.kernel.org/stable/c/4c90f90a91d75c3c73dd633827c90e8746d9f54d
- https://git.kernel.org/stable/c/b00a9aaa4be20ad6e3311fb78a485eae0899e89a
- https://git.kernel.org/stable/c/f18139966d072dab8e4398c95ce955a9742e04f7
Modified: 2025-04-04
CVE-2021-47230
In the Linux kernel, the following vulnerability has been resolved: KVM: x86: Immediately reset the MMU context when the SMM flag is cleared Immediately reset the MMU context when the vCPU's SMM flag is cleared so that the SMM flag in the MMU role is always synchronized with the vCPU's flag. If RSM fails (which isn't correctly emulated), KVM will bail without calling post_leave_smm() and leave the MMU in a bad state. The bad MMU role can lead to a NULL pointer dereference when grabbing a shadow page's rmap for a page fault as the initial lookups for the gfn will happen with the vCPU's SMM flag (=0), whereas the rmap lookup will use the shadow page's SMM flag, which comes from the MMU (=1). SMM has an entirely different set of memslots, and so the initial lookup can find a memslot (SMM=0) and then explode on the rmap memslot lookup (SMM=1). general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007] CPU: 1 PID: 8410 Comm: syz-executor382 Not tainted 5.13.0-rc5-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:__gfn_to_rmap arch/x86/kvm/mmu/mmu.c:935 [inline] RIP: 0010:gfn_to_rmap+0x2b0/0x4d0 arch/x86/kvm/mmu/mmu.c:947 Code: <42> 80 3c 20 00 74 08 4c 89 ff e8 f1 79 a9 00 4c 89 fb 4d 8b 37 44 RSP: 0018:ffffc90000ffef98 EFLAGS: 00010246 RAX: 0000000000000000 RBX: ffff888015b9f414 RCX: ffff888019669c40 RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000001 RBP: 0000000000000001 R08: ffffffff811d9cdb R09: ffffed10065a6002 R10: ffffed10065a6002 R11: 0000000000000000 R12: dffffc0000000000 R13: 0000000000000003 R14: 0000000000000001 R15: 0000000000000000 FS: 000000000124b300(0000) GS:ffff8880b9b00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000000000 CR3: 0000000028e31000 CR4: 00000000001526e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: rmap_add arch/x86/kvm/mmu/mmu.c:965 [inline] mmu_set_spte+0x862/0xe60 arch/x86/kvm/mmu/mmu.c:2604 __direct_map arch/x86/kvm/mmu/mmu.c:2862 [inline] direct_page_fault+0x1f74/0x2b70 arch/x86/kvm/mmu/mmu.c:3769 kvm_mmu_do_page_fault arch/x86/kvm/mmu.h:124 [inline] kvm_mmu_page_fault+0x199/0x1440 arch/x86/kvm/mmu/mmu.c:5065 vmx_handle_exit+0x26/0x160 arch/x86/kvm/vmx/vmx.c:6122 vcpu_enter_guest+0x3bdd/0x9630 arch/x86/kvm/x86.c:9428 vcpu_run+0x416/0xc20 arch/x86/kvm/x86.c:9494 kvm_arch_vcpu_ioctl_run+0x4e8/0xa40 arch/x86/kvm/x86.c:9722 kvm_vcpu_ioctl+0x70f/0xbb0 arch/x86/kvm/../../../virt/kvm/kvm_main.c:3460 vfs_ioctl fs/ioctl.c:51 [inline] __do_sys_ioctl fs/ioctl.c:1069 [inline] __se_sys_ioctl+0xfb/0x170 fs/ioctl.c:1055 do_syscall_64+0x3f/0xb0 arch/x86/entry/common.c:47 entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x440ce9
- https://git.kernel.org/stable/c/669a8866e468fd020d34eb00e08cb41d3774b71b
- https://git.kernel.org/stable/c/78fcb2c91adfec8ce3a2ba6b4d0dda89f2f4a7c6
- https://git.kernel.org/stable/c/cbb425f62df9df7abee4b3f068f7ed6ffc3561e2
- https://git.kernel.org/stable/c/df9a40cfb3be2cbeb1c17bb67c59251ba16630f3
- https://git.kernel.org/stable/c/669a8866e468fd020d34eb00e08cb41d3774b71b
- https://git.kernel.org/stable/c/78fcb2c91adfec8ce3a2ba6b4d0dda89f2f4a7c6
- https://git.kernel.org/stable/c/cbb425f62df9df7abee4b3f068f7ed6ffc3561e2
- https://git.kernel.org/stable/c/df9a40cfb3be2cbeb1c17bb67c59251ba16630f3
Modified: 2025-04-04
CVE-2021-47231
In the Linux kernel, the following vulnerability has been resolved: can: mcba_usb: fix memory leak in mcba_usb Syzbot reported memory leak in SocketCAN driver for Microchip CAN BUS Analyzer Tool. The problem was in unfreed usb_coherent. In mcba_usb_start() 20 coherent buffers are allocated and there is nothing, that frees them: 1) In callback function the urb is resubmitted and that's all 2) In disconnect function urbs are simply killed, but URB_FREE_BUFFER is not set (see mcba_usb_start) and this flag cannot be used with coherent buffers. Fail log: | [ 1354.053291][ T8413] mcba_usb 1-1:0.0 can0: device disconnected | [ 1367.059384][ T8420] kmemleak: 20 new suspected memory leaks (see /sys/kernel/debug/kmem) So, all allocated buffers should be freed with usb_free_coherent() explicitly NOTE: The same pattern for allocating and freeing coherent buffers is used in drivers/net/can/usb/kvaser_usb/kvaser_usb_core.c
- https://git.kernel.org/stable/c/6bd3d80d1f019cefa7011056c54b323f1d8b8e83
- https://git.kernel.org/stable/c/6f87c0e21ad20dd3d22108e33db1c552dfa352a0
- https://git.kernel.org/stable/c/89df95ce32be204eef2e7d4b2f6fb552fb191a68
- https://git.kernel.org/stable/c/91c02557174be7f72e46ed7311e3bea1939840b0
- https://git.kernel.org/stable/c/a115198caaab6d663bef75823a3c5f0802306d60
- https://git.kernel.org/stable/c/d0760a4ef85697bc756d06eae17ae27f3f055401
- https://git.kernel.org/stable/c/6bd3d80d1f019cefa7011056c54b323f1d8b8e83
- https://git.kernel.org/stable/c/6f87c0e21ad20dd3d22108e33db1c552dfa352a0
- https://git.kernel.org/stable/c/89df95ce32be204eef2e7d4b2f6fb552fb191a68
- https://git.kernel.org/stable/c/91c02557174be7f72e46ed7311e3bea1939840b0
- https://git.kernel.org/stable/c/a115198caaab6d663bef75823a3c5f0802306d60
- https://git.kernel.org/stable/c/d0760a4ef85697bc756d06eae17ae27f3f055401
Modified: 2025-04-04
CVE-2021-47232
In the Linux kernel, the following vulnerability has been resolved: can: j1939: fix Use-after-Free, hold skb ref while in use This patch fixes a Use-after-Free found by the syzbot. The problem is that a skb is taken from the per-session skb queue, without incrementing the ref count. This leads to a Use-after-Free if the skb is taken concurrently from the session queue due to a CTS.
- https://git.kernel.org/stable/c/1071065eeb33d32b7d98c2ce7591881ae7381705
- https://git.kernel.org/stable/c/2030043e616cab40f510299f09b636285e0a3678
- https://git.kernel.org/stable/c/22cba878abf646cd3a02ee7c8c2cef7afe66a256
- https://git.kernel.org/stable/c/509ab6bfdd0c76daebbad0f0af07da712116de22
- https://git.kernel.org/stable/c/1071065eeb33d32b7d98c2ce7591881ae7381705
- https://git.kernel.org/stable/c/2030043e616cab40f510299f09b636285e0a3678
- https://git.kernel.org/stable/c/22cba878abf646cd3a02ee7c8c2cef7afe66a256
- https://git.kernel.org/stable/c/509ab6bfdd0c76daebbad0f0af07da712116de22
Modified: 2024-12-30
CVE-2021-47233
In the Linux kernel, the following vulnerability has been resolved: regulator: rt4801: Fix NULL pointer dereference if priv->enable_gpios is NULL devm_gpiod_get_array_optional may return NULL if no GPIO was assigned.
- https://git.kernel.org/stable/c/ba8a26a7ce8617f9f3d6230de34b2302df086b41
- https://git.kernel.org/stable/c/cb2381cbecb81a8893b2d1e1af29bc2e5531df27
- https://git.kernel.org/stable/c/dc68f0c9e4a001e02376fe87f4bdcacadb27e8a1
- https://git.kernel.org/stable/c/ba8a26a7ce8617f9f3d6230de34b2302df086b41
- https://git.kernel.org/stable/c/cb2381cbecb81a8893b2d1e1af29bc2e5531df27
- https://git.kernel.org/stable/c/dc68f0c9e4a001e02376fe87f4bdcacadb27e8a1
Modified: 2025-04-29
CVE-2021-47234
In the Linux kernel, the following vulnerability has been resolved: phy: phy-mtk-tphy: Fix some resource leaks in mtk_phy_init() Use clk_disable_unprepare() in the error path of mtk_phy_init() to fix some resource leaks.
- https://git.kernel.org/stable/c/6472955af5e88b5489b6d78316082ad56ea3e489
- https://git.kernel.org/stable/c/9a17907946232d01aa2ec109da5f93b8d31dd425
- https://git.kernel.org/stable/c/aaac9a1bd370338ce372669eb9a6059d16b929aa
- https://git.kernel.org/stable/c/6472955af5e88b5489b6d78316082ad56ea3e489
- https://git.kernel.org/stable/c/9a17907946232d01aa2ec109da5f93b8d31dd425
- https://git.kernel.org/stable/c/aaac9a1bd370338ce372669eb9a6059d16b929aa
Modified: 2024-12-30
CVE-2021-47235
In the Linux kernel, the following vulnerability has been resolved: net: ethernet: fix potential use-after-free in ec_bhf_remove static void ec_bhf_remove(struct pci_dev *dev) { ... struct ec_bhf_priv *priv = netdev_priv(net_dev); unregister_netdev(net_dev); free_netdev(net_dev); pci_iounmap(dev, priv->dma_io); pci_iounmap(dev, priv->io); ... } priv is netdev private data, but it is used after free_netdev(). It can cause use-after-free when accessing priv pointer. So, fix it by moving free_netdev() after pci_iounmap() calls.
- https://git.kernel.org/stable/c/0260916843cc74f3906acf8b6f256693e01530a2
- https://git.kernel.org/stable/c/19f88ca68ccf8771276a606765239b167654f84a
- https://git.kernel.org/stable/c/1cafc540b7bf1b6a5a77dc000205fe337ef6eba6
- https://git.kernel.org/stable/c/95deeb29d831e2fae608439e243e7a520611e7ea
- https://git.kernel.org/stable/c/9cca0c2d70149160407bda9a9446ce0c29b6e6c6
- https://git.kernel.org/stable/c/b1ad283755095a4b9d1431aeb357d7df1a33d3bb
- https://git.kernel.org/stable/c/d11d79e52ba080ee567cb7d7eb42a5ade60a8130
- https://git.kernel.org/stable/c/db2bc3cfd2bc01621014d4f17cdfc74611f339c8
- https://git.kernel.org/stable/c/0260916843cc74f3906acf8b6f256693e01530a2
- https://git.kernel.org/stable/c/19f88ca68ccf8771276a606765239b167654f84a
- https://git.kernel.org/stable/c/1cafc540b7bf1b6a5a77dc000205fe337ef6eba6
- https://git.kernel.org/stable/c/95deeb29d831e2fae608439e243e7a520611e7ea
- https://git.kernel.org/stable/c/9cca0c2d70149160407bda9a9446ce0c29b6e6c6
- https://git.kernel.org/stable/c/b1ad283755095a4b9d1431aeb357d7df1a33d3bb
- https://git.kernel.org/stable/c/d11d79e52ba080ee567cb7d7eb42a5ade60a8130
- https://git.kernel.org/stable/c/db2bc3cfd2bc01621014d4f17cdfc74611f339c8
Modified: 2025-04-29
CVE-2021-47236
In the Linux kernel, the following vulnerability has been resolved: net: cdc_eem: fix tx fixup skb leak when usbnet transmit a skb, eem fixup it in eem_tx_fixup(), if skb_copy_expand() failed, it return NULL, usbnet_start_xmit() will have no chance to free original skb. fix it by free orginal skb in eem_tx_fixup() first, then check skb clone status, if failed, return NULL to usbnet.
- https://git.kernel.org/stable/c/05b2b9f7d24b5663d9b47427fe1555bdafd3ea02
- https://git.kernel.org/stable/c/14184ec5c958b589ba934da7363a2877879204df
- https://git.kernel.org/stable/c/1bcacd6088d61c0ac6a990d87975600a81f3247e
- https://git.kernel.org/stable/c/81de2ed06df8b5451e050fe6a318af3263dbff3f
- https://git.kernel.org/stable/c/b4f7a9fc9d094c0c4a66f2ad7c37b1dbe9e78f88
- https://git.kernel.org/stable/c/c3b26fdf1b32f91c7a3bc743384b4a298ab53ad7
- https://git.kernel.org/stable/c/f12554b0ff639e74612cc01b3b4a049e098d2d65
- https://git.kernel.org/stable/c/f4e6a7f19c82f39b1803e91c54718f0d7143767d
- https://git.kernel.org/stable/c/05b2b9f7d24b5663d9b47427fe1555bdafd3ea02
- https://git.kernel.org/stable/c/14184ec5c958b589ba934da7363a2877879204df
- https://git.kernel.org/stable/c/1bcacd6088d61c0ac6a990d87975600a81f3247e
- https://git.kernel.org/stable/c/81de2ed06df8b5451e050fe6a318af3263dbff3f
- https://git.kernel.org/stable/c/b4f7a9fc9d094c0c4a66f2ad7c37b1dbe9e78f88
- https://git.kernel.org/stable/c/c3b26fdf1b32f91c7a3bc743384b4a298ab53ad7
- https://git.kernel.org/stable/c/f12554b0ff639e74612cc01b3b4a049e098d2d65
- https://git.kernel.org/stable/c/f4e6a7f19c82f39b1803e91c54718f0d7143767d
Modified: 2024-12-30
CVE-2021-47237
In the Linux kernel, the following vulnerability has been resolved:
net: hamradio: fix memory leak in mkiss_close
My local syzbot instance hit memory leak in
mkiss_open()[1]. The problem was in missing
free_netdev() in mkiss_close().
In mkiss_open() netdevice is allocated and then
registered, but in mkiss_close() netdevice was
only unregistered, but not freed.
Fail log:
BUG: memory leak
unreferenced object 0xffff8880281ba000 (size 4096):
comm "syz-executor.1", pid 11443, jiffies 4295046091 (age 17.660s)
hex dump (first 32 bytes):
61 78 30 00 00 00 00 00 00 00 00 00 00 00 00 00 ax0.............
00 27 fa 2a 80 88 ff ff 00 00 00 00 00 00 00 00 .'.*............
backtrace:
[
- https://git.kernel.org/stable/c/290b0b6432e2599021db0b8d6046f756d931c29f
- https://git.kernel.org/stable/c/3942d0f9ace1a95a74930b5b4fc0e5005c62b37b
- https://git.kernel.org/stable/c/765a8a04f828db7222b36a42b1031f576bfe95c3
- https://git.kernel.org/stable/c/7edcc682301492380fbdd604b4516af5ae667a13
- https://git.kernel.org/stable/c/a49cbb762ef20655f5c91abdc13658b0af5e159d
- https://git.kernel.org/stable/c/c16c4716a1b5ba4f83c7e00da457cba06761f119
- https://git.kernel.org/stable/c/c634ba0b4159838ff45a60d3a0ace3b4118077a5
- https://git.kernel.org/stable/c/f4de2b43d13b7cf3ced9310e371b90c836dbd7cd
- https://git.kernel.org/stable/c/290b0b6432e2599021db0b8d6046f756d931c29f
- https://git.kernel.org/stable/c/3942d0f9ace1a95a74930b5b4fc0e5005c62b37b
- https://git.kernel.org/stable/c/765a8a04f828db7222b36a42b1031f576bfe95c3
- https://git.kernel.org/stable/c/7edcc682301492380fbdd604b4516af5ae667a13
- https://git.kernel.org/stable/c/a49cbb762ef20655f5c91abdc13658b0af5e159d
- https://git.kernel.org/stable/c/c16c4716a1b5ba4f83c7e00da457cba06761f119
- https://git.kernel.org/stable/c/c634ba0b4159838ff45a60d3a0ace3b4118077a5
- https://git.kernel.org/stable/c/f4de2b43d13b7cf3ced9310e371b90c836dbd7cd
Modified: 2025-04-04
CVE-2021-47238
In the Linux kernel, the following vulnerability has been resolved: net: ipv4: fix memory leak in ip_mc_add1_src BUG: memory leak unreferenced object 0xffff888101bc4c00 (size 32): comm "syz-executor527", pid 360, jiffies 4294807421 (age 19.329s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 01 00 00 00 00 00 00 00 ac 14 14 bb 00 00 02 00 ................ backtrace: [<00000000f17c5244>] kmalloc include/linux/slab.h:558 [inline] [<00000000f17c5244>] kzalloc include/linux/slab.h:688 [inline] [<00000000f17c5244>] ip_mc_add1_src net/ipv4/igmp.c:1971 [inline] [<00000000f17c5244>] ip_mc_add_src+0x95f/0xdb0 net/ipv4/igmp.c:2095 [<000000001cb99709>] ip_mc_source+0x84c/0xea0 net/ipv4/igmp.c:2416 [<0000000052cf19ed>] do_ip_setsockopt net/ipv4/ip_sockglue.c:1294 [inline] [<0000000052cf19ed>] ip_setsockopt+0x114b/0x30c0 net/ipv4/ip_sockglue.c:1423 [<00000000477edfbc>] raw_setsockopt+0x13d/0x170 net/ipv4/raw.c:857 [<00000000e75ca9bb>] __sys_setsockopt+0x158/0x270 net/socket.c:2117 [<00000000bdb993a8>] __do_sys_setsockopt net/socket.c:2128 [inline] [<00000000bdb993a8>] __se_sys_setsockopt net/socket.c:2125 [inline] [<00000000bdb993a8>] __x64_sys_setsockopt+0xba/0x150 net/socket.c:2125 [<000000006a1ffdbd>] do_syscall_64+0x40/0x80 arch/x86/entry/common.c:47 [<00000000b11467c4>] entry_SYSCALL_64_after_hwframe+0x44/0xae In commit 24803f38a5c0 ("igmp: do not remove igmp souce list info when set link down"), the ip_mc_clear_src() in ip_mc_destroy_dev() was removed, because it was also called in igmpv3_clear_delrec(). Rough callgraph: inetdev_destroy -> ip_mc_destroy_dev -> igmpv3_clear_delrec -> ip_mc_clear_src -> RCU_INIT_POINTER(dev->ip_ptr, NULL) However, ip_mc_clear_src() called in igmpv3_clear_delrec() doesn't release in_dev->mc_list->sources. And RCU_INIT_POINTER() assigns the NULL to dev->ip_ptr. As a result, in_dev cannot be obtained through inetdev_by_index() and then in_dev->mc_list->sources cannot be released by ip_mc_del1_src() in the sock_close. Rough call sequence goes like: sock_close -> __sock_release -> inet_release -> ip_mc_drop_socket -> inetdev_by_index -> ip_mc_leave_src -> ip_mc_del_src -> ip_mc_del1_src So we still need to call ip_mc_clear_src() in ip_mc_destroy_dev() to free in_dev->mc_list->sources.
- https://git.kernel.org/stable/c/0dc13e75507faa17ac9f7562b4ef7bf8fcd78422
- https://git.kernel.org/stable/c/1e28018b5c83d5073f74a6fb72eabe8370b2f501
- https://git.kernel.org/stable/c/3dd2aeac2e9624cff9fa634710837e4f2e352758
- https://git.kernel.org/stable/c/6cff57eea3347f79f1867cc53e1093b6614138d8
- https://git.kernel.org/stable/c/77de6ee73f54a9a89c0afa0bf4c53b239aa9953a
- https://git.kernel.org/stable/c/ac31cc837cafb57a271babad8ccffbf733caa076
- https://git.kernel.org/stable/c/d8e2973029b8b2ce477b564824431f3385c77083
- https://git.kernel.org/stable/c/0dc13e75507faa17ac9f7562b4ef7bf8fcd78422
- https://git.kernel.org/stable/c/1e28018b5c83d5073f74a6fb72eabe8370b2f501
- https://git.kernel.org/stable/c/3dd2aeac2e9624cff9fa634710837e4f2e352758
- https://git.kernel.org/stable/c/6cff57eea3347f79f1867cc53e1093b6614138d8
- https://git.kernel.org/stable/c/77de6ee73f54a9a89c0afa0bf4c53b239aa9953a
- https://git.kernel.org/stable/c/ac31cc837cafb57a271babad8ccffbf733caa076
- https://git.kernel.org/stable/c/d8e2973029b8b2ce477b564824431f3385c77083
Modified: 2024-12-30
CVE-2021-47239
In the Linux kernel, the following vulnerability has been resolved: net: usb: fix possible use-after-free in smsc75xx_bind The commit 46a8b29c6306 ("net: usb: fix memory leak in smsc75xx_bind") fails to clean up the work scheduled in smsc75xx_reset-> smsc75xx_set_multicast, which leads to use-after-free if the work is scheduled to start after the deallocation. In addition, this patch also removes a dangling pointer - dev->data[0]. This patch calls cancel_work_sync to cancel the scheduled work and set the dangling pointer to NULL.
- https://git.kernel.org/stable/c/14616c372a7be01a2fb8c56c9d8debd232b9e43d
- https://git.kernel.org/stable/c/2fc8300c9cfa5167fcb5b1a2a07db6f53e82f59b
- https://git.kernel.org/stable/c/4252bf6c2b245f47011098113d405ffad6ad5d5b
- https://git.kernel.org/stable/c/56b786d86694e079d8aad9b314e015cd4ac02a3d
- https://git.kernel.org/stable/c/570a52cf3e01d19f7fd1a251dfc52b0cd86c13cb
- https://git.kernel.org/stable/c/64160d1741a3de5204d1a822e058e0b4cc526504
- https://git.kernel.org/stable/c/7cc8b2e05fcea6edd022d26e82091d781af8fd9b
- https://git.kernel.org/stable/c/c4e3be2e7742863e454ce31faf8fd0109c00050b
- https://git.kernel.org/stable/c/14616c372a7be01a2fb8c56c9d8debd232b9e43d
- https://git.kernel.org/stable/c/2fc8300c9cfa5167fcb5b1a2a07db6f53e82f59b
- https://git.kernel.org/stable/c/4252bf6c2b245f47011098113d405ffad6ad5d5b
- https://git.kernel.org/stable/c/56b786d86694e079d8aad9b314e015cd4ac02a3d
- https://git.kernel.org/stable/c/570a52cf3e01d19f7fd1a251dfc52b0cd86c13cb
- https://git.kernel.org/stable/c/64160d1741a3de5204d1a822e058e0b4cc526504
- https://git.kernel.org/stable/c/7cc8b2e05fcea6edd022d26e82091d781af8fd9b
- https://git.kernel.org/stable/c/c4e3be2e7742863e454ce31faf8fd0109c00050b
Modified: 2024-12-30
CVE-2021-47240
In the Linux kernel, the following vulnerability has been resolved: net: qrtr: fix OOB Read in qrtr_endpoint_post Syzbot reported slab-out-of-bounds Read in qrtr_endpoint_post. The problem was in wrong _size_ type: if (len != ALIGN(size, 4) + hdrlen) goto err; If size from qrtr_hdr is 4294967293 (0xfffffffd), the result of ALIGN(size, 4) will be 0. In case of len == hdrlen and size == 4294967293 in header this check won't fail and skb_put_data(skb, data + hdrlen, size); will read out of bound from data, which is hdrlen allocated block.
- https://git.kernel.org/stable/c/19892ab9c9d838e2e5a7744d36e4bb8b7c3292fe
- https://git.kernel.org/stable/c/26b8d10703a9be45d6097946b2b4011f7dd2c56f
- https://git.kernel.org/stable/c/960b08dd36de1e341e3eb43d1c547513e338f4f8
- https://git.kernel.org/stable/c/ad9d24c9429e2159d1e279dc3a83191ccb4daf1d
- https://git.kernel.org/stable/c/f8111c0d7ed42ede41a3d0d393b104de0730a8a6
- https://git.kernel.org/stable/c/19892ab9c9d838e2e5a7744d36e4bb8b7c3292fe
- https://git.kernel.org/stable/c/26b8d10703a9be45d6097946b2b4011f7dd2c56f
- https://git.kernel.org/stable/c/960b08dd36de1e341e3eb43d1c547513e338f4f8
- https://git.kernel.org/stable/c/ad9d24c9429e2159d1e279dc3a83191ccb4daf1d
- https://git.kernel.org/stable/c/f8111c0d7ed42ede41a3d0d393b104de0730a8a6
Modified: 2025-04-04
CVE-2021-47241
In the Linux kernel, the following vulnerability has been resolved: ethtool: strset: fix message length calculation Outer nest for ETHTOOL_A_STRSET_STRINGSETS is not accounted for. This may result in ETHTOOL_MSG_STRSET_GET producing a warning like: calculated message payload length (684) not sufficient WARNING: CPU: 0 PID: 30967 at net/ethtool/netlink.c:369 ethnl_default_doit+0x87a/0xa20 and a splat. As usually with such warnings three conditions must be met for the warning to trigger: - there must be no skb size rounding up (e.g. reply_size of 684); - string set must be per-device (so that the header gets populated); - the device name must be at least 12 characters long. all in all with current user space it looks like reading priv flags is the only place this could potentially happen. Or with syzbot :)
- https://git.kernel.org/stable/c/cfc7f0e70d649e6d2233fba0d9390b525677d971
- https://git.kernel.org/stable/c/e175aef902697826d344ce3a12189329848fe898
- https://git.kernel.org/stable/c/fb3a948143688e14e2cfd2a2812877923d0e5e92
- https://git.kernel.org/stable/c/cfc7f0e70d649e6d2233fba0d9390b525677d971
- https://git.kernel.org/stable/c/e175aef902697826d344ce3a12189329848fe898
- https://git.kernel.org/stable/c/fb3a948143688e14e2cfd2a2812877923d0e5e92
Modified: 2025-04-04
CVE-2021-47242
In the Linux kernel, the following vulnerability has been resolved:
mptcp: fix soft lookup in subflow_error_report()
Maxim reported a soft lookup in subflow_error_report():
watchdog: BUG: soft lockup - CPU#0 stuck for 22s! [swapper/0:0]
RIP: 0010:native_queued_spin_lock_slowpath
RSP: 0018:ffffa859c0003bc0 EFLAGS: 00000202
RAX: 0000000000000101 RBX: 0000000000000001 RCX: 0000000000000000
RDX: ffff9195c2772d88 RSI: 0000000000000000 RDI: ffff9195c2772d88
RBP: ffff9195c2772d00 R08: 00000000000067b0 R09: c6e31da9eb1e44f4
R10: ffff9195ef379700 R11: ffff9195edb50710 R12: ffff9195c2772d88
R13: ffff9195f500e3d0 R14: ffff9195ef379700 R15: ffff9195ef379700
FS: 0000000000000000(0000) GS:ffff91961f400000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000000c000407000 CR3: 0000000002988000 CR4: 00000000000006f0
Call Trace:
Modified: 2024-12-30
CVE-2021-47243
In the Linux kernel, the following vulnerability has been resolved: sch_cake: Fix out of bounds when parsing TCP options and header The TCP option parser in cake qdisc (cake_get_tcpopt and cake_tcph_may_drop) could read one byte out of bounds. When the length is 1, the execution flow gets into the loop, reads one byte of the opcode, and if the opcode is neither TCPOPT_EOL nor TCPOPT_NOP, it reads one more byte, which exceeds the length of 1. This fix is inspired by commit 9609dad263f8 ("ipv4: tcp_input: fix stack out of bounds when parsing TCP options."). v2 changes: Added doff validation in cake_get_tcphdr to avoid parsing garbage as TCP header. Although it wasn't strictly an out-of-bounds access (memory was allocated), garbage values could be read where CAKE expected the TCP header if doff was smaller than 5.
- https://git.kernel.org/stable/c/3371392c60e2685af30bd4547badd880f5df2b3f
- https://git.kernel.org/stable/c/3b491dd593d582ceeb27aa617600712a6bd14246
- https://git.kernel.org/stable/c/4cefa061fc63f4d2dff5ab4083f43857cd7a2335
- https://git.kernel.org/stable/c/595897ef118d6fe66690c4fc5b572028c9da95b7
- https://git.kernel.org/stable/c/ba91c49dedbde758ba0b72f57ac90b06ddf8e548
- https://git.kernel.org/stable/c/3371392c60e2685af30bd4547badd880f5df2b3f
- https://git.kernel.org/stable/c/3b491dd593d582ceeb27aa617600712a6bd14246
- https://git.kernel.org/stable/c/4cefa061fc63f4d2dff5ab4083f43857cd7a2335
- https://git.kernel.org/stable/c/595897ef118d6fe66690c4fc5b572028c9da95b7
- https://git.kernel.org/stable/c/ba91c49dedbde758ba0b72f57ac90b06ddf8e548
Modified: 2025-04-04
CVE-2021-47244
In the Linux kernel, the following vulnerability has been resolved: mptcp: Fix out of bounds when parsing TCP options The TCP option parser in mptcp (mptcp_get_options) could read one byte out of bounds. When the length is 1, the execution flow gets into the loop, reads one byte of the opcode, and if the opcode is neither TCPOPT_EOL nor TCPOPT_NOP, it reads one more byte, which exceeds the length of 1. This fix is inspired by commit 9609dad263f8 ("ipv4: tcp_input: fix stack out of bounds when parsing TCP options.").
- https://git.kernel.org/stable/c/07718be265680dcf496347d475ce1a5442f55ad7
- https://git.kernel.org/stable/c/73eeba71dc9932970befa009e68272a3d5ec4a58
- https://git.kernel.org/stable/c/76e02b8905d0691e89e104a882f3bba7dd0f6037
- https://git.kernel.org/stable/c/07718be265680dcf496347d475ce1a5442f55ad7
- https://git.kernel.org/stable/c/73eeba71dc9932970befa009e68272a3d5ec4a58
- https://git.kernel.org/stable/c/76e02b8905d0691e89e104a882f3bba7dd0f6037
Modified: 2024-12-30
CVE-2021-47245
In the Linux kernel, the following vulnerability has been resolved: netfilter: synproxy: Fix out of bounds when parsing TCP options The TCP option parser in synproxy (synproxy_parse_options) could read one byte out of bounds. When the length is 1, the execution flow gets into the loop, reads one byte of the opcode, and if the opcode is neither TCPOPT_EOL nor TCPOPT_NOP, it reads one more byte, which exceeds the length of 1. This fix is inspired by commit 9609dad263f8 ("ipv4: tcp_input: fix stack out of bounds when parsing TCP options."). v2 changes: Added an early return when length < 0 to avoid calling skb_header_pointer with negative length.
- https://git.kernel.org/stable/c/576c1526b4d83c44ad7b673cb841f36cbc6cb6c4
- https://git.kernel.org/stable/c/5fc177ab759418c9537433e63301096e733fb915
- https://git.kernel.org/stable/c/674b5f0c6a4fc5d3abce877048290cea6091fcb1
- https://git.kernel.org/stable/c/6defc77d48eff74075b80ad5925061b2fc010d98
- https://git.kernel.org/stable/c/7d9a9a1a88a3da574e019b4de756bc73337b3b0b
- https://git.kernel.org/stable/c/9cdf299ba4e153b5e56187648420de22c6216f02
- https://git.kernel.org/stable/c/e1eb98cfeafdd85537e7e3cefe93ca9bfbcc3ea8
- https://git.kernel.org/stable/c/f648089337cb8ed40b2bb96e244f72b9d97dc96b
- https://git.kernel.org/stable/c/576c1526b4d83c44ad7b673cb841f36cbc6cb6c4
- https://git.kernel.org/stable/c/5fc177ab759418c9537433e63301096e733fb915
- https://git.kernel.org/stable/c/674b5f0c6a4fc5d3abce877048290cea6091fcb1
- https://git.kernel.org/stable/c/6defc77d48eff74075b80ad5925061b2fc010d98
- https://git.kernel.org/stable/c/7d9a9a1a88a3da574e019b4de756bc73337b3b0b
- https://git.kernel.org/stable/c/9cdf299ba4e153b5e56187648420de22c6216f02
- https://git.kernel.org/stable/c/e1eb98cfeafdd85537e7e3cefe93ca9bfbcc3ea8
- https://git.kernel.org/stable/c/f648089337cb8ed40b2bb96e244f72b9d97dc96b
Modified: 2025-04-29
CVE-2021-47246
In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Fix page reclaim for dead peer hairpin When adding a hairpin flow, a firmware-side send queue is created for the peer net device, which claims some host memory pages for its internal ring buffer. If the peer net device is removed/unbound before the hairpin flow is deleted, then the send queue is not destroyed which leads to a stack trace on pci device remove: [ 748.005230] mlx5_core 0000:08:00.2: wait_func:1094:(pid 12985): MANAGE_PAGES(0x108) timeout. Will cause a leak of a command resource [ 748.005231] mlx5_core 0000:08:00.2: reclaim_pages:514:(pid 12985): failed reclaiming pages: err -110 [ 748.001835] mlx5_core 0000:08:00.2: mlx5_reclaim_root_pages:653:(pid 12985): failed reclaiming pages (-110) for func id 0x0 [ 748.002171] ------------[ cut here ]------------ [ 748.001177] FW pages counter is 4 after reclaiming all pages [ 748.001186] WARNING: CPU: 1 PID: 12985 at drivers/net/ethernet/mellanox/mlx5/core/pagealloc.c:685 mlx5_reclaim_startup_pages+0x34b/0x460 [mlx5_core] [ +0.002771] Modules linked in: cls_flower mlx5_ib mlx5_core ptp pps_core act_mirred sch_ingress openvswitch nsh xt_conntrack xt_MASQUERADE nf_conntrack_netlink nfnetlink xt_addrtype iptable_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 br_netfilter rpcrdma rdma_ucm ib_iser libiscsi scsi_transport_iscsi rdma_cm ib_umad ib_ipoib iw_cm ib_cm ib_uverbs ib_core overlay fuse [last unloaded: pps_core] [ 748.007225] CPU: 1 PID: 12985 Comm: tee Not tainted 5.12.0+ #1 [ 748.001376] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014 [ 748.002315] RIP: 0010:mlx5_reclaim_startup_pages+0x34b/0x460 [mlx5_core] [ 748.001679] Code: 28 00 00 00 0f 85 22 01 00 00 48 81 c4 b0 00 00 00 31 c0 5b 5d 41 5c 41 5d 41 5e 41 5f c3 48 c7 c7 40 cc 19 a1 e8 9f 71 0e e2 <0f> 0b e9 30 ff ff ff 48 c7 c7 a0 cc 19 a1 e8 8c 71 0e e2 0f 0b e9 [ 748.003781] RSP: 0018:ffff88815220faf8 EFLAGS: 00010286 [ 748.001149] RAX: 0000000000000000 RBX: ffff8881b4900280 RCX: 0000000000000000 [ 748.001445] RDX: 0000000000000027 RSI: 0000000000000004 RDI: ffffed102a441f51 [ 748.001614] RBP: 00000000000032b9 R08: 0000000000000001 R09: ffffed1054a15ee8 [ 748.001446] R10: ffff8882a50af73b R11: ffffed1054a15ee7 R12: fffffbfff07c1e30 [ 748.001447] R13: dffffc0000000000 R14: ffff8881b492cba8 R15: 0000000000000000 [ 748.001429] FS: 00007f58bd08b580(0000) GS:ffff8882a5080000(0000) knlGS:0000000000000000 [ 748.001695] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 748.001309] CR2: 000055a026351740 CR3: 00000001d3b48006 CR4: 0000000000370ea0 [ 748.001506] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 748.001483] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 748.001654] Call Trace: [ 748.000576] ? mlx5_satisfy_startup_pages+0x290/0x290 [mlx5_core] [ 748.001416] ? mlx5_cmd_teardown_hca+0xa2/0xd0 [mlx5_core] [ 748.001354] ? mlx5_cmd_init_hca+0x280/0x280 [mlx5_core] [ 748.001203] mlx5_function_teardown+0x30/0x60 [mlx5_core] [ 748.001275] mlx5_uninit_one+0xa7/0xc0 [mlx5_core] [ 748.001200] remove_one+0x5f/0xc0 [mlx5_core] [ 748.001075] pci_device_remove+0x9f/0x1d0 [ 748.000833] device_release_driver_internal+0x1e0/0x490 [ 748.001207] unbind_store+0x19f/0x200 [ 748.000942] ? sysfs_file_ops+0x170/0x170 [ 748.001000] kernfs_fop_write_iter+0x2bc/0x450 [ 748.000970] new_sync_write+0x373/0x610 [ 748.001124] ? new_sync_read+0x600/0x600 [ 748.001057] ? lock_acquire+0x4d6/0x700 [ 748.000908] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 748.001126] ? fd_install+0x1c9/0x4d0 [ 748.000951] vfs_write+0x4d0/0x800 [ 748.000804] ksys_write+0xf9/0x1d0 [ 748.000868] ? __x64_sys_read+0xb0/0xb0 [ 748.000811] ? filp_open+0x50/0x50 [ 748.000919] ? syscall_enter_from_user_mode+0x1d/0x50 [ 748.001223] do_syscall_64+0x3f/0x80 [ 748.000892] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 748.00 ---truncated---
- https://git.kernel.org/stable/c/4b16118665e94c90a3e84a5190486fd0e4eedd74
- https://git.kernel.org/stable/c/a3e5fd9314dfc4314a9567cde96e1aef83a7458a
- https://git.kernel.org/stable/c/b374c1304f6d3d4752ad1412427b7bf02bb1fd61
- https://git.kernel.org/stable/c/be7f3f401d224e1efe8112b2fa8b837eeb8c5e52
- https://git.kernel.org/stable/c/4b16118665e94c90a3e84a5190486fd0e4eedd74
- https://git.kernel.org/stable/c/a3e5fd9314dfc4314a9567cde96e1aef83a7458a
- https://git.kernel.org/stable/c/b374c1304f6d3d4752ad1412427b7bf02bb1fd61
- https://git.kernel.org/stable/c/be7f3f401d224e1efe8112b2fa8b837eeb8c5e52
Modified: 2025-11-14
CVE-2021-47247
In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Fix use-after-free of encap entry in neigh update handler Function mlx5e_rep_neigh_update() wasn't updated to accommodate rtnl lock removal from TC filter update path and properly handle concurrent encap entry insertion/deletion which can lead to following use-after-free: [23827.464923] ================================================================== [23827.469446] BUG: KASAN: use-after-free in mlx5e_encap_take+0x72/0x140 [mlx5_core] [23827.470971] Read of size 4 at addr ffff8881d132228c by task kworker/u20:6/21635 [23827.472251] [23827.472615] CPU: 9 PID: 21635 Comm: kworker/u20:6 Not tainted 5.13.0-rc3+ #5 [23827.473788] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014 [23827.475639] Workqueue: mlx5e mlx5e_rep_neigh_update [mlx5_core] [23827.476731] Call Trace: [23827.477260] dump_stack+0xbb/0x107 [23827.477906] print_address_description.constprop.0+0x18/0x140 [23827.478896] ? mlx5e_encap_take+0x72/0x140 [mlx5_core] [23827.479879] ? mlx5e_encap_take+0x72/0x140 [mlx5_core] [23827.480905] kasan_report.cold+0x7c/0xd8 [23827.481701] ? mlx5e_encap_take+0x72/0x140 [mlx5_core] [23827.482744] kasan_check_range+0x145/0x1a0 [23827.493112] mlx5e_encap_take+0x72/0x140 [mlx5_core] [23827.494054] ? mlx5e_tc_tun_encap_info_equal_generic+0x140/0x140 [mlx5_core] [23827.495296] mlx5e_rep_neigh_update+0x41e/0x5e0 [mlx5_core] [23827.496338] ? mlx5e_rep_neigh_entry_release+0xb80/0xb80 [mlx5_core] [23827.497486] ? read_word_at_a_time+0xe/0x20 [23827.498250] ? strscpy+0xa0/0x2a0 [23827.498889] process_one_work+0x8ac/0x14e0 [23827.499638] ? lockdep_hardirqs_on_prepare+0x400/0x400 [23827.500537] ? pwq_dec_nr_in_flight+0x2c0/0x2c0 [23827.501359] ? rwlock_bug.part.0+0x90/0x90 [23827.502116] worker_thread+0x53b/0x1220 [23827.502831] ? process_one_work+0x14e0/0x14e0 [23827.503627] kthread+0x328/0x3f0 [23827.504254] ? _raw_spin_unlock_irq+0x24/0x40 [23827.505065] ? __kthread_bind_mask+0x90/0x90 [23827.505912] ret_from_fork+0x1f/0x30 [23827.506621] [23827.506987] Allocated by task 28248: [23827.507694] kasan_save_stack+0x1b/0x40 [23827.508476] __kasan_kmalloc+0x7c/0x90 [23827.509197] mlx5e_attach_encap+0xde1/0x1d40 [mlx5_core] [23827.510194] mlx5e_tc_add_fdb_flow+0x397/0xc40 [mlx5_core] [23827.511218] __mlx5e_add_fdb_flow+0x519/0xb30 [mlx5_core] [23827.512234] mlx5e_configure_flower+0x191c/0x4870 [mlx5_core] [23827.513298] tc_setup_cb_add+0x1d5/0x420 [23827.514023] fl_hw_replace_filter+0x382/0x6a0 [cls_flower] [23827.514975] fl_change+0x2ceb/0x4a51 [cls_flower] [23827.515821] tc_new_tfilter+0x89a/0x2070 [23827.516548] rtnetlink_rcv_msg+0x644/0x8c0 [23827.517300] netlink_rcv_skb+0x11d/0x340 [23827.518021] netlink_unicast+0x42b/0x700 [23827.518742] netlink_sendmsg+0x743/0xc20 [23827.519467] sock_sendmsg+0xb2/0xe0 [23827.520131] ____sys_sendmsg+0x590/0x770 [23827.520851] ___sys_sendmsg+0xd8/0x160 [23827.521552] __sys_sendmsg+0xb7/0x140 [23827.522238] do_syscall_64+0x3a/0x70 [23827.522907] entry_SYSCALL_64_after_hwframe+0x44/0xae [23827.523797] [23827.524163] Freed by task 25948: [23827.524780] kasan_save_stack+0x1b/0x40 [23827.525488] kasan_set_track+0x1c/0x30 [23827.526187] kasan_set_free_info+0x20/0x30 [23827.526968] __kasan_slab_free+0xed/0x130 [23827.527709] slab_free_freelist_hook+0xcf/0x1d0 [23827.528528] kmem_cache_free_bulk+0x33a/0x6e0 [23827.529317] kfree_rcu_work+0x55f/0xb70 [23827.530024] process_one_work+0x8ac/0x14e0 [23827.530770] worker_thread+0x53b/0x1220 [23827.531480] kthread+0x328/0x3f0 [23827.532114] ret_from_fork+0x1f/0x30 [23827.532785] [23827.533147] Last potentially related work creation: [23827.534007] kasan_save_stack+0x1b/0x40 [23827.534710] kasan_record_aux_stack+0xab/0xc0 [23827.535492] kvfree_call_rcu+0x31/0x7b0 [23827.536206] mlx5e_tc_del ---truncated---
- https://git.kernel.org/stable/c/0d1e7a7964ce6abb28883a3906bbc20fe0009f03
- https://git.kernel.org/stable/c/b6447b72aca571632e71bb73a797118d5ce46a93
- https://git.kernel.org/stable/c/fb1a3132ee1ac968316e45d21a48703a6db0b6c3
- https://git.kernel.org/stable/c/b6447b72aca571632e71bb73a797118d5ce46a93
- https://git.kernel.org/stable/c/fb1a3132ee1ac968316e45d21a48703a6db0b6c3
- https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html
Modified: 2025-04-30
CVE-2021-47248
In the Linux kernel, the following vulnerability has been resolved:
udp: fix race between close() and udp_abort()
Kaustubh reported and diagnosed a panic in udp_lib_lookup().
The root cause is udp_abort() racing with close(). Both
racing functions acquire the socket lock, but udp{v6}_destroy_sock()
release it before performing destructive actions.
We can't easily extend the socket lock scope to avoid the race,
instead use the SOCK_DEAD flag to prevent udp_abort from doing
any action when the critical race happens.
Diagnosed-and-tested-by: Kaustubh Pandey
- https://git.kernel.org/stable/c/2f73448041bd0682d4b552cfd314ace66107f1ad
- https://git.kernel.org/stable/c/5a88477c1c85e4baa51e91f2d40f2166235daa56
- https://git.kernel.org/stable/c/65310b0aff86980a011c7c7bfa487a333d4ca241
- https://git.kernel.org/stable/c/8729ec8a2238152a4afc212a331a6cd2c61aeeac
- https://git.kernel.org/stable/c/a0882f68f54f7a8b6308261acee9bd4faab5a69e
- https://git.kernel.org/stable/c/a8b897c7bcd47f4147d066e22cc01d1026d7640e
- https://git.kernel.org/stable/c/e3c36c773aed0fef8b1d3d555b43393ec564400f
- https://git.kernel.org/stable/c/2f73448041bd0682d4b552cfd314ace66107f1ad
- https://git.kernel.org/stable/c/5a88477c1c85e4baa51e91f2d40f2166235daa56
- https://git.kernel.org/stable/c/65310b0aff86980a011c7c7bfa487a333d4ca241
- https://git.kernel.org/stable/c/8729ec8a2238152a4afc212a331a6cd2c61aeeac
- https://git.kernel.org/stable/c/a0882f68f54f7a8b6308261acee9bd4faab5a69e
- https://git.kernel.org/stable/c/a8b897c7bcd47f4147d066e22cc01d1026d7640e
- https://git.kernel.org/stable/c/e3c36c773aed0fef8b1d3d555b43393ec564400f
Modified: 2024-12-30
CVE-2021-47249
In the Linux kernel, the following vulnerability has been resolved: net: rds: fix memory leak in rds_recvmsg Syzbot reported memory leak in rds. The problem was in unputted refcount in case of error. int rds_recvmsg(struct socket *sock, struct msghdr *msg, size_t size, int msg_flags) { ... if (!rds_next_incoming(rs, &inc)) { ... } After this "if" inc refcount incremented and if (rds_cmsg_recv(inc, msg, rs)) { ret = -EFAULT; goto out; } ... out: return ret; } in case of rds_cmsg_recv() fail the refcount won't be decremented. And it's easy to see from ftrace log, that rds_inc_addref() don't have rds_inc_put() pair in rds_recvmsg() after rds_cmsg_recv() 1) | rds_recvmsg() { 1) 3.721 us | rds_inc_addref(); 1) 3.853 us | rds_message_inc_copy_to_user(); 1) + 10.395 us | rds_cmsg_recv(); 1) + 34.260 us | }
- https://git.kernel.org/stable/c/06b7cb0194bd1ede0dd27f3a946e7c0279fba44a
- https://git.kernel.org/stable/c/1f79bc8ae81c05eb112a53f981cb2c244ee50d02
- https://git.kernel.org/stable/c/2038cd15eacdf7512755c27686822e0052eb9042
- https://git.kernel.org/stable/c/423c6939758fb3b9cf5abbd1e7792068a5c4ae8c
- https://git.kernel.org/stable/c/49bfcbfd989a8f1f23e705759a6bb099de2cff9f
- https://git.kernel.org/stable/c/5946fbf48355f5a8caeff72580c7658da5966b86
- https://git.kernel.org/stable/c/8c3ec88b03e9e4ca117dcdc4204fd3edcd02084f
- https://git.kernel.org/stable/c/b25b60d076164edb3025e85aabd2cf50a5215b91
- https://git.kernel.org/stable/c/06b7cb0194bd1ede0dd27f3a946e7c0279fba44a
- https://git.kernel.org/stable/c/1f79bc8ae81c05eb112a53f981cb2c244ee50d02
- https://git.kernel.org/stable/c/2038cd15eacdf7512755c27686822e0052eb9042
- https://git.kernel.org/stable/c/423c6939758fb3b9cf5abbd1e7792068a5c4ae8c
- https://git.kernel.org/stable/c/49bfcbfd989a8f1f23e705759a6bb099de2cff9f
- https://git.kernel.org/stable/c/5946fbf48355f5a8caeff72580c7658da5966b86
- https://git.kernel.org/stable/c/8c3ec88b03e9e4ca117dcdc4204fd3edcd02084f
- https://git.kernel.org/stable/c/b25b60d076164edb3025e85aabd2cf50a5215b91
Modified: 2024-12-30
CVE-2021-47250
In the Linux kernel, the following vulnerability has been resolved: net: ipv4: fix memory leak in netlbl_cipsov4_add_std Reported by syzkaller: BUG: memory leak unreferenced object 0xffff888105df7000 (size 64): comm "syz-executor842", pid 360, jiffies 4294824824 (age 22.546s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000e67ed558>] kmalloc include/linux/slab.h:590 [inline] [<00000000e67ed558>] kzalloc include/linux/slab.h:720 [inline] [<00000000e67ed558>] netlbl_cipsov4_add_std net/netlabel/netlabel_cipso_v4.c:145 [inline] [<00000000e67ed558>] netlbl_cipsov4_add+0x390/0x2340 net/netlabel/netlabel_cipso_v4.c:416 [<0000000006040154>] genl_family_rcv_msg_doit.isra.0+0x20e/0x320 net/netlink/genetlink.c:739 [<00000000204d7a1c>] genl_family_rcv_msg net/netlink/genetlink.c:783 [inline] [<00000000204d7a1c>] genl_rcv_msg+0x2bf/0x4f0 net/netlink/genetlink.c:800 [<00000000c0d6a995>] netlink_rcv_skb+0x134/0x3d0 net/netlink/af_netlink.c:2504 [<00000000d78b9d2c>] genl_rcv+0x24/0x40 net/netlink/genetlink.c:811 [<000000009733081b>] netlink_unicast_kernel net/netlink/af_netlink.c:1314 [inline] [<000000009733081b>] netlink_unicast+0x4a0/0x6a0 net/netlink/af_netlink.c:1340 [<00000000d5fd43b8>] netlink_sendmsg+0x789/0xc70 net/netlink/af_netlink.c:1929 [<000000000a2d1e40>] sock_sendmsg_nosec net/socket.c:654 [inline] [<000000000a2d1e40>] sock_sendmsg+0x139/0x170 net/socket.c:674 [<00000000321d1969>] ____sys_sendmsg+0x658/0x7d0 net/socket.c:2350 [<00000000964e16bc>] ___sys_sendmsg+0xf8/0x170 net/socket.c:2404 [<000000001615e288>] __sys_sendmsg+0xd3/0x190 net/socket.c:2433 [<000000004ee8b6a5>] do_syscall_64+0x37/0x90 arch/x86/entry/common.c:47 [<00000000171c7cee>] entry_SYSCALL_64_after_hwframe+0x44/0xae The memory of doi_def->map.std pointing is allocated in netlbl_cipsov4_add_std, but no place has freed it. It should be freed in cipso_v4_doi_free which frees the cipso DOI resource.
- https://git.kernel.org/stable/c/086e92b1d68c6338535f715aad173f8cf4bfbc8c
- https://git.kernel.org/stable/c/0ffb460be3abac86f884a8c548bb02724ec370f4
- https://git.kernel.org/stable/c/212166510582631994be4f4b3fe15e10a03c1dd4
- https://git.kernel.org/stable/c/398a24447eb60f060c8994221cb5ae6caf355fa1
- https://git.kernel.org/stable/c/5340858147e3dc60913fb3dd0cbb758ec4a26e66
- https://git.kernel.org/stable/c/6dcea66d3bb519b426282588f38e884e07893c1f
- https://git.kernel.org/stable/c/d612c3f3fae221e7ea736d196581c2217304bbbc
- https://git.kernel.org/stable/c/deeeb65c6ee404f2d1fb80b38b2730645c0f4663
- https://git.kernel.org/stable/c/086e92b1d68c6338535f715aad173f8cf4bfbc8c
- https://git.kernel.org/stable/c/0ffb460be3abac86f884a8c548bb02724ec370f4
- https://git.kernel.org/stable/c/212166510582631994be4f4b3fe15e10a03c1dd4
- https://git.kernel.org/stable/c/398a24447eb60f060c8994221cb5ae6caf355fa1
- https://git.kernel.org/stable/c/5340858147e3dc60913fb3dd0cbb758ec4a26e66
- https://git.kernel.org/stable/c/6dcea66d3bb519b426282588f38e884e07893c1f
- https://git.kernel.org/stable/c/d612c3f3fae221e7ea736d196581c2217304bbbc
- https://git.kernel.org/stable/c/deeeb65c6ee404f2d1fb80b38b2730645c0f4663
Modified: 2025-04-30
CVE-2021-47251
In the Linux kernel, the following vulnerability has been resolved: mac80211: fix skb length check in ieee80211_scan_rx() Replace hard-coded compile-time constants for header length check with dynamic determination based on the frame type. Otherwise, we hit a validation WARN_ON in cfg80211 later. [style fixes, reword commit message]
- https://git.kernel.org/stable/c/5a1cd67a801cf5ef989c4783e07b86a25b143126
- https://git.kernel.org/stable/c/d1b949c70206178b12027f66edc088d40375b5cb
- https://git.kernel.org/stable/c/e298aa358f0ca658406d524b6639fe389cb6e11e
- https://git.kernel.org/stable/c/5a1cd67a801cf5ef989c4783e07b86a25b143126
- https://git.kernel.org/stable/c/d1b949c70206178b12027f66edc088d40375b5cb
- https://git.kernel.org/stable/c/e298aa358f0ca658406d524b6639fe389cb6e11e
Modified: 2025-04-30
CVE-2021-47252
In the Linux kernel, the following vulnerability has been resolved: batman-adv: Avoid WARN_ON timing related checks The soft/batadv interface for a queued OGM can be changed during the time the OGM was queued for transmission and when the OGM is actually transmitted by the worker. But WARN_ON must be used to denote kernel bugs and not to print simple warnings. A warning can simply be printed using pr_warn.
- https://git.kernel.org/stable/c/282baa8104af44e04c4af3e7f933b44267c7f86f
- https://git.kernel.org/stable/c/2eb4e0b3631832a4291c8bf4c9db873f60b128c8
- https://git.kernel.org/stable/c/45011f2973f6b52cf50db397bb27bf805f5f0e7f
- https://git.kernel.org/stable/c/6031daaaf6d5c359c99dfffa102e332df234ff09
- https://git.kernel.org/stable/c/77a99aad5bc3ea105806ebae6be3cbadc2fc615e
- https://git.kernel.org/stable/c/9f460ae31c4435fd022c443a6029352217a16ac1
- https://git.kernel.org/stable/c/e7fbd8184fa9e85f0d648c499841cb7ff6dec9f4
- https://git.kernel.org/stable/c/e8e9d2968a9d08bf5c683afca182f1537edebf8d
- https://git.kernel.org/stable/c/282baa8104af44e04c4af3e7f933b44267c7f86f
- https://git.kernel.org/stable/c/2eb4e0b3631832a4291c8bf4c9db873f60b128c8
- https://git.kernel.org/stable/c/45011f2973f6b52cf50db397bb27bf805f5f0e7f
- https://git.kernel.org/stable/c/6031daaaf6d5c359c99dfffa102e332df234ff09
- https://git.kernel.org/stable/c/77a99aad5bc3ea105806ebae6be3cbadc2fc615e
- https://git.kernel.org/stable/c/9f460ae31c4435fd022c443a6029352217a16ac1
- https://git.kernel.org/stable/c/e7fbd8184fa9e85f0d648c499841cb7ff6dec9f4
- https://git.kernel.org/stable/c/e8e9d2968a9d08bf5c683afca182f1537edebf8d
Modified: 2025-04-30
CVE-2021-47255
In the Linux kernel, the following vulnerability has been resolved: kvm: LAPIC: Restore guard to prevent illegal APIC register access Per the SDM, "any access that touches bytes 4 through 15 of an APIC register may cause undefined behavior and must not be executed." Worse, such an access in kvm_lapic_reg_read can result in a leak of kernel stack contents. Prior to commit 01402cf81051 ("kvm: LAPIC: write down valid APIC registers"), such an access was explicitly disallowed. Restore the guard that was removed in that commit.
- https://git.kernel.org/stable/c/018685461a5b9a9a70e664ac77aef0d7415a3fd5
- https://git.kernel.org/stable/c/218bf772bddd221489c38dde6ef8e917131161f6
- https://git.kernel.org/stable/c/a2aff09807fbe4018c269d3773a629949058b210
- https://git.kernel.org/stable/c/bf99ea52970caeb4583bdba1192c1f9b53b12c84
- https://git.kernel.org/stable/c/018685461a5b9a9a70e664ac77aef0d7415a3fd5
- https://git.kernel.org/stable/c/218bf772bddd221489c38dde6ef8e917131161f6
- https://git.kernel.org/stable/c/a2aff09807fbe4018c269d3773a629949058b210
- https://git.kernel.org/stable/c/bf99ea52970caeb4583bdba1192c1f9b53b12c84
Modified: 2025-04-30
CVE-2021-47256
In the Linux kernel, the following vulnerability has been resolved: mm/memory-failure: make sure wait for page writeback in memory_failure Our syzkaller trigger the "BUG_ON(!list_empty(&inode->i_wb_list))" in clear_inode: kernel BUG at fs/inode.c:519! Internal error: Oops - BUG: 0 [#1] SMP Modules linked in: Process syz-executor.0 (pid: 249, stack limit = 0x00000000a12409d7) CPU: 1 PID: 249 Comm: syz-executor.0 Not tainted 4.19.95 Hardware name: linux,dummy-virt (DT) pstate: 80000005 (Nzcv daif -PAN -UAO) pc : clear_inode+0x280/0x2a8 lr : clear_inode+0x280/0x2a8 Call trace: clear_inode+0x280/0x2a8 ext4_clear_inode+0x38/0xe8 ext4_free_inode+0x130/0xc68 ext4_evict_inode+0xb20/0xcb8 evict+0x1a8/0x3c0 iput+0x344/0x460 do_unlinkat+0x260/0x410 __arm64_sys_unlinkat+0x6c/0xc0 el0_svc_common+0xdc/0x3b0 el0_svc_handler+0xf8/0x160 el0_svc+0x10/0x218 Kernel panic - not syncing: Fatal exception A crash dump of this problem show that someone called __munlock_pagevec to clear page LRU without lock_page: do_mmap -> mmap_region -> do_munmap -> munlock_vma_pages_range -> __munlock_pagevec. As a result memory_failure will call identify_page_state without wait_on_page_writeback. And after truncate_error_page clear the mapping of this page. end_page_writeback won't call sb_clear_inode_writeback to clear inode->i_wb_list. That will trigger BUG_ON in clear_inode! Fix it by checking PageWriteback too to help determine should we skip wait_on_page_writeback.
- https://git.kernel.org/stable/c/28788dc5c70597395b6b451dae4549bbaa8e2c56
- https://git.kernel.org/stable/c/566345aaabac853aa866f53a219c4b02a6beb527
- https://git.kernel.org/stable/c/6d210d547adc2218ef8b5bcf23518c5f2f1fd872
- https://git.kernel.org/stable/c/9e379da727a7a031be9b877cde7b9c34a0fb8306
- https://git.kernel.org/stable/c/d05267fd27a5c4f54e06daefa3035995d765ca0c
- https://git.kernel.org/stable/c/e8675d291ac007e1c636870db880f837a9ea112a
- https://git.kernel.org/stable/c/28788dc5c70597395b6b451dae4549bbaa8e2c56
- https://git.kernel.org/stable/c/566345aaabac853aa866f53a219c4b02a6beb527
- https://git.kernel.org/stable/c/6d210d547adc2218ef8b5bcf23518c5f2f1fd872
- https://git.kernel.org/stable/c/9e379da727a7a031be9b877cde7b9c34a0fb8306
- https://git.kernel.org/stable/c/d05267fd27a5c4f54e06daefa3035995d765ca0c
- https://git.kernel.org/stable/c/e8675d291ac007e1c636870db880f837a9ea112a
Closed bugs
libidn FTBFS on armh
Package fonts-bitmap-misc updated to version 7.0.0-alt7 for branch sisyphus in task 278605.
Closed bugs
fonts-bitmap-misc loses fonts after rebuild
Package fonts-bitmap-univga updated to version 0.0.20021031-alt3.2 for branch sisyphus in task 278610.
Closed bugs
fonts-bitmap-univga loses fonts after rebuild
Closed bugs
nvramtool FTBFS on aarch64, armh, and ppc64le
Closed bugs
Обновить wxGTK 3.1
Package php8.0-soap updated to version 8.0.8-alt1 for branch sisyphus in task 277979.
Closed vulnerabilities
Modified: 2024-09-16
BDU:2021-03559
Уязвимость модуля pdo_firebase интерпретатора языка программирования PHP, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-09-13
BDU:2021-03703
Уязвимость функции php_url_parse_ex() интерпретатора языка программирования PHP, позволяющая нарушителю осуществить SSRF-атаку
Modified: 2024-11-21
CVE-2021-21704
In PHP versions 7.3.x below 7.3.29, 7.4.x below 7.4.21 and 8.0.x below 8.0.8, when using Firebird PDO driver extension, a malicious database server could cause crashes in various database functions, such as getAttribute(), execute(), fetch() and others by returning invalid response data that is not parsed correctly by the driver. This can result in crashes, denial of service or potentially memory corruption.
- https://bugs.php.net/bug.php?id=76448
- https://bugs.php.net/bug.php?id=76449
- https://bugs.php.net/bug.php?id=76450
- https://bugs.php.net/bug.php?id=76452
- https://security.gentoo.org/glsa/202209-20
- https://security.netapp.com/advisory/ntap-20211029-0006/
- https://bugs.php.net/bug.php?id=76448
- https://bugs.php.net/bug.php?id=76449
- https://bugs.php.net/bug.php?id=76450
- https://bugs.php.net/bug.php?id=76452
- https://security.gentoo.org/glsa/202209-20
- https://security.netapp.com/advisory/ntap-20211029-0006/
Modified: 2024-11-21
CVE-2021-21705
In PHP versions 7.3.x below 7.3.29, 7.4.x below 7.4.21 and 8.0.x below 8.0.8, when using URL validation functionality via filter_var() function with FILTER_VALIDATE_URL parameter, an URL with invalid password field can be accepted as valid. This can lead to the code incorrectly parsing the URL and potentially leading to other security implications - like contacting a wrong server or making a wrong access decision.
- https://bugs.php.net/bug.php?id=81122
- https://security.gentoo.org/glsa/202209-20
- https://security.netapp.com/advisory/ntap-20211029-0006/
- https://www.oracle.com/security-alerts/cpujan2022.html
- https://bugs.php.net/bug.php?id=81122
- https://security.gentoo.org/glsa/202209-20
- https://security.netapp.com/advisory/ntap-20211029-0006/
- https://www.oracle.com/security-alerts/cpujan2022.html
