ALT-BU-2021-4063-3
Branch p9 update bulletin.
Package kernel-image-un-def updated to version 5.10.52-alt1 for branch p9 in task 279881.
Closed vulnerabilities
Modified: 2024-09-13
BDU:2021-03848
Уязвимость компонента fs/seq_file.c ядра операционных систем Linux, позволяющая нарушителю повысить свои привилегии
Modified: 2026-01-20
BDU:2021-04848
Уязвимость драйвера drivers/char/virtio_console.c ядра операционной системы Linux, позволяющая нарушителю вызвать повреждение стека
Modified: 2025-01-29
BDU:2022-05676
Уязвимость функции cgroup1_parse_param компонента kernel/cgroup/cgroup-v1.c ядра операционной системы Linux, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
Modified: 2025-06-25
BDU:2025-07308
Уязвимость функции wdt_startup() модуля drivers/watchdog/sc520_wdt.c поддержки сторожевого таймера ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
Modified: 2025-06-25
BDU:2025-07310
Уязвимость функции wdt_startup() модуля drivers/watchdog/sbc60xxwdt.c поддержки сторожевого таймера ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2025-07326
Уязвимость функции lpc18xx_wdt_remove() модуля drivers/watchdog/lpc18xx_wdt.c поддержки сторожевого таймера ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2025-07327
Уязвимость функции iscsi_prep_bidi_ahs() модуля drivers/scsi/libiscsi.c - драйвера поддержки устройств SCSI ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2025-07328
Уязвимость функции ibmasm_init_one() модуля drivers/misc/ibmasm/module.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2025-07329
Уязвимость функции fb_set_var() модуля drivers/video/fbdev/core/fbmem.c - драйвера поддержки устройств кадрового буфера ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2025-07330
Уязвимость функции kvm_vm_ioctl_unregister_coalesced_mmio() модуля virt/kvm/coalesced_mmio.c подсистемы виртуализации Kernel-based Virtual Machine (KVM) ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2025-07340
Уязвимость функции arm_smmu_rpm_get() модуля drivers/iommu/arm-smmu.c - драйвера поддержки IOMMU ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2025-07351
Уязвимость функции megasas_probe_one() модуля drivers/scsi/megaraid/megaraid_sas_base.c - драйвера поддержки устройств SCSI ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2025-07392
Уязвимость функции fsl_ifc_ctrl_remove() модуля drivers/memory/fsl_ifc.c ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность и доступность защищаемой информации
BDU:2025-07394
Уязвимость функции virtblk_freeze() модуля drivers/block/virtio_blk.c - драйвера поддержки блочных устройств ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность и доступность защищаемой информации
BDU:2025-07395
Уязвимость функции nfs3_proc_create() модуля fs/nfs/nfs3proc.c поддержки файловой системы ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность и доступность защищаемой информации
BDU:2025-07396
Уязвимость функции arm_smmu_iova_to_phys_hard() модуля drivers/iommu/arm-smmu.c - драйвера поддержки IOMMU ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность и доступность защищаемой информации
BDU:2025-07397
Уязвимость функции serial_resume() модуля drivers/tty/serial/8250/serial_cs.c ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность и доступность защищаемой информации
BDU:2025-07398
Уязвимость функции usb_charger_get_property() модуля drivers/usb/common/usb-conn-gpio.c - драйвера поддержки устройств шины USB ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2025-07399
Уязвимость функции usb_stream_free() модуля sound/usb/usx2y/usb_stream.c поддержки звуковых устройств USB ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2025-07401
Уязвимость функции alcor_pci_init_check_aspm() модуля drivers/misc/cardreader/alcor_pci.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2025-07402
Уязвимость функции scsi_host_alloc() модуля drivers/scsi/hosts.c - драйвера поддержки устройств SCSI ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2025-14325
Уязвимость функции fsl_ifc_ctrl_probe() модуля drivers/memory/fsl_ifc.c драйвера контроллера памяти ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность и доступность защищаемой информации
BDU:2025-15442
Уязвимость функции nfs_direct_write_completion() модуля fs/nfs/direct.c поддержки файловой системы ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2021-33909
fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.
- http://packetstormsecurity.com/files/163621/Sequoia-A-Deep-Root-In-Linuxs-Filesystem-Layer.html
- http://packetstormsecurity.com/files/163671/Kernel-Live-Patch-Security-Notice-LSN-0079-1.html
- http://packetstormsecurity.com/files/164155/Kernel-Live-Patch-Security-Notice-LSN-0081-1.html
- http://packetstormsecurity.com/files/165477/Kernel-Live-Patch-Security-Notice-LSN-0083-1.html
- http://www.openwall.com/lists/oss-security/2021/07/22/7
- http://www.openwall.com/lists/oss-security/2021/08/25/10
- http://www.openwall.com/lists/oss-security/2021/09/17/2
- http://www.openwall.com/lists/oss-security/2021/09/17/4
- http://www.openwall.com/lists/oss-security/2021/09/21/1
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.4
- https://github.com/torvalds/linux/commit/8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b
- https://lists.debian.org/debian-lts-announce/2021/07/msg00014.html
- https://lists.debian.org/debian-lts-announce/2021/07/msg00015.html
- https://lists.debian.org/debian-lts-announce/2021/07/msg00016.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z4UHHIGISO3FVRF4CQNJS4IKA25ATSFU/
- https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0015
- https://security.netapp.com/advisory/ntap-20210819-0004/
- https://www.debian.org/security/2021/dsa-4941
- https://www.openwall.com/lists/oss-security/2021/07/20/1
- https://www.oracle.com/security-alerts/cpujan2022.html
- http://packetstormsecurity.com/files/163621/Sequoia-A-Deep-Root-In-Linuxs-Filesystem-Layer.html
- http://packetstormsecurity.com/files/163671/Kernel-Live-Patch-Security-Notice-LSN-0079-1.html
- http://packetstormsecurity.com/files/164155/Kernel-Live-Patch-Security-Notice-LSN-0081-1.html
- http://packetstormsecurity.com/files/165477/Kernel-Live-Patch-Security-Notice-LSN-0083-1.html
- http://www.openwall.com/lists/oss-security/2021/07/22/7
- http://www.openwall.com/lists/oss-security/2021/08/25/10
- http://www.openwall.com/lists/oss-security/2021/09/17/2
- http://www.openwall.com/lists/oss-security/2021/09/17/4
- http://www.openwall.com/lists/oss-security/2021/09/21/1
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.4
- https://github.com/torvalds/linux/commit/8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b
- https://lists.debian.org/debian-lts-announce/2021/07/msg00014.html
- https://lists.debian.org/debian-lts-announce/2021/07/msg00015.html
- https://lists.debian.org/debian-lts-announce/2021/07/msg00016.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z4UHHIGISO3FVRF4CQNJS4IKA25ATSFU/
- https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0015
- https://security.netapp.com/advisory/ntap-20210819-0004/
- https://www.debian.org/security/2021/dsa-4941
- https://www.openwall.com/lists/oss-security/2021/07/20/1
- https://www.oracle.com/security-alerts/cpujan2022.html
Modified: 2025-05-05
CVE-2021-38160
In drivers/char/virtio_console.c in the Linux kernel before 5.13.4, data corruption or loss can be triggered by an untrusted device that supplies a buf->len value exceeding the buffer size. NOTE: the vendor indicates that the cited data corruption is not a vulnerability in any existing use case; the length validation was added solely for robustness in the face of anomalous host OS behavior
- https://access.redhat.com/security/cve/cve-2021-38160
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.4
- https://github.com/torvalds/linux/commit/d00d8da5869a2608e97cfede094dfc5e11462a46
- https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html
- https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html
- https://security.netapp.com/advisory/ntap-20210902-0010/
- https://www.debian.org/security/2021/dsa-4978
- https://access.redhat.com/security/cve/cve-2021-38160
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.4
- https://github.com/torvalds/linux/commit/d00d8da5869a2608e97cfede094dfc5e11462a46
- https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html
- https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html
- https://security.netapp.com/advisory/ntap-20210902-0010/
- https://www.debian.org/security/2021/dsa-4978
Modified: 2024-11-21
CVE-2021-4154
A use-after-free flaw was found in cgroup1_parse_param in kernel/cgroup/cgroup-v1.c in the Linux kernel's cgroup v1 parser. A local attacker with a user privilege could cause a privilege escalation by exploiting the fsconfig syscall parameter leading to a container breakout and a denial of service on the system.
- https://bugzilla.redhat.com/show_bug.cgi?id=2034514
- https://cloud.google.com/anthos/clusters/docs/security-bulletins#gcp-2022-002
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3b0462726e7ef281c35a7a4ae33e93ee2bc9975b
- https://security.netapp.com/advisory/ntap-20220225-0004/
- https://bugzilla.redhat.com/show_bug.cgi?id=2034514
- https://cloud.google.com/anthos/clusters/docs/security-bulletins#gcp-2022-002
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3b0462726e7ef281c35a7a4ae33e93ee2bc9975b
- https://security.netapp.com/advisory/ntap-20220225-0004/
Modified: 2024-12-24
CVE-2021-47314
In the Linux kernel, the following vulnerability has been resolved: memory: fsl_ifc: fix leak of private memory on probe failure On probe error the driver should free the memory allocated for private structure. Fix this by using resource-managed allocation.
- https://git.kernel.org/stable/c/3b45b8a7d549bd92ec94b5357c2c2c1a7ed107e4
- https://git.kernel.org/stable/c/443f6ca6fd186b4fa4e6f377b6e19a91feb1a0d5
- https://git.kernel.org/stable/c/48ee69825f7480622ed447b0249123236d3b3ad0
- https://git.kernel.org/stable/c/7626ffbea708e5aba6912295c012d2b409a1769f
- https://git.kernel.org/stable/c/8018476756066e97ecb886c3dc024aeb7d5792ad
- https://git.kernel.org/stable/c/8e0d09b1232d0538066c40ed4c13086faccbdff6
- https://git.kernel.org/stable/c/a6b45b4932f7b0c36b41fb56a35ad679ece939a0
- https://git.kernel.org/stable/c/b5789e23773f4a852fbfe244b63f675e265d3a7f
- https://git.kernel.org/stable/c/ee1aa737ba0b75ab8af3444c4ae5bdba36aed6e6
- https://git.kernel.org/stable/c/3b45b8a7d549bd92ec94b5357c2c2c1a7ed107e4
- https://git.kernel.org/stable/c/443f6ca6fd186b4fa4e6f377b6e19a91feb1a0d5
- https://git.kernel.org/stable/c/48ee69825f7480622ed447b0249123236d3b3ad0
- https://git.kernel.org/stable/c/7626ffbea708e5aba6912295c012d2b409a1769f
- https://git.kernel.org/stable/c/8018476756066e97ecb886c3dc024aeb7d5792ad
- https://git.kernel.org/stable/c/8e0d09b1232d0538066c40ed4c13086faccbdff6
- https://git.kernel.org/stable/c/a6b45b4932f7b0c36b41fb56a35ad679ece939a0
- https://git.kernel.org/stable/c/b5789e23773f4a852fbfe244b63f675e265d3a7f
- https://git.kernel.org/stable/c/ee1aa737ba0b75ab8af3444c4ae5bdba36aed6e6
Modified: 2025-05-12
CVE-2021-47315
In the Linux kernel, the following vulnerability has been resolved: memory: fsl_ifc: fix leak of IO mapping on probe failure On probe error the driver should unmap the IO memory. Smatch reports: drivers/memory/fsl_ifc.c:298 fsl_ifc_ctrl_probe() warn: 'fsl_ifc_ctrl_dev->gregs' not released on lines: 298.
- https://git.kernel.org/stable/c/28f71fd81ebd3b386bf5c7c5539664156f7d72c1
- https://git.kernel.org/stable/c/3b132ab67fc7a358fff35e808fa65d4bea452521
- https://git.kernel.org/stable/c/6b3b002de90738e3c85853a682ce7e0fa078d42b
- https://git.kernel.org/stable/c/83af5816308b490b05fc8fa27fc1bdc769df200a
- https://git.kernel.org/stable/c/8d071d270afba468708faca5f7b6d9e656f75e27
- https://git.kernel.org/stable/c/94bc2fe46102d1e060fc749c0c19511e76c9995f
- https://git.kernel.org/stable/c/d0d04b95e8ed0223844a1d58497c686fe2e4a955
- https://git.kernel.org/stable/c/d9213d4f372d30b5bc4d921795d6bed0c0e3eebf
- https://git.kernel.org/stable/c/28f71fd81ebd3b386bf5c7c5539664156f7d72c1
- https://git.kernel.org/stable/c/3b132ab67fc7a358fff35e808fa65d4bea452521
- https://git.kernel.org/stable/c/6b3b002de90738e3c85853a682ce7e0fa078d42b
- https://git.kernel.org/stable/c/83af5816308b490b05fc8fa27fc1bdc769df200a
- https://git.kernel.org/stable/c/8d071d270afba468708faca5f7b6d9e656f75e27
- https://git.kernel.org/stable/c/94bc2fe46102d1e060fc749c0c19511e76c9995f
- https://git.kernel.org/stable/c/b7a2bcb4a3731d68f938207f75ed3e1d41774510
- https://git.kernel.org/stable/c/bd051b3e184fa56eeb6276ee913ba4d48069024b
- https://git.kernel.org/stable/c/d0d04b95e8ed0223844a1d58497c686fe2e4a955
- https://git.kernel.org/stable/c/d9213d4f372d30b5bc4d921795d6bed0c0e3eebf
Modified: 2024-12-24
CVE-2021-47319
In the Linux kernel, the following vulnerability has been resolved: virtio-blk: Fix memory leak among suspend/resume procedure The vblk->vqs should be freed before we call init_vqs() in virtblk_restore().
- https://git.kernel.org/stable/c/04c6e60b884cb5e94ff32af46867fb41d5848358
- https://git.kernel.org/stable/c/102d6bc6475ab09bab579c18704e6cf8d898e93c
- https://git.kernel.org/stable/c/29a2f4a3214aa14d61cc9737c9f886dae9dbb710
- https://git.kernel.org/stable/c/381bde79d11e596002edfd914e6714291826967a
- https://git.kernel.org/stable/c/600942d2fd49b90e44857d20c774b20d16f3130f
- https://git.kernel.org/stable/c/863da837964c80c72e368a4f748c30d25daa1815
- https://git.kernel.org/stable/c/b71ba22e7c6c6b279c66f53ee7818709774efa1f
- https://git.kernel.org/stable/c/ca2b8ae93a6da9839dc7f9eb9199b18aa03c3dae
- https://git.kernel.org/stable/c/cd24da0db9f75ca11eaf6060f0ccb90e2f3be3b0
- https://git.kernel.org/stable/c/04c6e60b884cb5e94ff32af46867fb41d5848358
- https://git.kernel.org/stable/c/102d6bc6475ab09bab579c18704e6cf8d898e93c
- https://git.kernel.org/stable/c/29a2f4a3214aa14d61cc9737c9f886dae9dbb710
- https://git.kernel.org/stable/c/381bde79d11e596002edfd914e6714291826967a
- https://git.kernel.org/stable/c/600942d2fd49b90e44857d20c774b20d16f3130f
- https://git.kernel.org/stable/c/863da837964c80c72e368a4f748c30d25daa1815
- https://git.kernel.org/stable/c/b71ba22e7c6c6b279c66f53ee7818709774efa1f
- https://git.kernel.org/stable/c/ca2b8ae93a6da9839dc7f9eb9199b18aa03c3dae
- https://git.kernel.org/stable/c/cd24da0db9f75ca11eaf6060f0ccb90e2f3be3b0
Modified: 2024-12-24
CVE-2021-47320
In the Linux kernel, the following vulnerability has been resolved: nfs: fix acl memory leak of posix_acl_create() When looking into another nfs xfstests report, I found acl and default_acl in nfs3_proc_create() and nfs3_proc_mknod() error paths are possibly leaked. Fix them in advance.
- https://git.kernel.org/stable/c/0704f617040c397ae73c1f88f3956787ec5d6529
- https://git.kernel.org/stable/c/1fcb6fcd74a222d9ead54d405842fc763bb86262
- https://git.kernel.org/stable/c/2e3960f276b4574a9bb0dfa31a7497302f6363b2
- https://git.kernel.org/stable/c/4b515308ab875c7e8ada8e606fe0c64762da5ed4
- https://git.kernel.org/stable/c/687cf32865b2d6960214bce523f2afac58dd3cd2
- https://git.kernel.org/stable/c/8a2b308a54c5ec224fedc753617f99b29ffcd883
- https://git.kernel.org/stable/c/c8fc86e9df6a6a03f5a8e15a3b7a5c75fd05aa38
- https://git.kernel.org/stable/c/cef9d9acb7c80ed6bace894b6334557fd493863b
- https://git.kernel.org/stable/c/d0b32dc1409f7e65e4fcc34e236462268e69a357
- https://git.kernel.org/stable/c/0704f617040c397ae73c1f88f3956787ec5d6529
- https://git.kernel.org/stable/c/1fcb6fcd74a222d9ead54d405842fc763bb86262
- https://git.kernel.org/stable/c/2e3960f276b4574a9bb0dfa31a7497302f6363b2
- https://git.kernel.org/stable/c/4b515308ab875c7e8ada8e606fe0c64762da5ed4
- https://git.kernel.org/stable/c/687cf32865b2d6960214bce523f2afac58dd3cd2
- https://git.kernel.org/stable/c/8a2b308a54c5ec224fedc753617f99b29ffcd883
- https://git.kernel.org/stable/c/c8fc86e9df6a6a03f5a8e15a3b7a5c75fd05aa38
- https://git.kernel.org/stable/c/cef9d9acb7c80ed6bace894b6334557fd493863b
- https://git.kernel.org/stable/c/d0b32dc1409f7e65e4fcc34e236462268e69a357
Modified: 2024-12-26
CVE-2021-47321
In the Linux kernel, the following vulnerability has been resolved: watchdog: Fix possible use-after-free by calling del_timer_sync() This driver's remove path calls del_timer(). However, that function does not wait until the timer handler finishes. This means that the timer handler may still be running after the driver's remove function has finished, which would result in a use-after-free. Fix by calling del_timer_sync(), which makes sure the timer handler has finished, and unable to re-schedule itself.
- https://git.kernel.org/stable/c/1a053c4d716898a53c2e31c574a70ea0c37044a3
- https://git.kernel.org/stable/c/4c05dac488a660fe2925c047ecb119e7afaaeb1e
- https://git.kernel.org/stable/c/58606882ad8ec6c39e0f40344b922921ef94ab4d
- https://git.kernel.org/stable/c/66ba9cf929b1c4fabf545bd4c18f6f64e23e46e4
- https://git.kernel.org/stable/c/8bec568d7518b1504a602ed5376bb322e4dbb270
- https://git.kernel.org/stable/c/ca96b8ea5e74956071154bdb456778cc3027e79f
- https://git.kernel.org/stable/c/d0212f095ab56672f6f36aabc605bda205e1e0bf
- https://git.kernel.org/stable/c/db222f1477ad5692cd454709b714949807e5d111
- https://git.kernel.org/stable/c/ecd620e0fb1ff7f78fdb593379b2e6938c99707a
- https://git.kernel.org/stable/c/1a053c4d716898a53c2e31c574a70ea0c37044a3
- https://git.kernel.org/stable/c/4c05dac488a660fe2925c047ecb119e7afaaeb1e
- https://git.kernel.org/stable/c/58606882ad8ec6c39e0f40344b922921ef94ab4d
- https://git.kernel.org/stable/c/66ba9cf929b1c4fabf545bd4c18f6f64e23e46e4
- https://git.kernel.org/stable/c/8bec568d7518b1504a602ed5376bb322e4dbb270
- https://git.kernel.org/stable/c/ca96b8ea5e74956071154bdb456778cc3027e79f
- https://git.kernel.org/stable/c/d0212f095ab56672f6f36aabc605bda205e1e0bf
- https://git.kernel.org/stable/c/db222f1477ad5692cd454709b714949807e5d111
- https://git.kernel.org/stable/c/ecd620e0fb1ff7f78fdb593379b2e6938c99707a
Modified: 2025-05-12
CVE-2021-47322
In the Linux kernel, the following vulnerability has been resolved: NFSv4: Fix an Oops in pnfs_mark_request_commit() when doing O_DIRECT Fix an Oopsable condition in pnfs_mark_request_commit() when we're putting a set of writes on the commit list to reschedule them after a failed pNFS attempt.
- https://git.kernel.org/stable/c/3731d44bba8e0116b052b1b374476c5f6dd9a456
- https://git.kernel.org/stable/c/5c7ef8a3705542136a1e19b070e951f0730b2153
- https://git.kernel.org/stable/c/7aec9f862411906f8c27071ba65a1e110ad7d2fd
- https://git.kernel.org/stable/c/7c96a2ee45be41d5a167e6332d202086752c36bb
- https://git.kernel.org/stable/c/3731d44bba8e0116b052b1b374476c5f6dd9a456
- https://git.kernel.org/stable/c/5c7ef8a3705542136a1e19b070e951f0730b2153
- https://git.kernel.org/stable/c/7aec9f862411906f8c27071ba65a1e110ad7d2fd
- https://git.kernel.org/stable/c/7c96a2ee45be41d5a167e6332d202086752c36bb
Modified: 2025-04-02
CVE-2021-47323
In the Linux kernel, the following vulnerability has been resolved: watchdog: sc520_wdt: Fix possible use-after-free in wdt_turnoff() This module's remove path calls del_timer(). However, that function does not wait until the timer handler finishes. This means that the timer handler may still be running after the driver's remove function has finished, which would result in a use-after-free. Fix by calling del_timer_sync(), which makes sure the timer handler has finished, and unable to re-schedule itself.
- https://git.kernel.org/stable/c/0015581a79bbf8e521f85dddb7d3e4a66b9f51d4
- https://git.kernel.org/stable/c/2aef07017fae21c3d8acea9656b10e3b9c0f1e04
- https://git.kernel.org/stable/c/522e75ed63f67e815d4ec0deace67df22d9ce78e
- https://git.kernel.org/stable/c/7c56c5508dc20a6b133bc669fc34327a6711c24c
- https://git.kernel.org/stable/c/90b7c141132244e8e49a34a4c1e445cce33e07f4
- https://git.kernel.org/stable/c/a173e3b62cf6dd3c4a0a10c8a82eedfcae81a566
- https://git.kernel.org/stable/c/b3c41ea5bc34d8c7b19e230d80e0e555c6f5057d
- https://git.kernel.org/stable/c/b4565a8a2d6bffb05bfbec11399d261ec16fe373
- https://git.kernel.org/stable/c/f0feab82f6a0323f54d85e8b512a2be64f83648a
- https://git.kernel.org/stable/c/0015581a79bbf8e521f85dddb7d3e4a66b9f51d4
- https://git.kernel.org/stable/c/2aef07017fae21c3d8acea9656b10e3b9c0f1e04
- https://git.kernel.org/stable/c/522e75ed63f67e815d4ec0deace67df22d9ce78e
- https://git.kernel.org/stable/c/7c56c5508dc20a6b133bc669fc34327a6711c24c
- https://git.kernel.org/stable/c/90b7c141132244e8e49a34a4c1e445cce33e07f4
- https://git.kernel.org/stable/c/a173e3b62cf6dd3c4a0a10c8a82eedfcae81a566
- https://git.kernel.org/stable/c/b3c41ea5bc34d8c7b19e230d80e0e555c6f5057d
- https://git.kernel.org/stable/c/b4565a8a2d6bffb05bfbec11399d261ec16fe373
- https://git.kernel.org/stable/c/f0feab82f6a0323f54d85e8b512a2be64f83648a
Modified: 2025-04-02
CVE-2021-47324
In the Linux kernel, the following vulnerability has been resolved: watchdog: Fix possible use-after-free in wdt_startup() This module's remove path calls del_timer(). However, that function does not wait until the timer handler finishes. This means that the timer handler may still be running after the driver's remove function has finished, which would result in a use-after-free. Fix by calling del_timer_sync(), which makes sure the timer handler has finished, and unable to re-schedule itself.
- https://git.kernel.org/stable/c/0ac50a76cf3cd63db000648b3b19f3f98b8aaa76
- https://git.kernel.org/stable/c/146cc288fb80c662c9c35e7bc58325d1ac0a7875
- https://git.kernel.org/stable/c/63a3dc24bd053792f84cb4eef0168b1266202a02
- https://git.kernel.org/stable/c/862f2b5a7c38762ac9e369daefbf361a91aca685
- https://git.kernel.org/stable/c/8adbbe6c86bb13e14f8a19e036ae5f4f5661fd90
- https://git.kernel.org/stable/c/a397cb4576fc2fc802562418b3a50b8f67d60d31
- https://git.kernel.org/stable/c/b4ebf4a4692e84163a69444c70ad515de06e2259
- https://git.kernel.org/stable/c/c08a6b31e4917034f0ed0cb457c3bb209576f542
- https://git.kernel.org/stable/c/dc9403097be52d57a5c9c35efa9be79d166a78af
- https://git.kernel.org/stable/c/0ac50a76cf3cd63db000648b3b19f3f98b8aaa76
- https://git.kernel.org/stable/c/146cc288fb80c662c9c35e7bc58325d1ac0a7875
- https://git.kernel.org/stable/c/63a3dc24bd053792f84cb4eef0168b1266202a02
- https://git.kernel.org/stable/c/862f2b5a7c38762ac9e369daefbf361a91aca685
- https://git.kernel.org/stable/c/8adbbe6c86bb13e14f8a19e036ae5f4f5661fd90
- https://git.kernel.org/stable/c/a397cb4576fc2fc802562418b3a50b8f67d60d31
- https://git.kernel.org/stable/c/b4ebf4a4692e84163a69444c70ad515de06e2259
- https://git.kernel.org/stable/c/c08a6b31e4917034f0ed0cb457c3bb209576f542
- https://git.kernel.org/stable/c/dc9403097be52d57a5c9c35efa9be79d166a78af
Modified: 2025-01-13
CVE-2021-47325
In the Linux kernel, the following vulnerability has been resolved: iommu/arm-smmu: Fix arm_smmu_device refcount leak in address translation The reference counting issue happens in several exception handling paths of arm_smmu_iova_to_phys_hard(). When those error scenarios occur, the function forgets to decrease the refcount of "smmu" increased by arm_smmu_rpm_get(), causing a refcount leak. Fix this issue by jumping to "out" label when those error scenarios occur.
- https://git.kernel.org/stable/c/0f0c5ea09139777d90729d408b807021f2ea6492
- https://git.kernel.org/stable/c/43d1aaa1965f9b58035196dac49b1e1e6c9c25eb
- https://git.kernel.org/stable/c/5f9741a9a91f25c89e04b408cd61e3ab050ce24b
- https://git.kernel.org/stable/c/7c8f176d6a3fa18aa0f8875da6f7c672ed2a8554
- https://git.kernel.org/stable/c/b11220803ad14a2a880cc06d8e01fe2548cc85b0
- https://git.kernel.org/stable/c/0f0c5ea09139777d90729d408b807021f2ea6492
- https://git.kernel.org/stable/c/43d1aaa1965f9b58035196dac49b1e1e6c9c25eb
- https://git.kernel.org/stable/c/5f9741a9a91f25c89e04b408cd61e3ab050ce24b
- https://git.kernel.org/stable/c/7c8f176d6a3fa18aa0f8875da6f7c672ed2a8554
- https://git.kernel.org/stable/c/b11220803ad14a2a880cc06d8e01fe2548cc85b0
Modified: 2025-04-02
CVE-2021-47327
In the Linux kernel, the following vulnerability has been resolved: iommu/arm-smmu: Fix arm_smmu_device refcount leak when arm_smmu_rpm_get fails arm_smmu_rpm_get() invokes pm_runtime_get_sync(), which increases the refcount of the "smmu" even though the return value is less than 0. The reference counting issue happens in some error handling paths of arm_smmu_rpm_get() in its caller functions. When arm_smmu_rpm_get() fails, the caller functions forget to decrease the refcount of "smmu" increased by arm_smmu_rpm_get(), causing a refcount leak. Fix this issue by calling pm_runtime_resume_and_get() instead of pm_runtime_get_sync() in arm_smmu_rpm_get(), which can keep the refcount balanced in case of failure.
- https://git.kernel.org/stable/c/1adf30f198c26539a62d761e45af72cde570413d
- https://git.kernel.org/stable/c/3761ae0d0e549f2acdaf11f49df4ed06d256b20f
- https://git.kernel.org/stable/c/c4007596fbdabc29f858dc2e1990858a146b60b2
- https://git.kernel.org/stable/c/fbf4daa6f4105e01fbd3868006f65c163365c1e3
- https://git.kernel.org/stable/c/fe92c058199067ae90cf2a901ddf3c271893557a
- https://git.kernel.org/stable/c/1adf30f198c26539a62d761e45af72cde570413d
- https://git.kernel.org/stable/c/3761ae0d0e549f2acdaf11f49df4ed06d256b20f
- https://git.kernel.org/stable/c/c4007596fbdabc29f858dc2e1990858a146b60b2
- https://git.kernel.org/stable/c/fbf4daa6f4105e01fbd3868006f65c163365c1e3
- https://git.kernel.org/stable/c/fe92c058199067ae90cf2a901ddf3c271893557a
Modified: 2024-12-26
CVE-2021-47328
In the Linux kernel, the following vulnerability has been resolved: scsi: iscsi: Fix conn use after free during resets If we haven't done a unbind target call we can race where iscsi_conn_teardown wakes up the EH thread and then frees the conn while those threads are still accessing the conn ehwait. We can only do one TMF per session so this just moves the TMF fields from the conn to the session. We can then rely on the iscsi_session_teardown->iscsi_remove_session->__iscsi_unbind_session call to remove the target and it's devices, and know after that point there is no device or scsi-ml callout trying to access the session.
- https://git.kernel.org/stable/c/89812e7957ab0746eab66ed6fc49d52bb4dca250
- https://git.kernel.org/stable/c/bf20d85a88384574fabb3d53ad62a8af57e7ab11
- https://git.kernel.org/stable/c/d04958a348e560938410e04a12fb99da9c7e6a00
- https://git.kernel.org/stable/c/ec29d0ac29be366450a7faffbcf8cba3a6a3b506
- https://git.kernel.org/stable/c/f0a031f7c55ffd944fead1ddaf2aa94df9a158c1
- https://git.kernel.org/stable/c/fa9542b35ceb4202e8f8d65f440529a63524dca9
- https://git.kernel.org/stable/c/89812e7957ab0746eab66ed6fc49d52bb4dca250
- https://git.kernel.org/stable/c/bf20d85a88384574fabb3d53ad62a8af57e7ab11
- https://git.kernel.org/stable/c/d04958a348e560938410e04a12fb99da9c7e6a00
- https://git.kernel.org/stable/c/ec29d0ac29be366450a7faffbcf8cba3a6a3b506
- https://git.kernel.org/stable/c/f0a031f7c55ffd944fead1ddaf2aa94df9a158c1
- https://git.kernel.org/stable/c/fa9542b35ceb4202e8f8d65f440529a63524dca9
Modified: 2025-04-02
CVE-2021-47329
In the Linux kernel, the following vulnerability has been resolved: scsi: megaraid_sas: Fix resource leak in case of probe failure The driver doesn't clean up all the allocated resources properly when scsi_add_host(), megasas_start_aen() function fails during the PCI device probe. Clean up all those resources.
- https://git.kernel.org/stable/c/04b6b9ea80906e3b41ff120b45db31768947cf72
- https://git.kernel.org/stable/c/0680db6f41920b2c91c7df3cc9cd5968701a6f74
- https://git.kernel.org/stable/c/0c6226601c3e191a44a57d8f9f814b7e5c308959
- https://git.kernel.org/stable/c/b5438f48fdd8e1c3f130d32637511efd32038152
- https://git.kernel.org/stable/c/e623f79691c5104317669ab36ec316a90c05062f
- https://git.kernel.org/stable/c/04b6b9ea80906e3b41ff120b45db31768947cf72
- https://git.kernel.org/stable/c/0680db6f41920b2c91c7df3cc9cd5968701a6f74
- https://git.kernel.org/stable/c/0c6226601c3e191a44a57d8f9f814b7e5c308959
- https://git.kernel.org/stable/c/b5438f48fdd8e1c3f130d32637511efd32038152
- https://git.kernel.org/stable/c/e623f79691c5104317669ab36ec316a90c05062f
Modified: 2024-12-24
CVE-2021-47330
In the Linux kernel, the following vulnerability has been resolved: tty: serial: 8250: serial_cs: Fix a memory leak in error handling path In the probe function, if the final 'serial_config()' fails, 'info' is leaking. Add a resource handling path to free this memory.
- https://git.kernel.org/stable/c/331f5923fce4f45b8170ccf06c529e8eb28f37bc
- https://git.kernel.org/stable/c/34f4590f5ec9859ea9136249f528173d150bd584
- https://git.kernel.org/stable/c/7a80f71601af015856a0aeb1e3c294037ac3dd32
- https://git.kernel.org/stable/c/b2ef1f5de40342de44fc5355321595f91774dab5
- https://git.kernel.org/stable/c/b5a2799cd62ed30c81b22c23028d9ee374e2138c
- https://git.kernel.org/stable/c/c39cf4df19acf0133fa284a8cd83fad42cd13cc2
- https://git.kernel.org/stable/c/cddee5c287e26f6b2ba5c0ffdfc3a846f2f10461
- https://git.kernel.org/stable/c/ee16bed959862a6de2913f71a04cb563d7237b67
- https://git.kernel.org/stable/c/fad92b11047a748c996ebd6cfb164a63814eeb2e
- https://git.kernel.org/stable/c/331f5923fce4f45b8170ccf06c529e8eb28f37bc
- https://git.kernel.org/stable/c/34f4590f5ec9859ea9136249f528173d150bd584
- https://git.kernel.org/stable/c/7a80f71601af015856a0aeb1e3c294037ac3dd32
- https://git.kernel.org/stable/c/b2ef1f5de40342de44fc5355321595f91774dab5
- https://git.kernel.org/stable/c/b5a2799cd62ed30c81b22c23028d9ee374e2138c
- https://git.kernel.org/stable/c/c39cf4df19acf0133fa284a8cd83fad42cd13cc2
- https://git.kernel.org/stable/c/cddee5c287e26f6b2ba5c0ffdfc3a846f2f10461
- https://git.kernel.org/stable/c/ee16bed959862a6de2913f71a04cb563d7237b67
- https://git.kernel.org/stable/c/fad92b11047a748c996ebd6cfb164a63814eeb2e
Modified: 2024-12-24
CVE-2021-47331
In the Linux kernel, the following vulnerability has been resolved: usb: common: usb-conn-gpio: fix NULL pointer dereference of charger When power on system with OTG cable, IDDIG's interrupt arises before the charger registration, it will cause a NULL pointer dereference, fix the issue by registering the power supply before requesting IDDIG/VBUS irq.
- https://git.kernel.org/stable/c/1a133a0996d6b4c83509d570ed4edcba34c44f25
- https://git.kernel.org/stable/c/436906fd248e018403bcda61a9311d9af02912f1
- https://git.kernel.org/stable/c/880287910b1892ed2cb38977893b947382a09d21
- https://git.kernel.org/stable/c/8e8d910e9a3a7fba86140aff4924c30955ab228b
- https://git.kernel.org/stable/c/1a133a0996d6b4c83509d570ed4edcba34c44f25
- https://git.kernel.org/stable/c/436906fd248e018403bcda61a9311d9af02912f1
- https://git.kernel.org/stable/c/880287910b1892ed2cb38977893b947382a09d21
- https://git.kernel.org/stable/c/8e8d910e9a3a7fba86140aff4924c30955ab228b
Modified: 2024-12-24
CVE-2021-47332
In the Linux kernel, the following vulnerability has been resolved: ALSA: usx2y: Don't call free_pages_exact() with NULL address Unlike some other functions, we can't pass NULL pointer to free_pages_exact(). Add a proper NULL check for avoiding possible Oops.
- https://git.kernel.org/stable/c/7d7f30cf182e55023fa8fde4c084b2d37c6be69d
- https://git.kernel.org/stable/c/82e5ee742fdd8874fe996181b87fafe1eb5f1196
- https://git.kernel.org/stable/c/88262229b778f4f7a896da828d966f94dcb35d19
- https://git.kernel.org/stable/c/bee295f5e03510252d18b25cc1d26230256eb87a
- https://git.kernel.org/stable/c/cae0cf651adccee2c3f376e78f30fbd788d0829f
- https://git.kernel.org/stable/c/7d7f30cf182e55023fa8fde4c084b2d37c6be69d
- https://git.kernel.org/stable/c/82e5ee742fdd8874fe996181b87fafe1eb5f1196
- https://git.kernel.org/stable/c/88262229b778f4f7a896da828d966f94dcb35d19
- https://git.kernel.org/stable/c/bee295f5e03510252d18b25cc1d26230256eb87a
- https://git.kernel.org/stable/c/cae0cf651adccee2c3f376e78f30fbd788d0829f
Modified: 2025-04-02
CVE-2021-47333
In the Linux kernel, the following vulnerability has been resolved: misc: alcor_pci: fix null-ptr-deref when there is no PCI bridge There is an issue with the ASPM(optional) capability checking function. A device might be attached to root complex directly, in this case, bus->self(bridge) will be NULL, thus priv->parent_pdev is NULL. Since alcor_pci_init_check_aspm(priv->parent_pdev) checks the PCI link's ASPM capability and populate parent_cap_off, which will be used later by alcor_pci_aspm_ctrl() to dynamically turn on/off device, what we can do here is to avoid checking the capability if we are on the root complex. This will make pdev_cap_off 0 and alcor_pci_aspm_ctrl() will simply return when bring called, effectively disable ASPM for the device. [ 1.246492] BUG: kernel NULL pointer dereference, address: 00000000000000c0 [ 1.248731] RIP: 0010:pci_read_config_byte+0x5/0x40 [ 1.253998] Call Trace: [ 1.254131] ? alcor_pci_find_cap_offset.isra.0+0x3a/0x100 [alcor_pci] [ 1.254476] alcor_pci_probe+0x169/0x2d5 [alcor_pci]
- https://git.kernel.org/stable/c/09d154990ca82d14aed2b72796f6c8845e2e605d
- https://git.kernel.org/stable/c/3ce3e45cc333da707d4d6eb433574b990bcc26f5
- https://git.kernel.org/stable/c/58f69684ba03e5b0e0a3ae844a845280c0f06309
- https://git.kernel.org/stable/c/717cf5ae52322ddbdf3ac2c584b34c5970b0d174
- https://git.kernel.org/stable/c/d2639ffdcad463b358b6bef8645ff81715daffcb
- https://git.kernel.org/stable/c/09d154990ca82d14aed2b72796f6c8845e2e605d
- https://git.kernel.org/stable/c/3ce3e45cc333da707d4d6eb433574b990bcc26f5
- https://git.kernel.org/stable/c/58f69684ba03e5b0e0a3ae844a845280c0f06309
- https://git.kernel.org/stable/c/717cf5ae52322ddbdf3ac2c584b34c5970b0d174
- https://git.kernel.org/stable/c/d2639ffdcad463b358b6bef8645ff81715daffcb
Modified: 2024-12-26
CVE-2021-47334
In the Linux kernel, the following vulnerability has been resolved: misc/libmasm/module: Fix two use after free in ibmasm_init_one In ibmasm_init_one, it calls ibmasm_init_remote_input_dev(). Inside ibmasm_init_remote_input_dev, mouse_dev and keybd_dev are allocated by input_allocate_device(), and assigned to sp->remote.mouse_dev and sp->remote.keybd_dev respectively. In the err_free_devices error branch of ibmasm_init_one, mouse_dev and keybd_dev are freed by input_free_device(), and return error. Then the execution runs into error_send_message error branch of ibmasm_init_one, where ibmasm_free_remote_input_dev(sp) is called to unregister the freed sp->remote.mouse_dev and sp->remote.keybd_dev. My patch add a "error_init_remote" label to handle the error of ibmasm_init_remote_input_dev(), to avoid the uaf bugs.
- https://git.kernel.org/stable/c/1512e7dc5eb08b7d92a12e2bfcd9cb8c4a1ec069
- https://git.kernel.org/stable/c/29ba8e2ba89ee2862a26d91204dd5fe77ceee25a
- https://git.kernel.org/stable/c/38660031e80eaa6cc9370b031c180612f414b00d
- https://git.kernel.org/stable/c/481a76d4749ee3a27f902ba213fdcbb4bb39720e
- https://git.kernel.org/stable/c/5b06ca113bf197aab2ab61288f42506e0049fbab
- https://git.kernel.org/stable/c/7272b591c4cb9327c43443f67b8fbae7657dd9ae
- https://git.kernel.org/stable/c/a7268e8a227d5a4f0bd1584f556246b0224ab274
- https://git.kernel.org/stable/c/b9c87ce3bc6331f82811a8cf8e930423c22523a3
- https://git.kernel.org/stable/c/ef1067d2baa847d53c9988510d99fb494de4d12c
- https://git.kernel.org/stable/c/1512e7dc5eb08b7d92a12e2bfcd9cb8c4a1ec069
- https://git.kernel.org/stable/c/29ba8e2ba89ee2862a26d91204dd5fe77ceee25a
- https://git.kernel.org/stable/c/38660031e80eaa6cc9370b031c180612f414b00d
- https://git.kernel.org/stable/c/481a76d4749ee3a27f902ba213fdcbb4bb39720e
- https://git.kernel.org/stable/c/5b06ca113bf197aab2ab61288f42506e0049fbab
- https://git.kernel.org/stable/c/7272b591c4cb9327c43443f67b8fbae7657dd9ae
- https://git.kernel.org/stable/c/a7268e8a227d5a4f0bd1584f556246b0224ab274
- https://git.kernel.org/stable/c/b9c87ce3bc6331f82811a8cf8e930423c22523a3
- https://git.kernel.org/stable/c/ef1067d2baa847d53c9988510d99fb494de4d12c
Modified: 2024-12-24
CVE-2021-47337
In the Linux kernel, the following vulnerability has been resolved: scsi: core: Fix bad pointer dereference when ehandler kthread is invalid Commit 66a834d09293 ("scsi: core: Fix error handling of scsi_host_alloc()") changed the allocation logic to call put_device() to perform host cleanup with the assumption that IDA removal and stopping the kthread would properly be performed in scsi_host_dev_release(). However, in the unlikely case that the error handler thread fails to spawn, shost->ehandler is set to ERR_PTR(-ENOMEM). The error handler cleanup code in scsi_host_dev_release() will call kthread_stop() if shost->ehandler != NULL which will always be the case whether the kthread was successfully spawned or not. In the case that it failed to spawn this has the nasty side effect of trying to dereference an invalid pointer when kthread_stop() is called. The following splat provides an example of this behavior in the wild: scsi host11: error handler thread failed to spawn, error = -4 Kernel attempted to read user page (10c) - exploit attempt? (uid: 0) BUG: Kernel NULL pointer dereference on read at 0x0000010c Faulting instruction address: 0xc00000000818e9a8 Oops: Kernel access of bad area, sig: 11 [#1] LE PAGE_SIZE=64K MMU=Hash SMP NR_CPUS=2048 NUMA pSeries Modules linked in: ibmvscsi(+) scsi_transport_srp dm_multipath dm_mirror dm_region hash dm_log dm_mod fuse overlay squashfs loop CPU: 12 PID: 274 Comm: systemd-udevd Not tainted 5.13.0-rc7 #1 NIP: c00000000818e9a8 LR: c0000000089846e8 CTR: 0000000000007ee8 REGS: c000000037d12ea0 TRAP: 0300 Not tainted (5.13.0-rc7) MSR: 800000000280b033 <SF,VEC,VSX,EE,FP,ME,IR,DR,RI,LE> CR: 28228228 XER: 20040001 CFAR: c0000000089846e4 DAR: 000000000000010c DSISR: 40000000 IRQMASK: 0 GPR00: c0000000089846e8 c000000037d13140 c000000009cc1100 fffffffffffffffc GPR04: 0000000000000001 0000000000000000 0000000000000000 c000000037dc0000 GPR08: 0000000000000000 c000000037dc0000 0000000000000001 00000000fffff7ff GPR12: 0000000000008000 c00000000a049000 c000000037d13d00 000000011134d5a0 GPR16: 0000000000001740 c0080000190d0000 c0080000190d1740 c000000009129288 GPR20: c000000037d13bc0 0000000000000001 c000000037d13bc0 c0080000190b7898 GPR24: c0080000190b7708 0000000000000000 c000000033bb2c48 0000000000000000 GPR28: c000000046b28280 0000000000000000 000000000000010c fffffffffffffffc NIP [c00000000818e9a8] kthread_stop+0x38/0x230 LR [c0000000089846e8] scsi_host_dev_release+0x98/0x160 Call Trace: [c000000033bb2c48] 0xc000000033bb2c48 (unreliable) [c0000000089846e8] scsi_host_dev_release+0x98/0x160 [c00000000891e960] device_release+0x60/0x100 [c0000000087e55c4] kobject_release+0x84/0x210 [c00000000891ec78] put_device+0x28/0x40 [c000000008984ea4] scsi_host_alloc+0x314/0x430 [c0080000190b38bc] ibmvscsi_probe+0x54/0xad0 [ibmvscsi] [c000000008110104] vio_bus_probe+0xa4/0x4b0 [c00000000892a860] really_probe+0x140/0x680 [c00000000892aefc] driver_probe_device+0x15c/0x200 [c00000000892b63c] device_driver_attach+0xcc/0xe0 [c00000000892b740] __driver_attach+0xf0/0x200 [c000000008926f28] bus_for_each_dev+0xa8/0x130 [c000000008929ce4] driver_attach+0x34/0x50 [c000000008928fc0] bus_add_driver+0x1b0/0x300 [c00000000892c798] driver_register+0x98/0x1a0 [c00000000810eb60] __vio_register_driver+0x80/0xe0 [c0080000190b4a30] ibmvscsi_module_init+0x9c/0xdc [ibmvscsi] [c0000000080121d0] do_one_initcall+0x60/0x2d0 [c000000008261abc] do_init_module+0x7c/0x320 [c000000008265700] load_module+0x2350/0x25b0 [c000000008265cb4] __do_sys_finit_module+0xd4/0x160 [c000000008031110] system_call_exception+0x150/0x2d0 [c00000000800d35c] system_call_common+0xec/0x278 Fix this be nulling shost->ehandler when the kthread fails to spawn.
- https://git.kernel.org/stable/c/887bfae2732b5b02a86a859fd239d34f7ff93c05
- https://git.kernel.org/stable/c/8e4212ecf0713dd57d0e3209a66201da582149b1
- https://git.kernel.org/stable/c/93aa71ad7379900e61c8adff6a710a4c18c7c99b
- https://git.kernel.org/stable/c/c1671d2d2ef8a84837eea1b4d99ca0c6a66fb691
- https://git.kernel.org/stable/c/d2f0b960d07e52bb664471b4de0ed8b08c636b3a
- https://git.kernel.org/stable/c/e1bd3fac2baa3d5c04375980c1d5263a3335af92
- https://git.kernel.org/stable/c/ea518b70ed5e4598c8d706f37fc16f7b06e440bd
- https://git.kernel.org/stable/c/f3d0a109240c9bed5c60d819014786be3a2fe515
- https://git.kernel.org/stable/c/887bfae2732b5b02a86a859fd239d34f7ff93c05
- https://git.kernel.org/stable/c/8e4212ecf0713dd57d0e3209a66201da582149b1
- https://git.kernel.org/stable/c/93aa71ad7379900e61c8adff6a710a4c18c7c99b
- https://git.kernel.org/stable/c/c1671d2d2ef8a84837eea1b4d99ca0c6a66fb691
- https://git.kernel.org/stable/c/d2f0b960d07e52bb664471b4de0ed8b08c636b3a
- https://git.kernel.org/stable/c/e1bd3fac2baa3d5c04375980c1d5263a3335af92
- https://git.kernel.org/stable/c/ea518b70ed5e4598c8d706f37fc16f7b06e440bd
- https://git.kernel.org/stable/c/f3d0a109240c9bed5c60d819014786be3a2fe515
Modified: 2024-12-24
CVE-2021-47338
In the Linux kernel, the following vulnerability has been resolved: fbmem: Do not delete the mode that is still in use The execution of fb_delete_videomode() is not based on the result of the previous fbcon_mode_deleted(). As a result, the mode is directly deleted, regardless of whether it is still in use, which may cause UAF. ================================================================== BUG: KASAN: use-after-free in fb_mode_is_equal+0x36e/0x5e0 \ drivers/video/fbdev/core/modedb.c:924 Read of size 4 at addr ffff88807e0ddb1c by task syz-executor.0/18962 CPU: 2 PID: 18962 Comm: syz-executor.0 Not tainted 5.10.45-rc1+ #3 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS ... Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x137/0x1be lib/dump_stack.c:118 print_address_description+0x6c/0x640 mm/kasan/report.c:385 __kasan_report mm/kasan/report.c:545 [inline] kasan_report+0x13d/0x1e0 mm/kasan/report.c:562 fb_mode_is_equal+0x36e/0x5e0 drivers/video/fbdev/core/modedb.c:924 fbcon_mode_deleted+0x16a/0x220 drivers/video/fbdev/core/fbcon.c:2746 fb_set_var+0x1e1/0xdb0 drivers/video/fbdev/core/fbmem.c:975 do_fb_ioctl+0x4d9/0x6e0 drivers/video/fbdev/core/fbmem.c:1108 vfs_ioctl fs/ioctl.c:48 [inline] __do_sys_ioctl fs/ioctl.c:753 [inline] __se_sys_ioctl+0xfb/0x170 fs/ioctl.c:739 do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 entry_SYSCALL_64_after_hwframe+0x44/0xa9 Freed by task 18960: kasan_save_stack mm/kasan/common.c:48 [inline] kasan_set_track+0x3d/0x70 mm/kasan/common.c:56 kasan_set_free_info+0x17/0x30 mm/kasan/generic.c:355 __kasan_slab_free+0x108/0x140 mm/kasan/common.c:422 slab_free_hook mm/slub.c:1541 [inline] slab_free_freelist_hook+0xd6/0x1a0 mm/slub.c:1574 slab_free mm/slub.c:3139 [inline] kfree+0xca/0x3d0 mm/slub.c:4121 fb_delete_videomode+0x56a/0x820 drivers/video/fbdev/core/modedb.c:1104 fb_set_var+0x1f3/0xdb0 drivers/video/fbdev/core/fbmem.c:978 do_fb_ioctl+0x4d9/0x6e0 drivers/video/fbdev/core/fbmem.c:1108 vfs_ioctl fs/ioctl.c:48 [inline] __do_sys_ioctl fs/ioctl.c:753 [inline] __se_sys_ioctl+0xfb/0x170 fs/ioctl.c:739 do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 entry_SYSCALL_64_after_hwframe+0x44/0xa9
- https://git.kernel.org/stable/c/087bff9acd2ec6db3f61aceb3224bde90fe0f7f8
- https://git.kernel.org/stable/c/0af778269a522c988ef0b4188556aba97fb420cc
- https://git.kernel.org/stable/c/359311b85ebec7c07c3a08ae2f3def946cad33fa
- https://git.kernel.org/stable/c/d6e76469157d8f240e5dec6f8411aa8d306b1126
- https://git.kernel.org/stable/c/f193509afc7ff37a46862610c93b896044d5b693
- https://git.kernel.org/stable/c/087bff9acd2ec6db3f61aceb3224bde90fe0f7f8
- https://git.kernel.org/stable/c/0af778269a522c988ef0b4188556aba97fb420cc
- https://git.kernel.org/stable/c/359311b85ebec7c07c3a08ae2f3def946cad33fa
- https://git.kernel.org/stable/c/d6e76469157d8f240e5dec6f8411aa8d306b1126
- https://git.kernel.org/stable/c/f193509afc7ff37a46862610c93b896044d5b693
Modified: 2025-01-14
CVE-2021-47341
In the Linux kernel, the following vulnerability has been resolved: KVM: mmio: Fix use-after-free Read in kvm_vm_ioctl_unregister_coalesced_mmio BUG: KASAN: use-after-free in kvm_vm_ioctl_unregister_coalesced_mmio+0x7c/0x1ec arch/arm64/kvm/../../../virt/kvm/coalesced_mmio.c:183 Read of size 8 at addr ffff0000c03a2500 by task syz-executor083/4269 CPU: 5 PID: 4269 Comm: syz-executor083 Not tainted 5.10.0 #7 Hardware name: linux,dummy-virt (DT) Call trace: dump_backtrace+0x0/0x2d0 arch/arm64/kernel/stacktrace.c:132 show_stack+0x28/0x34 arch/arm64/kernel/stacktrace.c:196 __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x110/0x164 lib/dump_stack.c:118 print_address_description+0x78/0x5c8 mm/kasan/report.c:385 __kasan_report mm/kasan/report.c:545 [inline] kasan_report+0x148/0x1e4 mm/kasan/report.c:562 check_memory_region_inline mm/kasan/generic.c:183 [inline] __asan_load8+0xb4/0xbc mm/kasan/generic.c:252 kvm_vm_ioctl_unregister_coalesced_mmio+0x7c/0x1ec arch/arm64/kvm/../../../virt/kvm/coalesced_mmio.c:183 kvm_vm_ioctl+0xe30/0x14c4 arch/arm64/kvm/../../../virt/kvm/kvm_main.c:3755 vfs_ioctl fs/ioctl.c:48 [inline] __do_sys_ioctl fs/ioctl.c:753 [inline] __se_sys_ioctl fs/ioctl.c:739 [inline] __arm64_sys_ioctl+0xf88/0x131c fs/ioctl.c:739 __invoke_syscall arch/arm64/kernel/syscall.c:36 [inline] invoke_syscall arch/arm64/kernel/syscall.c:48 [inline] el0_svc_common arch/arm64/kernel/syscall.c:158 [inline] do_el0_svc+0x120/0x290 arch/arm64/kernel/syscall.c:220 el0_svc+0x1c/0x28 arch/arm64/kernel/entry-common.c:367 el0_sync_handler+0x98/0x170 arch/arm64/kernel/entry-common.c:383 el0_sync+0x140/0x180 arch/arm64/kernel/entry.S:670 Allocated by task 4269: stack_trace_save+0x80/0xb8 kernel/stacktrace.c:121 kasan_save_stack mm/kasan/common.c:48 [inline] kasan_set_track mm/kasan/common.c:56 [inline] __kasan_kmalloc+0xdc/0x120 mm/kasan/common.c:461 kasan_kmalloc+0xc/0x14 mm/kasan/common.c:475 kmem_cache_alloc_trace include/linux/slab.h:450 [inline] kmalloc include/linux/slab.h:552 [inline] kzalloc include/linux/slab.h:664 [inline] kvm_vm_ioctl_register_coalesced_mmio+0x78/0x1cc arch/arm64/kvm/../../../virt/kvm/coalesced_mmio.c:146 kvm_vm_ioctl+0x7e8/0x14c4 arch/arm64/kvm/../../../virt/kvm/kvm_main.c:3746 vfs_ioctl fs/ioctl.c:48 [inline] __do_sys_ioctl fs/ioctl.c:753 [inline] __se_sys_ioctl fs/ioctl.c:739 [inline] __arm64_sys_ioctl+0xf88/0x131c fs/ioctl.c:739 __invoke_syscall arch/arm64/kernel/syscall.c:36 [inline] invoke_syscall arch/arm64/kernel/syscall.c:48 [inline] el0_svc_common arch/arm64/kernel/syscall.c:158 [inline] do_el0_svc+0x120/0x290 arch/arm64/kernel/syscall.c:220 el0_svc+0x1c/0x28 arch/arm64/kernel/entry-common.c:367 el0_sync_handler+0x98/0x170 arch/arm64/kernel/entry-common.c:383 el0_sync+0x140/0x180 arch/arm64/kernel/entry.S:670 Freed by task 4269: stack_trace_save+0x80/0xb8 kernel/stacktrace.c:121 kasan_save_stack mm/kasan/common.c:48 [inline] kasan_set_track+0x38/0x6c mm/kasan/common.c:56 kasan_set_free_info+0x20/0x40 mm/kasan/generic.c:355 __kasan_slab_free+0x124/0x150 mm/kasan/common.c:422 kasan_slab_free+0x10/0x1c mm/kasan/common.c:431 slab_free_hook mm/slub.c:1544 [inline] slab_free_freelist_hook mm/slub.c:1577 [inline] slab_free mm/slub.c:3142 [inline] kfree+0x104/0x38c mm/slub.c:4124 coalesced_mmio_destructor+0x94/0xa4 arch/arm64/kvm/../../../virt/kvm/coalesced_mmio.c:102 kvm_iodevice_destructor include/kvm/iodev.h:61 [inline] kvm_io_bus_unregister_dev+0x248/0x280 arch/arm64/kvm/../../../virt/kvm/kvm_main.c:4374 kvm_vm_ioctl_unregister_coalesced_mmio+0x158/0x1ec arch/arm64/kvm/../../../virt/kvm/coalesced_mmio.c:186 kvm_vm_ioctl+0xe30/0x14c4 arch/arm64/kvm/../../../virt/kvm/kvm_main.c:3755 vfs_ioctl fs/ioctl.c:48 [inline] __do_sys_ioctl fs/ioctl.c:753 [inline] __se_sys_ioctl fs/ioctl.c:739 [inline] __arm64_sys_ioctl+0xf88/0x131c fs/ioctl.c:739 __invoke_syscall arch/arm64/kernel/syscall.c:36 [inline] invoke_syscall arch/arm64/kernel/sys ---truncated---
- https://git.kernel.org/stable/c/069d44a24c0ff8f85adf49233aae7a8ca16f5c7e
- https://git.kernel.org/stable/c/23fa2e46a5556f787ce2ea1a315d3ab93cced204
- https://git.kernel.org/stable/c/679837dc0abaa2c6e2a7bcd86483e05eee1d5066
- https://git.kernel.org/stable/c/8d7c539316d652d217e5e82b89ee204c812a7061
- https://git.kernel.org/stable/c/f2ff9d03432fcb160e9f7d4be26174d89de2779a
- https://git.kernel.org/stable/c/069d44a24c0ff8f85adf49233aae7a8ca16f5c7e
- https://git.kernel.org/stable/c/23fa2e46a5556f787ce2ea1a315d3ab93cced204
- https://git.kernel.org/stable/c/679837dc0abaa2c6e2a7bcd86483e05eee1d5066
- https://git.kernel.org/stable/c/8d7c539316d652d217e5e82b89ee204c812a7061
- https://git.kernel.org/stable/c/f2ff9d03432fcb160e9f7d4be26174d89de2779a
Package kernel-image-std-def updated to version 5.4.134-alt1 for branch p9 in task 279874.
Closed vulnerabilities
Modified: 2024-09-13
BDU:2021-03848
Уязвимость компонента fs/seq_file.c ядра операционных систем Linux, позволяющая нарушителю повысить свои привилегии
Modified: 2026-01-20
BDU:2021-04848
Уязвимость драйвера drivers/char/virtio_console.c ядра операционной системы Linux, позволяющая нарушителю вызвать повреждение стека
Modified: 2025-01-29
BDU:2022-05676
Уязвимость функции cgroup1_parse_param компонента kernel/cgroup/cgroup-v1.c ядра операционной системы Linux, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
Modified: 2025-06-25
BDU:2025-07308
Уязвимость функции wdt_startup() модуля drivers/watchdog/sc520_wdt.c поддержки сторожевого таймера ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
Modified: 2025-06-25
BDU:2025-07310
Уязвимость функции wdt_startup() модуля drivers/watchdog/sbc60xxwdt.c поддержки сторожевого таймера ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2025-07326
Уязвимость функции lpc18xx_wdt_remove() модуля drivers/watchdog/lpc18xx_wdt.c поддержки сторожевого таймера ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2025-07327
Уязвимость функции iscsi_prep_bidi_ahs() модуля drivers/scsi/libiscsi.c - драйвера поддержки устройств SCSI ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2025-07328
Уязвимость функции ibmasm_init_one() модуля drivers/misc/ibmasm/module.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2025-07329
Уязвимость функции fb_set_var() модуля drivers/video/fbdev/core/fbmem.c - драйвера поддержки устройств кадрового буфера ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2025-07330
Уязвимость функции kvm_vm_ioctl_unregister_coalesced_mmio() модуля virt/kvm/coalesced_mmio.c подсистемы виртуализации Kernel-based Virtual Machine (KVM) ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2025-07340
Уязвимость функции arm_smmu_rpm_get() модуля drivers/iommu/arm-smmu.c - драйвера поддержки IOMMU ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2025-07351
Уязвимость функции megasas_probe_one() модуля drivers/scsi/megaraid/megaraid_sas_base.c - драйвера поддержки устройств SCSI ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2025-07392
Уязвимость функции fsl_ifc_ctrl_remove() модуля drivers/memory/fsl_ifc.c ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность и доступность защищаемой информации
BDU:2025-07394
Уязвимость функции virtblk_freeze() модуля drivers/block/virtio_blk.c - драйвера поддержки блочных устройств ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность и доступность защищаемой информации
BDU:2025-07395
Уязвимость функции nfs3_proc_create() модуля fs/nfs/nfs3proc.c поддержки файловой системы ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность и доступность защищаемой информации
BDU:2025-07396
Уязвимость функции arm_smmu_iova_to_phys_hard() модуля drivers/iommu/arm-smmu.c - драйвера поддержки IOMMU ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность и доступность защищаемой информации
BDU:2025-07397
Уязвимость функции serial_resume() модуля drivers/tty/serial/8250/serial_cs.c ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность и доступность защищаемой информации
BDU:2025-07399
Уязвимость функции usb_stream_free() модуля sound/usb/usx2y/usb_stream.c поддержки звуковых устройств USB ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2025-07401
Уязвимость функции alcor_pci_init_check_aspm() модуля drivers/misc/cardreader/alcor_pci.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2025-07402
Уязвимость функции scsi_host_alloc() модуля drivers/scsi/hosts.c - драйвера поддержки устройств SCSI ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2025-14325
Уязвимость функции fsl_ifc_ctrl_probe() модуля drivers/memory/fsl_ifc.c драйвера контроллера памяти ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность и доступность защищаемой информации
Modified: 2024-11-21
CVE-2021-33909
fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.
- http://packetstormsecurity.com/files/163621/Sequoia-A-Deep-Root-In-Linuxs-Filesystem-Layer.html
- http://packetstormsecurity.com/files/163671/Kernel-Live-Patch-Security-Notice-LSN-0079-1.html
- http://packetstormsecurity.com/files/164155/Kernel-Live-Patch-Security-Notice-LSN-0081-1.html
- http://packetstormsecurity.com/files/165477/Kernel-Live-Patch-Security-Notice-LSN-0083-1.html
- http://www.openwall.com/lists/oss-security/2021/07/22/7
- http://www.openwall.com/lists/oss-security/2021/08/25/10
- http://www.openwall.com/lists/oss-security/2021/09/17/2
- http://www.openwall.com/lists/oss-security/2021/09/17/4
- http://www.openwall.com/lists/oss-security/2021/09/21/1
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.4
- https://github.com/torvalds/linux/commit/8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b
- https://lists.debian.org/debian-lts-announce/2021/07/msg00014.html
- https://lists.debian.org/debian-lts-announce/2021/07/msg00015.html
- https://lists.debian.org/debian-lts-announce/2021/07/msg00016.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z4UHHIGISO3FVRF4CQNJS4IKA25ATSFU/
- https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0015
- https://security.netapp.com/advisory/ntap-20210819-0004/
- https://www.debian.org/security/2021/dsa-4941
- https://www.openwall.com/lists/oss-security/2021/07/20/1
- https://www.oracle.com/security-alerts/cpujan2022.html
- http://packetstormsecurity.com/files/163621/Sequoia-A-Deep-Root-In-Linuxs-Filesystem-Layer.html
- http://packetstormsecurity.com/files/163671/Kernel-Live-Patch-Security-Notice-LSN-0079-1.html
- http://packetstormsecurity.com/files/164155/Kernel-Live-Patch-Security-Notice-LSN-0081-1.html
- http://packetstormsecurity.com/files/165477/Kernel-Live-Patch-Security-Notice-LSN-0083-1.html
- http://www.openwall.com/lists/oss-security/2021/07/22/7
- http://www.openwall.com/lists/oss-security/2021/08/25/10
- http://www.openwall.com/lists/oss-security/2021/09/17/2
- http://www.openwall.com/lists/oss-security/2021/09/17/4
- http://www.openwall.com/lists/oss-security/2021/09/21/1
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.4
- https://github.com/torvalds/linux/commit/8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b
- https://lists.debian.org/debian-lts-announce/2021/07/msg00014.html
- https://lists.debian.org/debian-lts-announce/2021/07/msg00015.html
- https://lists.debian.org/debian-lts-announce/2021/07/msg00016.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z4UHHIGISO3FVRF4CQNJS4IKA25ATSFU/
- https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0015
- https://security.netapp.com/advisory/ntap-20210819-0004/
- https://www.debian.org/security/2021/dsa-4941
- https://www.openwall.com/lists/oss-security/2021/07/20/1
- https://www.oracle.com/security-alerts/cpujan2022.html
Modified: 2025-05-05
CVE-2021-38160
In drivers/char/virtio_console.c in the Linux kernel before 5.13.4, data corruption or loss can be triggered by an untrusted device that supplies a buf->len value exceeding the buffer size. NOTE: the vendor indicates that the cited data corruption is not a vulnerability in any existing use case; the length validation was added solely for robustness in the face of anomalous host OS behavior
- https://access.redhat.com/security/cve/cve-2021-38160
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.4
- https://github.com/torvalds/linux/commit/d00d8da5869a2608e97cfede094dfc5e11462a46
- https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html
- https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html
- https://security.netapp.com/advisory/ntap-20210902-0010/
- https://www.debian.org/security/2021/dsa-4978
- https://access.redhat.com/security/cve/cve-2021-38160
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.4
- https://github.com/torvalds/linux/commit/d00d8da5869a2608e97cfede094dfc5e11462a46
- https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html
- https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html
- https://security.netapp.com/advisory/ntap-20210902-0010/
- https://www.debian.org/security/2021/dsa-4978
Modified: 2024-11-21
CVE-2021-4154
A use-after-free flaw was found in cgroup1_parse_param in kernel/cgroup/cgroup-v1.c in the Linux kernel's cgroup v1 parser. A local attacker with a user privilege could cause a privilege escalation by exploiting the fsconfig syscall parameter leading to a container breakout and a denial of service on the system.
- https://bugzilla.redhat.com/show_bug.cgi?id=2034514
- https://cloud.google.com/anthos/clusters/docs/security-bulletins#gcp-2022-002
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3b0462726e7ef281c35a7a4ae33e93ee2bc9975b
- https://security.netapp.com/advisory/ntap-20220225-0004/
- https://bugzilla.redhat.com/show_bug.cgi?id=2034514
- https://cloud.google.com/anthos/clusters/docs/security-bulletins#gcp-2022-002
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3b0462726e7ef281c35a7a4ae33e93ee2bc9975b
- https://security.netapp.com/advisory/ntap-20220225-0004/
Modified: 2024-12-24
CVE-2021-47314
In the Linux kernel, the following vulnerability has been resolved: memory: fsl_ifc: fix leak of private memory on probe failure On probe error the driver should free the memory allocated for private structure. Fix this by using resource-managed allocation.
- https://git.kernel.org/stable/c/3b45b8a7d549bd92ec94b5357c2c2c1a7ed107e4
- https://git.kernel.org/stable/c/443f6ca6fd186b4fa4e6f377b6e19a91feb1a0d5
- https://git.kernel.org/stable/c/48ee69825f7480622ed447b0249123236d3b3ad0
- https://git.kernel.org/stable/c/7626ffbea708e5aba6912295c012d2b409a1769f
- https://git.kernel.org/stable/c/8018476756066e97ecb886c3dc024aeb7d5792ad
- https://git.kernel.org/stable/c/8e0d09b1232d0538066c40ed4c13086faccbdff6
- https://git.kernel.org/stable/c/a6b45b4932f7b0c36b41fb56a35ad679ece939a0
- https://git.kernel.org/stable/c/b5789e23773f4a852fbfe244b63f675e265d3a7f
- https://git.kernel.org/stable/c/ee1aa737ba0b75ab8af3444c4ae5bdba36aed6e6
- https://git.kernel.org/stable/c/3b45b8a7d549bd92ec94b5357c2c2c1a7ed107e4
- https://git.kernel.org/stable/c/443f6ca6fd186b4fa4e6f377b6e19a91feb1a0d5
- https://git.kernel.org/stable/c/48ee69825f7480622ed447b0249123236d3b3ad0
- https://git.kernel.org/stable/c/7626ffbea708e5aba6912295c012d2b409a1769f
- https://git.kernel.org/stable/c/8018476756066e97ecb886c3dc024aeb7d5792ad
- https://git.kernel.org/stable/c/8e0d09b1232d0538066c40ed4c13086faccbdff6
- https://git.kernel.org/stable/c/a6b45b4932f7b0c36b41fb56a35ad679ece939a0
- https://git.kernel.org/stable/c/b5789e23773f4a852fbfe244b63f675e265d3a7f
- https://git.kernel.org/stable/c/ee1aa737ba0b75ab8af3444c4ae5bdba36aed6e6
Modified: 2025-05-12
CVE-2021-47315
In the Linux kernel, the following vulnerability has been resolved: memory: fsl_ifc: fix leak of IO mapping on probe failure On probe error the driver should unmap the IO memory. Smatch reports: drivers/memory/fsl_ifc.c:298 fsl_ifc_ctrl_probe() warn: 'fsl_ifc_ctrl_dev->gregs' not released on lines: 298.
- https://git.kernel.org/stable/c/28f71fd81ebd3b386bf5c7c5539664156f7d72c1
- https://git.kernel.org/stable/c/3b132ab67fc7a358fff35e808fa65d4bea452521
- https://git.kernel.org/stable/c/6b3b002de90738e3c85853a682ce7e0fa078d42b
- https://git.kernel.org/stable/c/83af5816308b490b05fc8fa27fc1bdc769df200a
- https://git.kernel.org/stable/c/8d071d270afba468708faca5f7b6d9e656f75e27
- https://git.kernel.org/stable/c/94bc2fe46102d1e060fc749c0c19511e76c9995f
- https://git.kernel.org/stable/c/d0d04b95e8ed0223844a1d58497c686fe2e4a955
- https://git.kernel.org/stable/c/d9213d4f372d30b5bc4d921795d6bed0c0e3eebf
- https://git.kernel.org/stable/c/28f71fd81ebd3b386bf5c7c5539664156f7d72c1
- https://git.kernel.org/stable/c/3b132ab67fc7a358fff35e808fa65d4bea452521
- https://git.kernel.org/stable/c/6b3b002de90738e3c85853a682ce7e0fa078d42b
- https://git.kernel.org/stable/c/83af5816308b490b05fc8fa27fc1bdc769df200a
- https://git.kernel.org/stable/c/8d071d270afba468708faca5f7b6d9e656f75e27
- https://git.kernel.org/stable/c/94bc2fe46102d1e060fc749c0c19511e76c9995f
- https://git.kernel.org/stable/c/b7a2bcb4a3731d68f938207f75ed3e1d41774510
- https://git.kernel.org/stable/c/bd051b3e184fa56eeb6276ee913ba4d48069024b
- https://git.kernel.org/stable/c/d0d04b95e8ed0223844a1d58497c686fe2e4a955
- https://git.kernel.org/stable/c/d9213d4f372d30b5bc4d921795d6bed0c0e3eebf
Modified: 2024-12-24
CVE-2021-47319
In the Linux kernel, the following vulnerability has been resolved: virtio-blk: Fix memory leak among suspend/resume procedure The vblk->vqs should be freed before we call init_vqs() in virtblk_restore().
- https://git.kernel.org/stable/c/04c6e60b884cb5e94ff32af46867fb41d5848358
- https://git.kernel.org/stable/c/102d6bc6475ab09bab579c18704e6cf8d898e93c
- https://git.kernel.org/stable/c/29a2f4a3214aa14d61cc9737c9f886dae9dbb710
- https://git.kernel.org/stable/c/381bde79d11e596002edfd914e6714291826967a
- https://git.kernel.org/stable/c/600942d2fd49b90e44857d20c774b20d16f3130f
- https://git.kernel.org/stable/c/863da837964c80c72e368a4f748c30d25daa1815
- https://git.kernel.org/stable/c/b71ba22e7c6c6b279c66f53ee7818709774efa1f
- https://git.kernel.org/stable/c/ca2b8ae93a6da9839dc7f9eb9199b18aa03c3dae
- https://git.kernel.org/stable/c/cd24da0db9f75ca11eaf6060f0ccb90e2f3be3b0
- https://git.kernel.org/stable/c/04c6e60b884cb5e94ff32af46867fb41d5848358
- https://git.kernel.org/stable/c/102d6bc6475ab09bab579c18704e6cf8d898e93c
- https://git.kernel.org/stable/c/29a2f4a3214aa14d61cc9737c9f886dae9dbb710
- https://git.kernel.org/stable/c/381bde79d11e596002edfd914e6714291826967a
- https://git.kernel.org/stable/c/600942d2fd49b90e44857d20c774b20d16f3130f
- https://git.kernel.org/stable/c/863da837964c80c72e368a4f748c30d25daa1815
- https://git.kernel.org/stable/c/b71ba22e7c6c6b279c66f53ee7818709774efa1f
- https://git.kernel.org/stable/c/ca2b8ae93a6da9839dc7f9eb9199b18aa03c3dae
- https://git.kernel.org/stable/c/cd24da0db9f75ca11eaf6060f0ccb90e2f3be3b0
Modified: 2024-12-24
CVE-2021-47320
In the Linux kernel, the following vulnerability has been resolved: nfs: fix acl memory leak of posix_acl_create() When looking into another nfs xfstests report, I found acl and default_acl in nfs3_proc_create() and nfs3_proc_mknod() error paths are possibly leaked. Fix them in advance.
- https://git.kernel.org/stable/c/0704f617040c397ae73c1f88f3956787ec5d6529
- https://git.kernel.org/stable/c/1fcb6fcd74a222d9ead54d405842fc763bb86262
- https://git.kernel.org/stable/c/2e3960f276b4574a9bb0dfa31a7497302f6363b2
- https://git.kernel.org/stable/c/4b515308ab875c7e8ada8e606fe0c64762da5ed4
- https://git.kernel.org/stable/c/687cf32865b2d6960214bce523f2afac58dd3cd2
- https://git.kernel.org/stable/c/8a2b308a54c5ec224fedc753617f99b29ffcd883
- https://git.kernel.org/stable/c/c8fc86e9df6a6a03f5a8e15a3b7a5c75fd05aa38
- https://git.kernel.org/stable/c/cef9d9acb7c80ed6bace894b6334557fd493863b
- https://git.kernel.org/stable/c/d0b32dc1409f7e65e4fcc34e236462268e69a357
- https://git.kernel.org/stable/c/0704f617040c397ae73c1f88f3956787ec5d6529
- https://git.kernel.org/stable/c/1fcb6fcd74a222d9ead54d405842fc763bb86262
- https://git.kernel.org/stable/c/2e3960f276b4574a9bb0dfa31a7497302f6363b2
- https://git.kernel.org/stable/c/4b515308ab875c7e8ada8e606fe0c64762da5ed4
- https://git.kernel.org/stable/c/687cf32865b2d6960214bce523f2afac58dd3cd2
- https://git.kernel.org/stable/c/8a2b308a54c5ec224fedc753617f99b29ffcd883
- https://git.kernel.org/stable/c/c8fc86e9df6a6a03f5a8e15a3b7a5c75fd05aa38
- https://git.kernel.org/stable/c/cef9d9acb7c80ed6bace894b6334557fd493863b
- https://git.kernel.org/stable/c/d0b32dc1409f7e65e4fcc34e236462268e69a357
Modified: 2024-12-26
CVE-2021-47321
In the Linux kernel, the following vulnerability has been resolved: watchdog: Fix possible use-after-free by calling del_timer_sync() This driver's remove path calls del_timer(). However, that function does not wait until the timer handler finishes. This means that the timer handler may still be running after the driver's remove function has finished, which would result in a use-after-free. Fix by calling del_timer_sync(), which makes sure the timer handler has finished, and unable to re-schedule itself.
- https://git.kernel.org/stable/c/1a053c4d716898a53c2e31c574a70ea0c37044a3
- https://git.kernel.org/stable/c/4c05dac488a660fe2925c047ecb119e7afaaeb1e
- https://git.kernel.org/stable/c/58606882ad8ec6c39e0f40344b922921ef94ab4d
- https://git.kernel.org/stable/c/66ba9cf929b1c4fabf545bd4c18f6f64e23e46e4
- https://git.kernel.org/stable/c/8bec568d7518b1504a602ed5376bb322e4dbb270
- https://git.kernel.org/stable/c/ca96b8ea5e74956071154bdb456778cc3027e79f
- https://git.kernel.org/stable/c/d0212f095ab56672f6f36aabc605bda205e1e0bf
- https://git.kernel.org/stable/c/db222f1477ad5692cd454709b714949807e5d111
- https://git.kernel.org/stable/c/ecd620e0fb1ff7f78fdb593379b2e6938c99707a
- https://git.kernel.org/stable/c/1a053c4d716898a53c2e31c574a70ea0c37044a3
- https://git.kernel.org/stable/c/4c05dac488a660fe2925c047ecb119e7afaaeb1e
- https://git.kernel.org/stable/c/58606882ad8ec6c39e0f40344b922921ef94ab4d
- https://git.kernel.org/stable/c/66ba9cf929b1c4fabf545bd4c18f6f64e23e46e4
- https://git.kernel.org/stable/c/8bec568d7518b1504a602ed5376bb322e4dbb270
- https://git.kernel.org/stable/c/ca96b8ea5e74956071154bdb456778cc3027e79f
- https://git.kernel.org/stable/c/d0212f095ab56672f6f36aabc605bda205e1e0bf
- https://git.kernel.org/stable/c/db222f1477ad5692cd454709b714949807e5d111
- https://git.kernel.org/stable/c/ecd620e0fb1ff7f78fdb593379b2e6938c99707a
Modified: 2025-04-02
CVE-2021-47323
In the Linux kernel, the following vulnerability has been resolved: watchdog: sc520_wdt: Fix possible use-after-free in wdt_turnoff() This module's remove path calls del_timer(). However, that function does not wait until the timer handler finishes. This means that the timer handler may still be running after the driver's remove function has finished, which would result in a use-after-free. Fix by calling del_timer_sync(), which makes sure the timer handler has finished, and unable to re-schedule itself.
- https://git.kernel.org/stable/c/0015581a79bbf8e521f85dddb7d3e4a66b9f51d4
- https://git.kernel.org/stable/c/2aef07017fae21c3d8acea9656b10e3b9c0f1e04
- https://git.kernel.org/stable/c/522e75ed63f67e815d4ec0deace67df22d9ce78e
- https://git.kernel.org/stable/c/7c56c5508dc20a6b133bc669fc34327a6711c24c
- https://git.kernel.org/stable/c/90b7c141132244e8e49a34a4c1e445cce33e07f4
- https://git.kernel.org/stable/c/a173e3b62cf6dd3c4a0a10c8a82eedfcae81a566
- https://git.kernel.org/stable/c/b3c41ea5bc34d8c7b19e230d80e0e555c6f5057d
- https://git.kernel.org/stable/c/b4565a8a2d6bffb05bfbec11399d261ec16fe373
- https://git.kernel.org/stable/c/f0feab82f6a0323f54d85e8b512a2be64f83648a
- https://git.kernel.org/stable/c/0015581a79bbf8e521f85dddb7d3e4a66b9f51d4
- https://git.kernel.org/stable/c/2aef07017fae21c3d8acea9656b10e3b9c0f1e04
- https://git.kernel.org/stable/c/522e75ed63f67e815d4ec0deace67df22d9ce78e
- https://git.kernel.org/stable/c/7c56c5508dc20a6b133bc669fc34327a6711c24c
- https://git.kernel.org/stable/c/90b7c141132244e8e49a34a4c1e445cce33e07f4
- https://git.kernel.org/stable/c/a173e3b62cf6dd3c4a0a10c8a82eedfcae81a566
- https://git.kernel.org/stable/c/b3c41ea5bc34d8c7b19e230d80e0e555c6f5057d
- https://git.kernel.org/stable/c/b4565a8a2d6bffb05bfbec11399d261ec16fe373
- https://git.kernel.org/stable/c/f0feab82f6a0323f54d85e8b512a2be64f83648a
Modified: 2025-04-02
CVE-2021-47324
In the Linux kernel, the following vulnerability has been resolved: watchdog: Fix possible use-after-free in wdt_startup() This module's remove path calls del_timer(). However, that function does not wait until the timer handler finishes. This means that the timer handler may still be running after the driver's remove function has finished, which would result in a use-after-free. Fix by calling del_timer_sync(), which makes sure the timer handler has finished, and unable to re-schedule itself.
- https://git.kernel.org/stable/c/0ac50a76cf3cd63db000648b3b19f3f98b8aaa76
- https://git.kernel.org/stable/c/146cc288fb80c662c9c35e7bc58325d1ac0a7875
- https://git.kernel.org/stable/c/63a3dc24bd053792f84cb4eef0168b1266202a02
- https://git.kernel.org/stable/c/862f2b5a7c38762ac9e369daefbf361a91aca685
- https://git.kernel.org/stable/c/8adbbe6c86bb13e14f8a19e036ae5f4f5661fd90
- https://git.kernel.org/stable/c/a397cb4576fc2fc802562418b3a50b8f67d60d31
- https://git.kernel.org/stable/c/b4ebf4a4692e84163a69444c70ad515de06e2259
- https://git.kernel.org/stable/c/c08a6b31e4917034f0ed0cb457c3bb209576f542
- https://git.kernel.org/stable/c/dc9403097be52d57a5c9c35efa9be79d166a78af
- https://git.kernel.org/stable/c/0ac50a76cf3cd63db000648b3b19f3f98b8aaa76
- https://git.kernel.org/stable/c/146cc288fb80c662c9c35e7bc58325d1ac0a7875
- https://git.kernel.org/stable/c/63a3dc24bd053792f84cb4eef0168b1266202a02
- https://git.kernel.org/stable/c/862f2b5a7c38762ac9e369daefbf361a91aca685
- https://git.kernel.org/stable/c/8adbbe6c86bb13e14f8a19e036ae5f4f5661fd90
- https://git.kernel.org/stable/c/a397cb4576fc2fc802562418b3a50b8f67d60d31
- https://git.kernel.org/stable/c/b4ebf4a4692e84163a69444c70ad515de06e2259
- https://git.kernel.org/stable/c/c08a6b31e4917034f0ed0cb457c3bb209576f542
- https://git.kernel.org/stable/c/dc9403097be52d57a5c9c35efa9be79d166a78af
Modified: 2025-01-13
CVE-2021-47325
In the Linux kernel, the following vulnerability has been resolved: iommu/arm-smmu: Fix arm_smmu_device refcount leak in address translation The reference counting issue happens in several exception handling paths of arm_smmu_iova_to_phys_hard(). When those error scenarios occur, the function forgets to decrease the refcount of "smmu" increased by arm_smmu_rpm_get(), causing a refcount leak. Fix this issue by jumping to "out" label when those error scenarios occur.
- https://git.kernel.org/stable/c/0f0c5ea09139777d90729d408b807021f2ea6492
- https://git.kernel.org/stable/c/43d1aaa1965f9b58035196dac49b1e1e6c9c25eb
- https://git.kernel.org/stable/c/5f9741a9a91f25c89e04b408cd61e3ab050ce24b
- https://git.kernel.org/stable/c/7c8f176d6a3fa18aa0f8875da6f7c672ed2a8554
- https://git.kernel.org/stable/c/b11220803ad14a2a880cc06d8e01fe2548cc85b0
- https://git.kernel.org/stable/c/0f0c5ea09139777d90729d408b807021f2ea6492
- https://git.kernel.org/stable/c/43d1aaa1965f9b58035196dac49b1e1e6c9c25eb
- https://git.kernel.org/stable/c/5f9741a9a91f25c89e04b408cd61e3ab050ce24b
- https://git.kernel.org/stable/c/7c8f176d6a3fa18aa0f8875da6f7c672ed2a8554
- https://git.kernel.org/stable/c/b11220803ad14a2a880cc06d8e01fe2548cc85b0
Modified: 2025-04-02
CVE-2021-47327
In the Linux kernel, the following vulnerability has been resolved: iommu/arm-smmu: Fix arm_smmu_device refcount leak when arm_smmu_rpm_get fails arm_smmu_rpm_get() invokes pm_runtime_get_sync(), which increases the refcount of the "smmu" even though the return value is less than 0. The reference counting issue happens in some error handling paths of arm_smmu_rpm_get() in its caller functions. When arm_smmu_rpm_get() fails, the caller functions forget to decrease the refcount of "smmu" increased by arm_smmu_rpm_get(), causing a refcount leak. Fix this issue by calling pm_runtime_resume_and_get() instead of pm_runtime_get_sync() in arm_smmu_rpm_get(), which can keep the refcount balanced in case of failure.
- https://git.kernel.org/stable/c/1adf30f198c26539a62d761e45af72cde570413d
- https://git.kernel.org/stable/c/3761ae0d0e549f2acdaf11f49df4ed06d256b20f
- https://git.kernel.org/stable/c/c4007596fbdabc29f858dc2e1990858a146b60b2
- https://git.kernel.org/stable/c/fbf4daa6f4105e01fbd3868006f65c163365c1e3
- https://git.kernel.org/stable/c/fe92c058199067ae90cf2a901ddf3c271893557a
- https://git.kernel.org/stable/c/1adf30f198c26539a62d761e45af72cde570413d
- https://git.kernel.org/stable/c/3761ae0d0e549f2acdaf11f49df4ed06d256b20f
- https://git.kernel.org/stable/c/c4007596fbdabc29f858dc2e1990858a146b60b2
- https://git.kernel.org/stable/c/fbf4daa6f4105e01fbd3868006f65c163365c1e3
- https://git.kernel.org/stable/c/fe92c058199067ae90cf2a901ddf3c271893557a
Modified: 2024-12-26
CVE-2021-47328
In the Linux kernel, the following vulnerability has been resolved: scsi: iscsi: Fix conn use after free during resets If we haven't done a unbind target call we can race where iscsi_conn_teardown wakes up the EH thread and then frees the conn while those threads are still accessing the conn ehwait. We can only do one TMF per session so this just moves the TMF fields from the conn to the session. We can then rely on the iscsi_session_teardown->iscsi_remove_session->__iscsi_unbind_session call to remove the target and it's devices, and know after that point there is no device or scsi-ml callout trying to access the session.
- https://git.kernel.org/stable/c/89812e7957ab0746eab66ed6fc49d52bb4dca250
- https://git.kernel.org/stable/c/bf20d85a88384574fabb3d53ad62a8af57e7ab11
- https://git.kernel.org/stable/c/d04958a348e560938410e04a12fb99da9c7e6a00
- https://git.kernel.org/stable/c/ec29d0ac29be366450a7faffbcf8cba3a6a3b506
- https://git.kernel.org/stable/c/f0a031f7c55ffd944fead1ddaf2aa94df9a158c1
- https://git.kernel.org/stable/c/fa9542b35ceb4202e8f8d65f440529a63524dca9
- https://git.kernel.org/stable/c/89812e7957ab0746eab66ed6fc49d52bb4dca250
- https://git.kernel.org/stable/c/bf20d85a88384574fabb3d53ad62a8af57e7ab11
- https://git.kernel.org/stable/c/d04958a348e560938410e04a12fb99da9c7e6a00
- https://git.kernel.org/stable/c/ec29d0ac29be366450a7faffbcf8cba3a6a3b506
- https://git.kernel.org/stable/c/f0a031f7c55ffd944fead1ddaf2aa94df9a158c1
- https://git.kernel.org/stable/c/fa9542b35ceb4202e8f8d65f440529a63524dca9
Modified: 2025-04-02
CVE-2021-47329
In the Linux kernel, the following vulnerability has been resolved: scsi: megaraid_sas: Fix resource leak in case of probe failure The driver doesn't clean up all the allocated resources properly when scsi_add_host(), megasas_start_aen() function fails during the PCI device probe. Clean up all those resources.
- https://git.kernel.org/stable/c/04b6b9ea80906e3b41ff120b45db31768947cf72
- https://git.kernel.org/stable/c/0680db6f41920b2c91c7df3cc9cd5968701a6f74
- https://git.kernel.org/stable/c/0c6226601c3e191a44a57d8f9f814b7e5c308959
- https://git.kernel.org/stable/c/b5438f48fdd8e1c3f130d32637511efd32038152
- https://git.kernel.org/stable/c/e623f79691c5104317669ab36ec316a90c05062f
- https://git.kernel.org/stable/c/04b6b9ea80906e3b41ff120b45db31768947cf72
- https://git.kernel.org/stable/c/0680db6f41920b2c91c7df3cc9cd5968701a6f74
- https://git.kernel.org/stable/c/0c6226601c3e191a44a57d8f9f814b7e5c308959
- https://git.kernel.org/stable/c/b5438f48fdd8e1c3f130d32637511efd32038152
- https://git.kernel.org/stable/c/e623f79691c5104317669ab36ec316a90c05062f
Modified: 2024-12-24
CVE-2021-47330
In the Linux kernel, the following vulnerability has been resolved: tty: serial: 8250: serial_cs: Fix a memory leak in error handling path In the probe function, if the final 'serial_config()' fails, 'info' is leaking. Add a resource handling path to free this memory.
- https://git.kernel.org/stable/c/331f5923fce4f45b8170ccf06c529e8eb28f37bc
- https://git.kernel.org/stable/c/34f4590f5ec9859ea9136249f528173d150bd584
- https://git.kernel.org/stable/c/7a80f71601af015856a0aeb1e3c294037ac3dd32
- https://git.kernel.org/stable/c/b2ef1f5de40342de44fc5355321595f91774dab5
- https://git.kernel.org/stable/c/b5a2799cd62ed30c81b22c23028d9ee374e2138c
- https://git.kernel.org/stable/c/c39cf4df19acf0133fa284a8cd83fad42cd13cc2
- https://git.kernel.org/stable/c/cddee5c287e26f6b2ba5c0ffdfc3a846f2f10461
- https://git.kernel.org/stable/c/ee16bed959862a6de2913f71a04cb563d7237b67
- https://git.kernel.org/stable/c/fad92b11047a748c996ebd6cfb164a63814eeb2e
- https://git.kernel.org/stable/c/331f5923fce4f45b8170ccf06c529e8eb28f37bc
- https://git.kernel.org/stable/c/34f4590f5ec9859ea9136249f528173d150bd584
- https://git.kernel.org/stable/c/7a80f71601af015856a0aeb1e3c294037ac3dd32
- https://git.kernel.org/stable/c/b2ef1f5de40342de44fc5355321595f91774dab5
- https://git.kernel.org/stable/c/b5a2799cd62ed30c81b22c23028d9ee374e2138c
- https://git.kernel.org/stable/c/c39cf4df19acf0133fa284a8cd83fad42cd13cc2
- https://git.kernel.org/stable/c/cddee5c287e26f6b2ba5c0ffdfc3a846f2f10461
- https://git.kernel.org/stable/c/ee16bed959862a6de2913f71a04cb563d7237b67
- https://git.kernel.org/stable/c/fad92b11047a748c996ebd6cfb164a63814eeb2e
Modified: 2024-12-24
CVE-2021-47332
In the Linux kernel, the following vulnerability has been resolved: ALSA: usx2y: Don't call free_pages_exact() with NULL address Unlike some other functions, we can't pass NULL pointer to free_pages_exact(). Add a proper NULL check for avoiding possible Oops.
- https://git.kernel.org/stable/c/7d7f30cf182e55023fa8fde4c084b2d37c6be69d
- https://git.kernel.org/stable/c/82e5ee742fdd8874fe996181b87fafe1eb5f1196
- https://git.kernel.org/stable/c/88262229b778f4f7a896da828d966f94dcb35d19
- https://git.kernel.org/stable/c/bee295f5e03510252d18b25cc1d26230256eb87a
- https://git.kernel.org/stable/c/cae0cf651adccee2c3f376e78f30fbd788d0829f
- https://git.kernel.org/stable/c/7d7f30cf182e55023fa8fde4c084b2d37c6be69d
- https://git.kernel.org/stable/c/82e5ee742fdd8874fe996181b87fafe1eb5f1196
- https://git.kernel.org/stable/c/88262229b778f4f7a896da828d966f94dcb35d19
- https://git.kernel.org/stable/c/bee295f5e03510252d18b25cc1d26230256eb87a
- https://git.kernel.org/stable/c/cae0cf651adccee2c3f376e78f30fbd788d0829f
Modified: 2025-04-02
CVE-2021-47333
In the Linux kernel, the following vulnerability has been resolved: misc: alcor_pci: fix null-ptr-deref when there is no PCI bridge There is an issue with the ASPM(optional) capability checking function. A device might be attached to root complex directly, in this case, bus->self(bridge) will be NULL, thus priv->parent_pdev is NULL. Since alcor_pci_init_check_aspm(priv->parent_pdev) checks the PCI link's ASPM capability and populate parent_cap_off, which will be used later by alcor_pci_aspm_ctrl() to dynamically turn on/off device, what we can do here is to avoid checking the capability if we are on the root complex. This will make pdev_cap_off 0 and alcor_pci_aspm_ctrl() will simply return when bring called, effectively disable ASPM for the device. [ 1.246492] BUG: kernel NULL pointer dereference, address: 00000000000000c0 [ 1.248731] RIP: 0010:pci_read_config_byte+0x5/0x40 [ 1.253998] Call Trace: [ 1.254131] ? alcor_pci_find_cap_offset.isra.0+0x3a/0x100 [alcor_pci] [ 1.254476] alcor_pci_probe+0x169/0x2d5 [alcor_pci]
- https://git.kernel.org/stable/c/09d154990ca82d14aed2b72796f6c8845e2e605d
- https://git.kernel.org/stable/c/3ce3e45cc333da707d4d6eb433574b990bcc26f5
- https://git.kernel.org/stable/c/58f69684ba03e5b0e0a3ae844a845280c0f06309
- https://git.kernel.org/stable/c/717cf5ae52322ddbdf3ac2c584b34c5970b0d174
- https://git.kernel.org/stable/c/d2639ffdcad463b358b6bef8645ff81715daffcb
- https://git.kernel.org/stable/c/09d154990ca82d14aed2b72796f6c8845e2e605d
- https://git.kernel.org/stable/c/3ce3e45cc333da707d4d6eb433574b990bcc26f5
- https://git.kernel.org/stable/c/58f69684ba03e5b0e0a3ae844a845280c0f06309
- https://git.kernel.org/stable/c/717cf5ae52322ddbdf3ac2c584b34c5970b0d174
- https://git.kernel.org/stable/c/d2639ffdcad463b358b6bef8645ff81715daffcb
Modified: 2024-12-26
CVE-2021-47334
In the Linux kernel, the following vulnerability has been resolved: misc/libmasm/module: Fix two use after free in ibmasm_init_one In ibmasm_init_one, it calls ibmasm_init_remote_input_dev(). Inside ibmasm_init_remote_input_dev, mouse_dev and keybd_dev are allocated by input_allocate_device(), and assigned to sp->remote.mouse_dev and sp->remote.keybd_dev respectively. In the err_free_devices error branch of ibmasm_init_one, mouse_dev and keybd_dev are freed by input_free_device(), and return error. Then the execution runs into error_send_message error branch of ibmasm_init_one, where ibmasm_free_remote_input_dev(sp) is called to unregister the freed sp->remote.mouse_dev and sp->remote.keybd_dev. My patch add a "error_init_remote" label to handle the error of ibmasm_init_remote_input_dev(), to avoid the uaf bugs.
- https://git.kernel.org/stable/c/1512e7dc5eb08b7d92a12e2bfcd9cb8c4a1ec069
- https://git.kernel.org/stable/c/29ba8e2ba89ee2862a26d91204dd5fe77ceee25a
- https://git.kernel.org/stable/c/38660031e80eaa6cc9370b031c180612f414b00d
- https://git.kernel.org/stable/c/481a76d4749ee3a27f902ba213fdcbb4bb39720e
- https://git.kernel.org/stable/c/5b06ca113bf197aab2ab61288f42506e0049fbab
- https://git.kernel.org/stable/c/7272b591c4cb9327c43443f67b8fbae7657dd9ae
- https://git.kernel.org/stable/c/a7268e8a227d5a4f0bd1584f556246b0224ab274
- https://git.kernel.org/stable/c/b9c87ce3bc6331f82811a8cf8e930423c22523a3
- https://git.kernel.org/stable/c/ef1067d2baa847d53c9988510d99fb494de4d12c
- https://git.kernel.org/stable/c/1512e7dc5eb08b7d92a12e2bfcd9cb8c4a1ec069
- https://git.kernel.org/stable/c/29ba8e2ba89ee2862a26d91204dd5fe77ceee25a
- https://git.kernel.org/stable/c/38660031e80eaa6cc9370b031c180612f414b00d
- https://git.kernel.org/stable/c/481a76d4749ee3a27f902ba213fdcbb4bb39720e
- https://git.kernel.org/stable/c/5b06ca113bf197aab2ab61288f42506e0049fbab
- https://git.kernel.org/stable/c/7272b591c4cb9327c43443f67b8fbae7657dd9ae
- https://git.kernel.org/stable/c/a7268e8a227d5a4f0bd1584f556246b0224ab274
- https://git.kernel.org/stable/c/b9c87ce3bc6331f82811a8cf8e930423c22523a3
- https://git.kernel.org/stable/c/ef1067d2baa847d53c9988510d99fb494de4d12c
Modified: 2024-12-24
CVE-2021-47337
In the Linux kernel, the following vulnerability has been resolved: scsi: core: Fix bad pointer dereference when ehandler kthread is invalid Commit 66a834d09293 ("scsi: core: Fix error handling of scsi_host_alloc()") changed the allocation logic to call put_device() to perform host cleanup with the assumption that IDA removal and stopping the kthread would properly be performed in scsi_host_dev_release(). However, in the unlikely case that the error handler thread fails to spawn, shost->ehandler is set to ERR_PTR(-ENOMEM). The error handler cleanup code in scsi_host_dev_release() will call kthread_stop() if shost->ehandler != NULL which will always be the case whether the kthread was successfully spawned or not. In the case that it failed to spawn this has the nasty side effect of trying to dereference an invalid pointer when kthread_stop() is called. The following splat provides an example of this behavior in the wild: scsi host11: error handler thread failed to spawn, error = -4 Kernel attempted to read user page (10c) - exploit attempt? (uid: 0) BUG: Kernel NULL pointer dereference on read at 0x0000010c Faulting instruction address: 0xc00000000818e9a8 Oops: Kernel access of bad area, sig: 11 [#1] LE PAGE_SIZE=64K MMU=Hash SMP NR_CPUS=2048 NUMA pSeries Modules linked in: ibmvscsi(+) scsi_transport_srp dm_multipath dm_mirror dm_region hash dm_log dm_mod fuse overlay squashfs loop CPU: 12 PID: 274 Comm: systemd-udevd Not tainted 5.13.0-rc7 #1 NIP: c00000000818e9a8 LR: c0000000089846e8 CTR: 0000000000007ee8 REGS: c000000037d12ea0 TRAP: 0300 Not tainted (5.13.0-rc7) MSR: 800000000280b033 <SF,VEC,VSX,EE,FP,ME,IR,DR,RI,LE> CR: 28228228 XER: 20040001 CFAR: c0000000089846e4 DAR: 000000000000010c DSISR: 40000000 IRQMASK: 0 GPR00: c0000000089846e8 c000000037d13140 c000000009cc1100 fffffffffffffffc GPR04: 0000000000000001 0000000000000000 0000000000000000 c000000037dc0000 GPR08: 0000000000000000 c000000037dc0000 0000000000000001 00000000fffff7ff GPR12: 0000000000008000 c00000000a049000 c000000037d13d00 000000011134d5a0 GPR16: 0000000000001740 c0080000190d0000 c0080000190d1740 c000000009129288 GPR20: c000000037d13bc0 0000000000000001 c000000037d13bc0 c0080000190b7898 GPR24: c0080000190b7708 0000000000000000 c000000033bb2c48 0000000000000000 GPR28: c000000046b28280 0000000000000000 000000000000010c fffffffffffffffc NIP [c00000000818e9a8] kthread_stop+0x38/0x230 LR [c0000000089846e8] scsi_host_dev_release+0x98/0x160 Call Trace: [c000000033bb2c48] 0xc000000033bb2c48 (unreliable) [c0000000089846e8] scsi_host_dev_release+0x98/0x160 [c00000000891e960] device_release+0x60/0x100 [c0000000087e55c4] kobject_release+0x84/0x210 [c00000000891ec78] put_device+0x28/0x40 [c000000008984ea4] scsi_host_alloc+0x314/0x430 [c0080000190b38bc] ibmvscsi_probe+0x54/0xad0 [ibmvscsi] [c000000008110104] vio_bus_probe+0xa4/0x4b0 [c00000000892a860] really_probe+0x140/0x680 [c00000000892aefc] driver_probe_device+0x15c/0x200 [c00000000892b63c] device_driver_attach+0xcc/0xe0 [c00000000892b740] __driver_attach+0xf0/0x200 [c000000008926f28] bus_for_each_dev+0xa8/0x130 [c000000008929ce4] driver_attach+0x34/0x50 [c000000008928fc0] bus_add_driver+0x1b0/0x300 [c00000000892c798] driver_register+0x98/0x1a0 [c00000000810eb60] __vio_register_driver+0x80/0xe0 [c0080000190b4a30] ibmvscsi_module_init+0x9c/0xdc [ibmvscsi] [c0000000080121d0] do_one_initcall+0x60/0x2d0 [c000000008261abc] do_init_module+0x7c/0x320 [c000000008265700] load_module+0x2350/0x25b0 [c000000008265cb4] __do_sys_finit_module+0xd4/0x160 [c000000008031110] system_call_exception+0x150/0x2d0 [c00000000800d35c] system_call_common+0xec/0x278 Fix this be nulling shost->ehandler when the kthread fails to spawn.
- https://git.kernel.org/stable/c/887bfae2732b5b02a86a859fd239d34f7ff93c05
- https://git.kernel.org/stable/c/8e4212ecf0713dd57d0e3209a66201da582149b1
- https://git.kernel.org/stable/c/93aa71ad7379900e61c8adff6a710a4c18c7c99b
- https://git.kernel.org/stable/c/c1671d2d2ef8a84837eea1b4d99ca0c6a66fb691
- https://git.kernel.org/stable/c/d2f0b960d07e52bb664471b4de0ed8b08c636b3a
- https://git.kernel.org/stable/c/e1bd3fac2baa3d5c04375980c1d5263a3335af92
- https://git.kernel.org/stable/c/ea518b70ed5e4598c8d706f37fc16f7b06e440bd
- https://git.kernel.org/stable/c/f3d0a109240c9bed5c60d819014786be3a2fe515
- https://git.kernel.org/stable/c/887bfae2732b5b02a86a859fd239d34f7ff93c05
- https://git.kernel.org/stable/c/8e4212ecf0713dd57d0e3209a66201da582149b1
- https://git.kernel.org/stable/c/93aa71ad7379900e61c8adff6a710a4c18c7c99b
- https://git.kernel.org/stable/c/c1671d2d2ef8a84837eea1b4d99ca0c6a66fb691
- https://git.kernel.org/stable/c/d2f0b960d07e52bb664471b4de0ed8b08c636b3a
- https://git.kernel.org/stable/c/e1bd3fac2baa3d5c04375980c1d5263a3335af92
- https://git.kernel.org/stable/c/ea518b70ed5e4598c8d706f37fc16f7b06e440bd
- https://git.kernel.org/stable/c/f3d0a109240c9bed5c60d819014786be3a2fe515
Modified: 2024-12-24
CVE-2021-47338
In the Linux kernel, the following vulnerability has been resolved: fbmem: Do not delete the mode that is still in use The execution of fb_delete_videomode() is not based on the result of the previous fbcon_mode_deleted(). As a result, the mode is directly deleted, regardless of whether it is still in use, which may cause UAF. ================================================================== BUG: KASAN: use-after-free in fb_mode_is_equal+0x36e/0x5e0 \ drivers/video/fbdev/core/modedb.c:924 Read of size 4 at addr ffff88807e0ddb1c by task syz-executor.0/18962 CPU: 2 PID: 18962 Comm: syz-executor.0 Not tainted 5.10.45-rc1+ #3 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS ... Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x137/0x1be lib/dump_stack.c:118 print_address_description+0x6c/0x640 mm/kasan/report.c:385 __kasan_report mm/kasan/report.c:545 [inline] kasan_report+0x13d/0x1e0 mm/kasan/report.c:562 fb_mode_is_equal+0x36e/0x5e0 drivers/video/fbdev/core/modedb.c:924 fbcon_mode_deleted+0x16a/0x220 drivers/video/fbdev/core/fbcon.c:2746 fb_set_var+0x1e1/0xdb0 drivers/video/fbdev/core/fbmem.c:975 do_fb_ioctl+0x4d9/0x6e0 drivers/video/fbdev/core/fbmem.c:1108 vfs_ioctl fs/ioctl.c:48 [inline] __do_sys_ioctl fs/ioctl.c:753 [inline] __se_sys_ioctl+0xfb/0x170 fs/ioctl.c:739 do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 entry_SYSCALL_64_after_hwframe+0x44/0xa9 Freed by task 18960: kasan_save_stack mm/kasan/common.c:48 [inline] kasan_set_track+0x3d/0x70 mm/kasan/common.c:56 kasan_set_free_info+0x17/0x30 mm/kasan/generic.c:355 __kasan_slab_free+0x108/0x140 mm/kasan/common.c:422 slab_free_hook mm/slub.c:1541 [inline] slab_free_freelist_hook+0xd6/0x1a0 mm/slub.c:1574 slab_free mm/slub.c:3139 [inline] kfree+0xca/0x3d0 mm/slub.c:4121 fb_delete_videomode+0x56a/0x820 drivers/video/fbdev/core/modedb.c:1104 fb_set_var+0x1f3/0xdb0 drivers/video/fbdev/core/fbmem.c:978 do_fb_ioctl+0x4d9/0x6e0 drivers/video/fbdev/core/fbmem.c:1108 vfs_ioctl fs/ioctl.c:48 [inline] __do_sys_ioctl fs/ioctl.c:753 [inline] __se_sys_ioctl+0xfb/0x170 fs/ioctl.c:739 do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 entry_SYSCALL_64_after_hwframe+0x44/0xa9
- https://git.kernel.org/stable/c/087bff9acd2ec6db3f61aceb3224bde90fe0f7f8
- https://git.kernel.org/stable/c/0af778269a522c988ef0b4188556aba97fb420cc
- https://git.kernel.org/stable/c/359311b85ebec7c07c3a08ae2f3def946cad33fa
- https://git.kernel.org/stable/c/d6e76469157d8f240e5dec6f8411aa8d306b1126
- https://git.kernel.org/stable/c/f193509afc7ff37a46862610c93b896044d5b693
- https://git.kernel.org/stable/c/087bff9acd2ec6db3f61aceb3224bde90fe0f7f8
- https://git.kernel.org/stable/c/0af778269a522c988ef0b4188556aba97fb420cc
- https://git.kernel.org/stable/c/359311b85ebec7c07c3a08ae2f3def946cad33fa
- https://git.kernel.org/stable/c/d6e76469157d8f240e5dec6f8411aa8d306b1126
- https://git.kernel.org/stable/c/f193509afc7ff37a46862610c93b896044d5b693
Modified: 2025-01-14
CVE-2021-47341
In the Linux kernel, the following vulnerability has been resolved: KVM: mmio: Fix use-after-free Read in kvm_vm_ioctl_unregister_coalesced_mmio BUG: KASAN: use-after-free in kvm_vm_ioctl_unregister_coalesced_mmio+0x7c/0x1ec arch/arm64/kvm/../../../virt/kvm/coalesced_mmio.c:183 Read of size 8 at addr ffff0000c03a2500 by task syz-executor083/4269 CPU: 5 PID: 4269 Comm: syz-executor083 Not tainted 5.10.0 #7 Hardware name: linux,dummy-virt (DT) Call trace: dump_backtrace+0x0/0x2d0 arch/arm64/kernel/stacktrace.c:132 show_stack+0x28/0x34 arch/arm64/kernel/stacktrace.c:196 __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x110/0x164 lib/dump_stack.c:118 print_address_description+0x78/0x5c8 mm/kasan/report.c:385 __kasan_report mm/kasan/report.c:545 [inline] kasan_report+0x148/0x1e4 mm/kasan/report.c:562 check_memory_region_inline mm/kasan/generic.c:183 [inline] __asan_load8+0xb4/0xbc mm/kasan/generic.c:252 kvm_vm_ioctl_unregister_coalesced_mmio+0x7c/0x1ec arch/arm64/kvm/../../../virt/kvm/coalesced_mmio.c:183 kvm_vm_ioctl+0xe30/0x14c4 arch/arm64/kvm/../../../virt/kvm/kvm_main.c:3755 vfs_ioctl fs/ioctl.c:48 [inline] __do_sys_ioctl fs/ioctl.c:753 [inline] __se_sys_ioctl fs/ioctl.c:739 [inline] __arm64_sys_ioctl+0xf88/0x131c fs/ioctl.c:739 __invoke_syscall arch/arm64/kernel/syscall.c:36 [inline] invoke_syscall arch/arm64/kernel/syscall.c:48 [inline] el0_svc_common arch/arm64/kernel/syscall.c:158 [inline] do_el0_svc+0x120/0x290 arch/arm64/kernel/syscall.c:220 el0_svc+0x1c/0x28 arch/arm64/kernel/entry-common.c:367 el0_sync_handler+0x98/0x170 arch/arm64/kernel/entry-common.c:383 el0_sync+0x140/0x180 arch/arm64/kernel/entry.S:670 Allocated by task 4269: stack_trace_save+0x80/0xb8 kernel/stacktrace.c:121 kasan_save_stack mm/kasan/common.c:48 [inline] kasan_set_track mm/kasan/common.c:56 [inline] __kasan_kmalloc+0xdc/0x120 mm/kasan/common.c:461 kasan_kmalloc+0xc/0x14 mm/kasan/common.c:475 kmem_cache_alloc_trace include/linux/slab.h:450 [inline] kmalloc include/linux/slab.h:552 [inline] kzalloc include/linux/slab.h:664 [inline] kvm_vm_ioctl_register_coalesced_mmio+0x78/0x1cc arch/arm64/kvm/../../../virt/kvm/coalesced_mmio.c:146 kvm_vm_ioctl+0x7e8/0x14c4 arch/arm64/kvm/../../../virt/kvm/kvm_main.c:3746 vfs_ioctl fs/ioctl.c:48 [inline] __do_sys_ioctl fs/ioctl.c:753 [inline] __se_sys_ioctl fs/ioctl.c:739 [inline] __arm64_sys_ioctl+0xf88/0x131c fs/ioctl.c:739 __invoke_syscall arch/arm64/kernel/syscall.c:36 [inline] invoke_syscall arch/arm64/kernel/syscall.c:48 [inline] el0_svc_common arch/arm64/kernel/syscall.c:158 [inline] do_el0_svc+0x120/0x290 arch/arm64/kernel/syscall.c:220 el0_svc+0x1c/0x28 arch/arm64/kernel/entry-common.c:367 el0_sync_handler+0x98/0x170 arch/arm64/kernel/entry-common.c:383 el0_sync+0x140/0x180 arch/arm64/kernel/entry.S:670 Freed by task 4269: stack_trace_save+0x80/0xb8 kernel/stacktrace.c:121 kasan_save_stack mm/kasan/common.c:48 [inline] kasan_set_track+0x38/0x6c mm/kasan/common.c:56 kasan_set_free_info+0x20/0x40 mm/kasan/generic.c:355 __kasan_slab_free+0x124/0x150 mm/kasan/common.c:422 kasan_slab_free+0x10/0x1c mm/kasan/common.c:431 slab_free_hook mm/slub.c:1544 [inline] slab_free_freelist_hook mm/slub.c:1577 [inline] slab_free mm/slub.c:3142 [inline] kfree+0x104/0x38c mm/slub.c:4124 coalesced_mmio_destructor+0x94/0xa4 arch/arm64/kvm/../../../virt/kvm/coalesced_mmio.c:102 kvm_iodevice_destructor include/kvm/iodev.h:61 [inline] kvm_io_bus_unregister_dev+0x248/0x280 arch/arm64/kvm/../../../virt/kvm/kvm_main.c:4374 kvm_vm_ioctl_unregister_coalesced_mmio+0x158/0x1ec arch/arm64/kvm/../../../virt/kvm/coalesced_mmio.c:186 kvm_vm_ioctl+0xe30/0x14c4 arch/arm64/kvm/../../../virt/kvm/kvm_main.c:3755 vfs_ioctl fs/ioctl.c:48 [inline] __do_sys_ioctl fs/ioctl.c:753 [inline] __se_sys_ioctl fs/ioctl.c:739 [inline] __arm64_sys_ioctl+0xf88/0x131c fs/ioctl.c:739 __invoke_syscall arch/arm64/kernel/syscall.c:36 [inline] invoke_syscall arch/arm64/kernel/sys ---truncated---
- https://git.kernel.org/stable/c/069d44a24c0ff8f85adf49233aae7a8ca16f5c7e
- https://git.kernel.org/stable/c/23fa2e46a5556f787ce2ea1a315d3ab93cced204
- https://git.kernel.org/stable/c/679837dc0abaa2c6e2a7bcd86483e05eee1d5066
- https://git.kernel.org/stable/c/8d7c539316d652d217e5e82b89ee204c812a7061
- https://git.kernel.org/stable/c/f2ff9d03432fcb160e9f7d4be26174d89de2779a
- https://git.kernel.org/stable/c/069d44a24c0ff8f85adf49233aae7a8ca16f5c7e
- https://git.kernel.org/stable/c/23fa2e46a5556f787ce2ea1a315d3ab93cced204
- https://git.kernel.org/stable/c/679837dc0abaa2c6e2a7bcd86483e05eee1d5066
- https://git.kernel.org/stable/c/8d7c539316d652d217e5e82b89ee204c812a7061
- https://git.kernel.org/stable/c/f2ff9d03432fcb160e9f7d4be26174d89de2779a
Closed vulnerabilities
Modified: 2025-03-05
BDU:2021-04153
Уязвимость функций alloca() и strdup() подсистемы инициализации и управления службами Systemd, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-06-09
CVE-2021-33910
basic/unit-name.c in systemd prior to 246.15, 247.8, 248.5, and 249.1 has a Memory Allocation with an Excessive Size Value (involving strdupa and alloca for a pathname controlled by a local attacker) that results in an operating system crash.
- http://packetstormsecurity.com/files/163621/Sequoia-A-Deep-Root-In-Linuxs-Filesystem-Layer.html
- http://www.openwall.com/lists/oss-security/2021/08/04/2
- http://www.openwall.com/lists/oss-security/2021/08/17/3
- http://www.openwall.com/lists/oss-security/2021/09/07/3
- https://cert-portal.siemens.com/productcert/pdf/ssa-222547.pdf
- https://github.com/systemd/systemd-stable/commit/4a1c5f34bd3e1daed4490e9d97918e504d19733b
- https://github.com/systemd/systemd-stable/commit/764b74113e36ac5219a4b82a05f311b5a92136ce
- https://github.com/systemd/systemd-stable/commit/b00674347337b7531c92fdb65590ab253bb57538
- https://github.com/systemd/systemd-stable/commit/cfd14c65374027b34dbbc4f0551456c5dc2d1f61
- https://github.com/systemd/systemd/commit/b34a4f0e6729de292cb3b0c03c1d48f246ad896b
- https://github.com/systemd/systemd/pull/20256/commits/441e0115646d54f080e5c3bb0ba477c892861ab9
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2LSDMHAKI4LGFOCSPXNVVSEWQFAVFWR7/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
- https://security.gentoo.org/glsa/202107-48
- https://security.netapp.com/advisory/ntap-20211104-0008/
- https://www.debian.org/security/2021/dsa-4942
- https://www.openwall.com/lists/oss-security/2021/07/20/2
- http://packetstormsecurity.com/files/163621/Sequoia-A-Deep-Root-In-Linuxs-Filesystem-Layer.html
- http://www.openwall.com/lists/oss-security/2021/08/04/2
- http://www.openwall.com/lists/oss-security/2021/08/17/3
- http://www.openwall.com/lists/oss-security/2021/09/07/3
- https://cert-portal.siemens.com/productcert/pdf/ssa-222547.pdf
- https://github.com/systemd/systemd-stable/commit/4a1c5f34bd3e1daed4490e9d97918e504d19733b
- https://github.com/systemd/systemd-stable/commit/764b74113e36ac5219a4b82a05f311b5a92136ce
- https://github.com/systemd/systemd-stable/commit/b00674347337b7531c92fdb65590ab253bb57538
- https://github.com/systemd/systemd-stable/commit/cfd14c65374027b34dbbc4f0551456c5dc2d1f61
- https://github.com/systemd/systemd/commit/b34a4f0e6729de292cb3b0c03c1d48f246ad896b
- https://github.com/systemd/systemd/pull/20256/commits/441e0115646d54f080e5c3bb0ba477c892861ab9
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2LSDMHAKI4LGFOCSPXNVVSEWQFAVFWR7/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
- https://security.gentoo.org/glsa/202107-48
- https://security.netapp.com/advisory/ntap-20211104-0008/
- https://www.debian.org/security/2021/dsa-4942
- https://www.openwall.com/lists/oss-security/2021/07/20/2
