ALT-BU-2021-4368-3
Branch sisyphus update bulletin.
Package libwebkitgtk4 updated to version 2.34.1-alt1 for branch sisyphus in task 290326.
Closed vulnerabilities
Modified: 2024-08-26
BDU:2024-05804
Уязвимость модулей отображения веб-страниц WebKitGTK и WPE WebKit, связанная с небезопасным управлением привилегиями, позволяющая нарушителю оказать воздействие на целостность защищаемой информации
Modified: 2024-11-21
CVE-2021-42762
BubblewrapLauncher.cpp in WebKitGTK and WPE WebKit before 2.34.1 allows a limited sandbox bypass that allows a sandboxed process to trick host processes into thinking the sandboxed process is not confined by the sandbox, by abusing VFS syscalls that manipulate its filesystem namespace. The impact is limited to host services that create UNIX sockets that WebKit mounts inside its sandbox, and the sandboxed process remains otherwise confined. NOTE: this is similar to CVE-2021-41133.
- http://www.openwall.com/lists/oss-security/2021/10/26/9
- http://www.openwall.com/lists/oss-security/2021/10/27/1
- http://www.openwall.com/lists/oss-security/2021/10/27/2
- http://www.openwall.com/lists/oss-security/2021/10/27/4
- https://bugs.webkit.org/show_bug.cgi?id=231479
- https://github.com/flatpak/flatpak/security/advisories/GHSA-67h7-w3jq-vh4q
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H6MGXCX7P5AHWOQ6IRT477UKT7IS4DAD/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M5J2LZQTDX53DNSKSGU7TQYCO2HKSTY4/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ON5SDVVPVPCAGFPW2GHYATZVZYLPW2L4/
- https://www.debian.org/security/2021/dsa-4995
- https://www.debian.org/security/2021/dsa-4996
- http://www.openwall.com/lists/oss-security/2021/10/26/9
- http://www.openwall.com/lists/oss-security/2021/10/27/1
- http://www.openwall.com/lists/oss-security/2021/10/27/2
- http://www.openwall.com/lists/oss-security/2021/10/27/4
- https://bugs.webkit.org/show_bug.cgi?id=231479
- https://github.com/flatpak/flatpak/security/advisories/GHSA-67h7-w3jq-vh4q
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H6MGXCX7P5AHWOQ6IRT477UKT7IS4DAD/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M5J2LZQTDX53DNSKSGU7TQYCO2HKSTY4/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ON5SDVVPVPCAGFPW2GHYATZVZYLPW2L4/
- https://www.debian.org/security/2021/dsa-4995
- https://www.debian.org/security/2021/dsa-4996
Package chromium-gost updated to version 96.0.4664.45-alt1 for branch sisyphus in task 290370.
Closed vulnerabilities
Modified: 2023-11-21
BDU:2021-05226
Уязвимость обработчика JavaScript-сценариев V8 браузера Google Chrome, позволяющая нарушителю выполнить произвольный код
Modified: 2024-09-30
BDU:2021-05227
Уязвимость обработчика JavaScript-сценариев V8 браузера Google Chrome, позволяющая нарушителю получить доступ к системе
Modified: 2023-11-21
BDU:2021-05500
Уязвимость компонента входа в систему Sign-In браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
Modified: 2023-11-21
BDU:2021-05503
Уязвимость компонента Garbage Collection браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
Modified: 2023-11-21
BDU:2021-05504
Уязвимость компонента Web Transport браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
Modified: 2023-11-21
BDU:2021-05505
Уязвимость обработчика JavaScript-сценариев V8 браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
Modified: 2024-04-03
BDU:2021-05583
Уязвимость компонента storage foundation браузера Google Chrome, позволяющая нарушителю выполнить произвольный код
Modified: 2024-04-03
BDU:2021-05584
Уязвимость компонента loader браузера Google Chrome, позволяющая нарушителю выполнить произвольный код
Modified: 2024-09-13
BDU:2021-05589
Уязвимость компонента media браузера Google Chrome, позволяющая нарушителю выполнить произвольный код
Modified: 2024-04-03
BDU:2021-05590
Уязвимость обработчика JavaScript-сценариев V8 браузера Google Chrome, позволяющая нарушителю выполнить произвольный код
Modified: 2024-04-03
BDU:2021-05615
Уязвимость функции Автозаполнения Autofil браузера Google Chrome, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
Modified: 2024-09-13
BDU:2021-05637
Уязвимость реализации компонента «New Tab Page» («Новая вкладка») браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю выполнить произвольный код
Modified: 2024-04-03
BDU:2021-05839
Уязвимость компонента Swiftshader браузера Google Chrome, позволяющая нарушителю выполнить произвольный код
Modified: 2024-04-03
BDU:2021-05870
Уязвимость компонента Contacts Picker браузера Google Chrome, позволяющая нарушителю обойти ограничения безопасности и получить несанкционированный доступ к защищаемой информации
Modified: 2024-04-03
BDU:2021-06093
Уязвимость компонента Navigation браузера Google Chrome, позволяющая нарушителю раскрыть защищаемую информацию
Modified: 2024-09-30
BDU:2021-06094
Уязвимость реализации ввода текста браузера Google Chrome, позволяющая нарушителю раскрыть защищаемую информацию
Modified: 2024-04-03
BDU:2021-06131
Уязвимость реализации механизма CORS браузера Google Chrome, позволяющая нарушителю обойти ограничения безопасности и получить несанкционированный доступ к защищаемой информации
Modified: 2024-04-03
BDU:2021-06138
Уязвимость компонента Referer браузера Google Chrome, связанная с неправильно реализованной проверкой безопасности для стандартных элементов, позволяющая нарушителю раскрыть защищаемую информацию
Modified: 2024-04-03
BDU:2021-06262
Уязвимость изолированной среды iframe браузера Google Chrome, позволяющая нарушителю обойти ограничения безопасности и получить несанкционированный доступ к защищаемой информации
Modified: 2024-04-03
BDU:2021-06420
Уязвимость функции фоновой загрузки браузера Google Chrome, позволяющая нарушителю обойти политику безопасности контента и получить несанкционированный доступ к защищаемой информации
Modified: 2023-11-21
BDU:2021-06423
Уязвимость функции загрузок браузера Google Chrome, позволяющая нарушителю обойти существующие ограничения безопасности
Modified: 2023-11-21
BDU:2021-06425
Уязвимость обработчика JavaScript-сценариев V8 браузера Google Chrome, позволяющая нарушителю обойти существующие ограничения безопасности
Modified: 2023-11-21
BDU:2021-06429
Уязвимость набора инструментов для веб-разработки DevTools браузера Google Chrome, позволяющая нарушителю обойти существующие ограничения безопасности
Modified: 2023-11-21
BDU:2021-06430
Уязвимость компонента для отображения веб-страниц WebView браузера Google Chrome, операционной системы Android, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
Modified: 2024-04-03
BDU:2022-00030
Уязвимость обработчика JavaScript-сценариев V8 веб-браузера Google Chrome, позволяющая нарушителю раскрыть защищаемую информацию
Modified: 2024-04-03
BDU:2022-00043
Уязвимость службы Service Worker браузера Google Chrome, позволяющая нарушителю выполнить произвольный код
Modified: 2023-11-21
BDU:2022-00045
Уязвимость обработчика PDF-содержимого PDFium браузеров Google Chrome и Microsoft Edge, связанная с использованием памяти после её освобождения, позволяющая нарушителю обойти существующие ограничения безопасности
Modified: 2024-09-30
BDU:2022-00046
Уязвимость компонента Profiles браузера Google Chrome, позволяющая нарушителю перенаправить пользователей на вредоносную веб-страницу
Modified: 2023-11-21
BDU:2022-00058
Уязвимость графической библиотеки Skia браузера Google Chrome, позволяющая нарушителю выйти из изолированной программной среды
Modified: 2023-11-21
BDU:2022-00061
Уязвимость компонента WebAudio браузера Google Chrome, позволяющая нарушителю обойти существующие ограничения безопасности с помощью специально созданной HTML страницы
Modified: 2023-11-21
BDU:2022-00062
Уязвимость обработчика JavaScript-сценариев V8 браузера Google Chrome, позволяющая нарушителю выполнить произвольный код
Modified: 2023-11-21
BDU:2022-00063
Уязвимость обработчика PDF-содержимого PDFium браузера Google Chrome, позволяющая нарушителю вызвать переполнение буфера с помощью специально созданной HTML страницы
Modified: 2023-11-21
BDU:2022-00064
Уязвимость режима инкогнито браузера Google Chrome, позволяющая нарушителю обойти существующие ограничения безопасности
Modified: 2023-11-21
BDU:2022-00066
Уязвимость настроек Settings браузера Google Chrome, позволяющая нарушителю вызвать переполнение буфера
Modified: 2024-04-03
BDU:2022-00067
Уязвимость компонента cache браузера Google Chrome, позволяющая нарушителю выполнить произвольный код
Modified: 2023-11-21
BDU:2022-00068
Уязвимость компонента iFrame Sandbox браузера Google Chrome, позволяющая нарушителю обойти существующие ограничения безопасности
Modified: 2023-11-21
BDU:2022-00071
Уязвимость установщика WebApp браузера Google Chrome , позволяющая нарушителю подделать содержимое адресной строки с помощью специально созданной HTML страницы
Modified: 2023-11-21
BDU:2022-00080
Уязвимость сетевых API браузера Google Chrome, связанная с использованием памяти после её освобождения, позволяющая нарушителю обойти существующие ограничения безопасности с помощью специально созданной HTML страницы
Modified: 2024-04-03
BDU:2022-00142
Уязвимость механизма аутентификации пользователей WebAuthentication браузера Google Chrome, позволяющая нарушителю раскрыть защищаемую информацию
Modified: 2024-09-13
BDU:2022-00158
Уязвимость реализации функции распознавания отпечатков пальцев браузера Google Chrome, позволяющая нарушителю выполнить произвольный код
BDU:2023-04667
Уязвимость интерфейса Cast UI браузера Google Chrome, позволяющая нарушителю проводить спуфинг атаки
Modified: 2024-11-21
CVE-2021-37981
Heap buffer overflow in Skia in Google Chrome prior to 95.0.4638.54 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/10/stable-channel-update-for-desktop_19.html
- https://crbug.com/1246631
- https://www.debian.org/security/2022/dsa-5046
- https://chromereleases.googleblog.com/2021/10/stable-channel-update-for-desktop_19.html
- https://crbug.com/1246631
- https://www.debian.org/security/2022/dsa-5046
Modified: 2024-11-21
CVE-2021-37982
Use after free in Incognito in Google Chrome prior to 95.0.4638.54 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/10/stable-channel-update-for-desktop_19.html
- https://crbug.com/1248661
- https://www.debian.org/security/2022/dsa-5046
- https://chromereleases.googleblog.com/2021/10/stable-channel-update-for-desktop_19.html
- https://crbug.com/1248661
- https://www.debian.org/security/2022/dsa-5046
Modified: 2024-11-21
CVE-2021-37983
Use after free in Dev Tools in Google Chrome prior to 95.0.4638.54 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/10/stable-channel-update-for-desktop_19.html
- https://crbug.com/1249810
- https://www.debian.org/security/2022/dsa-5046
- https://chromereleases.googleblog.com/2021/10/stable-channel-update-for-desktop_19.html
- https://crbug.com/1249810
- https://www.debian.org/security/2022/dsa-5046
Modified: 2024-11-21
CVE-2021-37984
Heap buffer overflow in PDFium in Google Chrome prior to 95.0.4638.54 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/10/stable-channel-update-for-desktop_19.html
- https://crbug.com/1253399
- https://www.debian.org/security/2022/dsa-5046
- https://chromereleases.googleblog.com/2021/10/stable-channel-update-for-desktop_19.html
- https://crbug.com/1253399
- https://www.debian.org/security/2022/dsa-5046
Modified: 2024-11-21
CVE-2021-37985
Use after free in V8 in Google Chrome prior to 95.0.4638.54 allowed a remote attacker who had convinced a user to allow for connection to debugger to potentially exploit heap corruption via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/10/stable-channel-update-for-desktop_19.html
- https://crbug.com/1241860
- https://www.debian.org/security/2022/dsa-5046
- https://chromereleases.googleblog.com/2021/10/stable-channel-update-for-desktop_19.html
- https://crbug.com/1241860
- https://www.debian.org/security/2022/dsa-5046
Modified: 2024-11-21
CVE-2021-37986
Heap buffer overflow in Settings in Google Chrome prior to 95.0.4638.54 allowed a remote attacker to engage with Dev Tools to potentially exploit heap corruption via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/10/stable-channel-update-for-desktop_19.html
- https://crbug.com/1242404
- https://www.debian.org/security/2022/dsa-5046
- https://chromereleases.googleblog.com/2021/10/stable-channel-update-for-desktop_19.html
- https://crbug.com/1242404
- https://www.debian.org/security/2022/dsa-5046
Modified: 2024-11-21
CVE-2021-37987
Use after free in Network APIs in Google Chrome prior to 95.0.4638.54 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/10/stable-channel-update-for-desktop_19.html
- https://crbug.com/1206928
- https://www.debian.org/security/2022/dsa-5046
- https://chromereleases.googleblog.com/2021/10/stable-channel-update-for-desktop_19.html
- https://crbug.com/1206928
- https://www.debian.org/security/2022/dsa-5046
Modified: 2024-11-21
CVE-2021-37988
Use after free in Profiles in Google Chrome prior to 95.0.4638.54 allowed a remote attacker who convinced a user to engage in specific gestures to potentially exploit heap corruption via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/10/stable-channel-update-for-desktop_19.html
- https://crbug.com/1228248
- https://www.debian.org/security/2022/dsa-5046
- https://chromereleases.googleblog.com/2021/10/stable-channel-update-for-desktop_19.html
- https://crbug.com/1228248
- https://www.debian.org/security/2022/dsa-5046
Modified: 2024-11-21
CVE-2021-37989
Inappropriate implementation in Blink in Google Chrome prior to 95.0.4638.54 allowed a remote attacker to abuse content security policy via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/10/stable-channel-update-for-desktop_19.html
- https://crbug.com/1233067
- https://www.debian.org/security/2022/dsa-5046
- https://chromereleases.googleblog.com/2021/10/stable-channel-update-for-desktop_19.html
- https://crbug.com/1233067
- https://www.debian.org/security/2022/dsa-5046
Modified: 2024-11-21
CVE-2021-37990
Inappropriate implementation in WebView in Google Chrome on Android prior to 95.0.4638.54 allowed a remote attacker to leak cross-origin data via a crafted app.
- https://chromereleases.googleblog.com/2021/10/stable-channel-update-for-desktop_19.html
- https://crbug.com/1247395
- https://www.debian.org/security/2022/dsa-5046
- https://chromereleases.googleblog.com/2021/10/stable-channel-update-for-desktop_19.html
- https://crbug.com/1247395
- https://www.debian.org/security/2022/dsa-5046
Modified: 2024-11-21
CVE-2021-37991
Race in V8 in Google Chrome prior to 95.0.4638.54 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/10/stable-channel-update-for-desktop_19.html
- https://crbug.com/1250660
- https://www.debian.org/security/2022/dsa-5046
- https://chromereleases.googleblog.com/2021/10/stable-channel-update-for-desktop_19.html
- https://crbug.com/1250660
- https://www.debian.org/security/2022/dsa-5046
Modified: 2024-11-21
CVE-2021-37992
Out of bounds read in WebAudio in Google Chrome prior to 95.0.4638.54 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/10/stable-channel-update-for-desktop_19.html
- https://crbug.com/1253746
- https://www.debian.org/security/2022/dsa-5046
- https://chromereleases.googleblog.com/2021/10/stable-channel-update-for-desktop_19.html
- https://crbug.com/1253746
- https://www.debian.org/security/2022/dsa-5046
Modified: 2024-11-21
CVE-2021-37993
Use after free in PDF Accessibility in Google Chrome prior to 95.0.4638.54 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/10/stable-channel-update-for-desktop_19.html
- https://crbug.com/1255332
- https://www.debian.org/security/2022/dsa-5046
- https://chromereleases.googleblog.com/2021/10/stable-channel-update-for-desktop_19.html
- https://crbug.com/1255332
- https://www.debian.org/security/2022/dsa-5046
Modified: 2024-11-21
CVE-2021-37994
Inappropriate implementation in iFrame Sandbox in Google Chrome prior to 95.0.4638.54 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/10/stable-channel-update-for-desktop_19.html
- https://crbug.com/1100761
- https://www.debian.org/security/2022/dsa-5046
- https://chromereleases.googleblog.com/2021/10/stable-channel-update-for-desktop_19.html
- https://crbug.com/1100761
- https://www.debian.org/security/2022/dsa-5046
Modified: 2024-11-21
CVE-2021-37995
Inappropriate implementation in WebApp Installer in Google Chrome prior to 95.0.4638.54 allowed a remote attacker to potentially overlay and spoof the contents of the Omnibox (URL bar) via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/10/stable-channel-update-for-desktop_19.html
- https://crbug.com/1242315
- https://www.debian.org/security/2022/dsa-5046
- https://chromereleases.googleblog.com/2021/10/stable-channel-update-for-desktop_19.html
- https://crbug.com/1242315
- https://www.debian.org/security/2022/dsa-5046
Modified: 2024-11-21
CVE-2021-37996
Insufficient validation of untrusted input Downloads in Google Chrome prior to 95.0.4638.54 allowed a remote attacker to bypass navigation restrictions via a malicious file.
- https://chromereleases.googleblog.com/2021/10/stable-channel-update-for-desktop_19.html
- https://crbug.com/1243020
- https://www.debian.org/security/2022/dsa-5046
- https://chromereleases.googleblog.com/2021/10/stable-channel-update-for-desktop_19.html
- https://crbug.com/1243020
- https://www.debian.org/security/2022/dsa-5046
Modified: 2024-11-21
CVE-2021-37997
Use after free in Sign-In in Google Chrome prior to 95.0.4638.69 allowed a remote attacker who convinced a user to sign into Chrome to potentially exploit heap corruption via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/10/stable-channel-update-for-desktop_28.html
- https://crbug.com/1259864
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3W46HRT2UVHWSLZB6JZHQF6JNQWKV744/
- https://www.debian.org/security/2022/dsa-5046
- https://chromereleases.googleblog.com/2021/10/stable-channel-update-for-desktop_28.html
- https://crbug.com/1259864
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3W46HRT2UVHWSLZB6JZHQF6JNQWKV744/
- https://www.debian.org/security/2022/dsa-5046
Modified: 2024-11-21
CVE-2021-37998
Use after free in Garbage Collection in Google Chrome prior to 95.0.4638.69 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/10/stable-channel-update-for-desktop_28.html
- https://crbug.com/1259587
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3W46HRT2UVHWSLZB6JZHQF6JNQWKV744/
- https://www.debian.org/security/2022/dsa-5046
- https://chromereleases.googleblog.com/2021/10/stable-channel-update-for-desktop_28.html
- https://crbug.com/1259587
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3W46HRT2UVHWSLZB6JZHQF6JNQWKV744/
- https://www.debian.org/security/2022/dsa-5046
Modified: 2024-11-21
CVE-2021-37999
Insufficient data validation in New Tab Page in Google Chrome prior to 95.0.4638.69 allowed a remote attacker to inject arbitrary scripts or HTML in a new browser tab via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/10/stable-channel-update-for-desktop_28.html
- https://crbug.com/1251541
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3W46HRT2UVHWSLZB6JZHQF6JNQWKV744/
- https://www.debian.org/security/2022/dsa-5046
- https://chromereleases.googleblog.com/2021/10/stable-channel-update-for-desktop_28.html
- https://crbug.com/1251541
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3W46HRT2UVHWSLZB6JZHQF6JNQWKV744/
- https://www.debian.org/security/2022/dsa-5046
Modified: 2025-10-24
CVE-2021-38000
Insufficient validation of untrusted input in Intents in Google Chrome on Android prior to 95.0.4638.69 allowed a remote attacker to arbitrarily browser to a malicious URL via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/10/stable-channel-update-for-desktop_28.html
- https://crbug.com/1249962
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3W46HRT2UVHWSLZB6JZHQF6JNQWKV744/
- https://www.debian.org/security/2022/dsa-5046
- https://chromereleases.googleblog.com/2021/10/stable-channel-update-for-desktop_28.html
- https://crbug.com/1249962
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3W46HRT2UVHWSLZB6JZHQF6JNQWKV744/
- https://www.debian.org/security/2022/dsa-5046
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-38000
Modified: 2024-11-21
CVE-2021-38001
Type confusion in V8 in Google Chrome prior to 95.0.4638.69 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/10/stable-channel-update-for-desktop_28.html
- https://crbug.com/1260577
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3W46HRT2UVHWSLZB6JZHQF6JNQWKV744/
- https://www.debian.org/security/2022/dsa-5046
- https://chromereleases.googleblog.com/2021/10/stable-channel-update-for-desktop_28.html
- https://crbug.com/1260577
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3W46HRT2UVHWSLZB6JZHQF6JNQWKV744/
- https://www.debian.org/security/2022/dsa-5046
Modified: 2024-11-21
CVE-2021-38002
Use after free in Web Transport in Google Chrome prior to 95.0.4638.69 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/10/stable-channel-update-for-desktop_28.html
- https://crbug.com/1260940
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3W46HRT2UVHWSLZB6JZHQF6JNQWKV744/
- https://www.debian.org/security/2022/dsa-5046
- https://chromereleases.googleblog.com/2021/10/stable-channel-update-for-desktop_28.html
- https://crbug.com/1260940
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3W46HRT2UVHWSLZB6JZHQF6JNQWKV744/
- https://www.debian.org/security/2022/dsa-5046
Modified: 2025-10-24
CVE-2021-38003
Inappropriate implementation in V8 in Google Chrome prior to 95.0.4638.69 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/10/stable-channel-update-for-desktop_28.html
- https://crbug.com/1263462
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3W46HRT2UVHWSLZB6JZHQF6JNQWKV744/
- https://www.debian.org/security/2022/dsa-5046
- https://chromereleases.googleblog.com/2021/10/stable-channel-update-for-desktop_28.html
- https://crbug.com/1263462
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3W46HRT2UVHWSLZB6JZHQF6JNQWKV744/
- https://www.debian.org/security/2022/dsa-5046
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-38003
Modified: 2024-11-21
CVE-2021-38004
Insufficient policy enforcement in Autofill in Google Chrome prior to 95.0.4638.69 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/10/stable-channel-update-for-desktop_28.html
- https://crbug.com/1227170
- https://www.debian.org/security/2022/dsa-5046
- https://chromereleases.googleblog.com/2021/10/stable-channel-update-for-desktop_28.html
- https://crbug.com/1227170
- https://www.debian.org/security/2022/dsa-5046
Modified: 2024-11-21
CVE-2021-38005
Use after free in loader in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/11/stable-channel-update-for-desktop.html
- https://crbug.com/1241091
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3W46HRT2UVHWSLZB6JZHQF6JNQWKV744/
- https://www.debian.org/security/2022/dsa-5046
- https://chromereleases.googleblog.com/2021/11/stable-channel-update-for-desktop.html
- https://crbug.com/1241091
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3W46HRT2UVHWSLZB6JZHQF6JNQWKV744/
- https://www.debian.org/security/2022/dsa-5046
Modified: 2024-11-21
CVE-2021-38006
Use after free in storage foundation in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/11/stable-channel-update-for-desktop.html
- https://crbug.com/1240593
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3W46HRT2UVHWSLZB6JZHQF6JNQWKV744/
- https://www.debian.org/security/2022/dsa-5046
- https://chromereleases.googleblog.com/2021/11/stable-channel-update-for-desktop.html
- https://crbug.com/1240593
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3W46HRT2UVHWSLZB6JZHQF6JNQWKV744/
- https://www.debian.org/security/2022/dsa-5046
Modified: 2024-11-21
CVE-2021-38007
Type confusion in V8 in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/11/stable-channel-update-for-desktop.html
- https://crbug.com/1254189
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3W46HRT2UVHWSLZB6JZHQF6JNQWKV744/
- https://www.debian.org/security/2022/dsa-5046
- https://chromereleases.googleblog.com/2021/11/stable-channel-update-for-desktop.html
- https://crbug.com/1254189
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3W46HRT2UVHWSLZB6JZHQF6JNQWKV744/
- https://www.debian.org/security/2022/dsa-5046
Modified: 2024-11-21
CVE-2021-38008
Use after free in media in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/11/stable-channel-update-for-desktop.html
- https://crbug.com/1263620
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3W46HRT2UVHWSLZB6JZHQF6JNQWKV744/
- https://www.debian.org/security/2022/dsa-5046
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2021-1398
- https://chromereleases.googleblog.com/2021/11/stable-channel-update-for-desktop.html
- https://crbug.com/1263620
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3W46HRT2UVHWSLZB6JZHQF6JNQWKV744/
- https://www.debian.org/security/2022/dsa-5046
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2021-1398
Modified: 2024-11-21
CVE-2021-38009
Inappropriate implementation in cache in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/11/stable-channel-update-for-desktop.html
- https://crbug.com/1260649
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3W46HRT2UVHWSLZB6JZHQF6JNQWKV744/
- https://www.debian.org/security/2022/dsa-5046
- https://chromereleases.googleblog.com/2021/11/stable-channel-update-for-desktop.html
- https://crbug.com/1260649
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3W46HRT2UVHWSLZB6JZHQF6JNQWKV744/
- https://www.debian.org/security/2022/dsa-5046
Modified: 2024-11-21
CVE-2021-38010
Inappropriate implementation in service workers in Google Chrome prior to 96.0.4664.45 allowed a remote attacker who had compromised the renderer process to bypass site isolation via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/11/stable-channel-update-for-desktop.html
- https://crbug.com/1264477
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3W46HRT2UVHWSLZB6JZHQF6JNQWKV744/
- https://www.debian.org/security/2022/dsa-5046
- https://chromereleases.googleblog.com/2021/11/stable-channel-update-for-desktop.html
- https://crbug.com/1264477
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3W46HRT2UVHWSLZB6JZHQF6JNQWKV744/
- https://www.debian.org/security/2022/dsa-5046
Modified: 2024-11-21
CVE-2021-38011
Use after free in storage foundation in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/11/stable-channel-update-for-desktop.html
- https://crbug.com/1268274
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3W46HRT2UVHWSLZB6JZHQF6JNQWKV744/
- https://www.debian.org/security/2022/dsa-5046
- https://chromereleases.googleblog.com/2021/11/stable-channel-update-for-desktop.html
- https://crbug.com/1268274
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3W46HRT2UVHWSLZB6JZHQF6JNQWKV744/
- https://www.debian.org/security/2022/dsa-5046
Modified: 2024-11-21
CVE-2021-38012
Type confusion in V8 in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/11/stable-channel-update-for-desktop.html
- https://crbug.com/1262791
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3W46HRT2UVHWSLZB6JZHQF6JNQWKV744/
- https://www.debian.org/security/2022/dsa-5046
- https://chromereleases.googleblog.com/2021/11/stable-channel-update-for-desktop.html
- https://crbug.com/1262791
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3W46HRT2UVHWSLZB6JZHQF6JNQWKV744/
- https://www.debian.org/security/2022/dsa-5046
Modified: 2024-11-21
CVE-2021-38013
Heap buffer overflow in fingerprint recognition in Google Chrome on ChromeOS prior to 96.0.4664.45 allowed a remote attacker who had compromised a WebUI renderer process to potentially perform a sandbox escape via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/11/stable-channel-update-for-desktop.html
- https://crbug.com/1242392
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3W46HRT2UVHWSLZB6JZHQF6JNQWKV744/
- https://www.debian.org/security/2022/dsa-5046
- https://chromereleases.googleblog.com/2021/11/stable-channel-update-for-desktop.html
- https://crbug.com/1242392
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3W46HRT2UVHWSLZB6JZHQF6JNQWKV744/
- https://www.debian.org/security/2022/dsa-5046
Modified: 2024-11-21
CVE-2021-38014
Out of bounds write in Swiftshader in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/11/stable-channel-update-for-desktop.html
- https://crbug.com/1248567
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3W46HRT2UVHWSLZB6JZHQF6JNQWKV744/
- https://www.debian.org/security/2022/dsa-5046
- https://chromereleases.googleblog.com/2021/11/stable-channel-update-for-desktop.html
- https://crbug.com/1248567
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3W46HRT2UVHWSLZB6JZHQF6JNQWKV744/
- https://www.debian.org/security/2022/dsa-5046
Modified: 2024-11-21
CVE-2021-38015
Inappropriate implementation in input in Google Chrome prior to 96.0.4664.45 allowed an attacker who convinced a user to install a malicious extension to bypass navigation restrictions via a crafted Chrome Extension.
- https://chromereleases.googleblog.com/2021/11/stable-channel-update-for-desktop.html
- https://crbug.com/957553
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3W46HRT2UVHWSLZB6JZHQF6JNQWKV744/
- https://www.debian.org/security/2022/dsa-5046
- https://chromereleases.googleblog.com/2021/11/stable-channel-update-for-desktop.html
- https://crbug.com/957553
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3W46HRT2UVHWSLZB6JZHQF6JNQWKV744/
- https://www.debian.org/security/2022/dsa-5046
Modified: 2024-11-21
CVE-2021-38016
Insufficient policy enforcement in background fetch in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to bypass same origin policy via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/11/stable-channel-update-for-desktop.html
- https://crbug.com/1244289
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3W46HRT2UVHWSLZB6JZHQF6JNQWKV744/
- https://www.debian.org/security/2022/dsa-5046
- https://chromereleases.googleblog.com/2021/11/stable-channel-update-for-desktop.html
- https://crbug.com/1244289
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3W46HRT2UVHWSLZB6JZHQF6JNQWKV744/
- https://www.debian.org/security/2022/dsa-5046
Modified: 2024-11-21
CVE-2021-38017
Insufficient policy enforcement in iframe sandbox in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/11/stable-channel-update-for-desktop.html
- https://crbug.com/1256822
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3W46HRT2UVHWSLZB6JZHQF6JNQWKV744/
- https://www.debian.org/security/2022/dsa-5046
- https://chromereleases.googleblog.com/2021/11/stable-channel-update-for-desktop.html
- https://crbug.com/1256822
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3W46HRT2UVHWSLZB6JZHQF6JNQWKV744/
- https://www.debian.org/security/2022/dsa-5046
Modified: 2024-11-21
CVE-2021-38018
Inappropriate implementation in navigation in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to perform domain spoofing via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/11/stable-channel-update-for-desktop.html
- https://crbug.com/1197889
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3W46HRT2UVHWSLZB6JZHQF6JNQWKV744/
- https://www.debian.org/security/2022/dsa-5046
- https://chromereleases.googleblog.com/2021/11/stable-channel-update-for-desktop.html
- https://crbug.com/1197889
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3W46HRT2UVHWSLZB6JZHQF6JNQWKV744/
- https://www.debian.org/security/2022/dsa-5046
Modified: 2024-11-21
CVE-2021-38019
Insufficient policy enforcement in CORS in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/11/stable-channel-update-for-desktop.html
- https://crbug.com/1251179
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3W46HRT2UVHWSLZB6JZHQF6JNQWKV744/
- https://www.debian.org/security/2022/dsa-5046
- https://chromereleases.googleblog.com/2021/11/stable-channel-update-for-desktop.html
- https://crbug.com/1251179
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3W46HRT2UVHWSLZB6JZHQF6JNQWKV744/
- https://www.debian.org/security/2022/dsa-5046
Modified: 2024-11-21
CVE-2021-38020
Insufficient policy enforcement in contacts picker in Google Chrome on Android prior to 96.0.4664.45 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/11/stable-channel-update-for-desktop.html
- https://crbug.com/1259694
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3W46HRT2UVHWSLZB6JZHQF6JNQWKV744/
- https://www.debian.org/security/2022/dsa-5046
- https://chromereleases.googleblog.com/2021/11/stable-channel-update-for-desktop.html
- https://crbug.com/1259694
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3W46HRT2UVHWSLZB6JZHQF6JNQWKV744/
- https://www.debian.org/security/2022/dsa-5046
Modified: 2024-11-21
CVE-2021-38021
Inappropriate implementation in referrer in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/11/stable-channel-update-for-desktop.html
- https://crbug.com/1233375
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3W46HRT2UVHWSLZB6JZHQF6JNQWKV744/
- https://www.debian.org/security/2022/dsa-5046
- https://chromereleases.googleblog.com/2021/11/stable-channel-update-for-desktop.html
- https://crbug.com/1233375
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3W46HRT2UVHWSLZB6JZHQF6JNQWKV744/
- https://www.debian.org/security/2022/dsa-5046
Modified: 2024-11-21
CVE-2021-38022
Inappropriate implementation in WebAuthentication in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/11/stable-channel-update-for-desktop.html
- https://crbug.com/1248862
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3W46HRT2UVHWSLZB6JZHQF6JNQWKV744/
- https://www.debian.org/security/2022/dsa-5046
- https://chromereleases.googleblog.com/2021/11/stable-channel-update-for-desktop.html
- https://crbug.com/1248862
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3W46HRT2UVHWSLZB6JZHQF6JNQWKV744/
- https://www.debian.org/security/2022/dsa-5046
Modified: 2024-11-21
CVE-2021-4316
Inappropriate implementation in Cast UI in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to spoof browser UI via a crafted HTML page. (Chromium security severity: Low)
- https://chromereleases.googleblog.com/2021/11/stable-channel-update-for-desktop.html
- https://crbug.com/1152952
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PQKT7EGDD2P3L7S3NXEDDRCPK4NNZNWJ/
- https://chromereleases.googleblog.com/2021/11/stable-channel-update-for-desktop.html
- https://crbug.com/1152952
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PQKT7EGDD2P3L7S3NXEDDRCPK4NNZNWJ/
Closed bugs
Некорректное отображение окна браузера на системе с xfce
Package kernel-image-mp updated to version 5.15.4-alt1 for branch sisyphus in task 290389.
Closed vulnerabilities
Modified: 2024-09-16
BDU:2021-03902
Уязвимость функции sco_sock_sendmsg() подсистемы HCI ядра операционной системы Linux, позволяющая нарушителю вызвать аварийное завершение системы или повысить свои привилегии
Modified: 2025-01-29
BDU:2021-04802
Уязвимость криптодрайвера ccp-ops ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2023-07-18
BDU:2021-04803
Уязвимость подсистемы Bluetooth ядра операционной системы Linux, позволяющая нарушителю вызвать аварийное завершение системы
Modified: 2025-08-19
BDU:2021-04804
Уязвимость функции vt_k_ioctl ядра операционной системы Linux, позволяющая нарушителю раскрыть защищаемую информацию
Modified: 2025-01-29
BDU:2021-04806
Уязвимость функции ccp_run_aes_gcm_cmd() ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-05-28
BDU:2021-05472
Уязвимость функции mbochs_ioctl файла samples / vfio-mdev / mbochs.c ядра операционных систем семейства Linux, позволяющая нарушителю получить доступ к защищаемой информации
Modified: 2023-11-11
BDU:2021-06349
Уязвимость функции mwifiex_usb_recv (drivers/net/wireless/marvell/mwifiex/usb.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании.
Modified: 2024-09-13
BDU:2021-06351
Уязвимость функции hw_atl_utils_fw_rpc_wait (drivers/net/ethernet/aquantia/atlantic/hw_atl/hw_atl_utils.c) ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код
Modified: 2024-09-13
BDU:2022-01512
Уязвимость компонента fs/quota/quota_tree.c ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-01725
Уязвимость функции add_partition ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-01-29
BDU:2022-03142
Уязвимость реализации протокола ICMP ядра операционной системы Linux, позволяющая нарушителю получить доступ к конфиденциальной информации
Modified: 2024-09-13
BDU:2022-03402
Уязвимость функции sock_getsockopt() ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-07
BDU:2022-03928
Уязвимость функции btrfs_alloc_tree_b (fs/btrfs/extent-tree.c) файловой системы btrfs ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2023-08-14
BDU:2022-04444
Уязвимость драйвера netback ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2023-08-14
BDU:2022-05378
Уязвимость драйвера netback ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-01-29
BDU:2022-05648
Уязвимость функции sctp_make_strreset_req (net/sctp/sm_make_chunk.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2023-07-19
BDU:2022-05684
Уязвимость подсистемы OverlayFS ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-01-29
BDU:2022-05780
Уязвимость функции btrfs_rm_device компонента fs/btrfs/volumes.c ядра операционной системы Linux, позволяющая нарушителю получить доступ к конфиденциальным данным, а также вызвать отказ в обслуживании
Modified: 2024-04-03
BDU:2022-05887
Уязвимость верификатора ebpf компонента bpf_map_update_elem и bpf_map_freeze (kernel/bpf/syscall.c) ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на целостность данных
BDU:2022-05888
Уязвимость компонента bpf_jit_insn (arch/s390/net/bpf_jit_comp.c) ядра операционной системы Linux, позволяющая нарушителю получить доступ к конфиденциальным данным
Modified: 2024-09-12
BDU:2023-00362
Уязвимость функции filelock_init механизма блокировок (fs/locks.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-01-31
BDU:2023-01197
Уязвимость подсистемы io_uring в модуле fs/io_uring.c ядра операционной системы Linux, позволяющая нарушителю раскрыть защищаемую информацию или вызвать отказ в обслуживании
Modified: 2025-08-19
BDU:2023-01273
Уязвимость функции ovl_write_iter() файловой системы overlayfs ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии
Modified: 2024-09-30
BDU:2023-02304
Уязвимость подсистемы LightNVM ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии и выполнить произвольный код
Modified: 2024-11-07
BDU:2023-02450
Уязвимость реализации протокола SCTP ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании (закрыть соединение)
Modified: 2024-10-24
BDU:2024-01033
Уязвимость компонента Kernel Samepage Merging (KSM) ядра операционной системы Linux, позволяющая нарушителю получить доступ к странице пользователя
Modified: 2024-11-07
BDU:2024-08417
Уязвимость компонента hwmon ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код
Modified: 2024-11-27
BDU:2024-09224
Уязвимость компонента thermal ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-01-24
BDU:2024-10397
Уязвимость компонента isofs ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-01-24
BDU:2024-10495
Уязвимость компонента vmk80xx ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-01-24
BDU:2024-10498
Уязвимость компонента dt9812 ядра операционной системы Linux, позволяющая нарушителю получить доступ к конфиденциальной информации
Modified: 2025-01-24
BDU:2024-10510
Уязвимость компонента rtl8712 ядра операционной системы Linux, позволяющая нарушителю повысить привилегии в системе
Modified: 2025-01-24
BDU:2024-10517
Уязвимость компонента ni_usb6501 ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-01-24
BDU:2024-10518
Уязвимость компонента vmk80xx ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-10-29
BDU:2025-03130
Уязвимость функции nfs4_state_shutdown_net() в модуле fs/nfsd/nfs4state.c компонента nfsd ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации.
BDU:2025-14233
Уязвимость функции scsi_device_put() модуля drivers/scsi/scsi.c драйвера поддержки устройств SCSI ядра операционной системы Linux, позволяющая нарушителю получить доступ к защищаемой информации или вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2021-20320
A flaw was found in s390 eBPF JIT in bpf_jit_insn in arch/s390/net/bpf_jit_comp.c in the Linux kernel. In this flaw, a local attacker with special user privilege can circumvent the verifier and may lead to a confidentiality problem.
Modified: 2024-11-21
CVE-2021-20321
A race condition accessing file object in the Linux kernel OverlayFS subsystem was found in the way users do rename in specific way with OverlayFS. A local user could use this flaw to crash the system.
- https://bugzilla.redhat.com/show_bug.cgi?id=2013242
- https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
- https://lore.kernel.org/all/20211011134508.748956131%40linuxfoundation.org/
- https://www.debian.org/security/2022/dsa-5096
- https://bugzilla.redhat.com/show_bug.cgi?id=2013242
- https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
- https://lore.kernel.org/all/20211011134508.748956131%40linuxfoundation.org/
- https://www.debian.org/security/2022/dsa-5096
Modified: 2024-11-21
CVE-2021-20322
A flaw in the processing of received ICMP errors (ICMP fragment needed and ICMP redirect) in the Linux kernel functionality was found to allow the ability to quickly scan open UDP ports. This flaw allows an off-path remote user to effectively bypass the source port UDP randomization. The highest threat from this vulnerability is to confidentiality and possibly integrity, because software that relies on UDP source port randomization are indirectly affected as well.
- https://bugzilla.redhat.com/show_bug.cgi?id=2014230
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.15-rc6&id=4785305c05b25a242e5314cc821f54ade4c18810
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.15-rc6&id=6457378fe796815c973f631a1904e147d6ee33b1
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/ipv4/route.c?h=v5.15-rc6&id=67d6d681e15b578c1725bad8ad079e05d1c48a8e
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/ipv6/route.c?h=v5.15-rc6&id=a00df2caffed3883c341d5685f830434312e4a43
- https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
- https://security.netapp.com/advisory/ntap-20220303-0002/
- https://www.debian.org/security/2022/dsa-5096
- https://www.oracle.com/security-alerts/cpujul2022.html
- https://bugzilla.redhat.com/show_bug.cgi?id=2014230
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.15-rc6&id=4785305c05b25a242e5314cc821f54ade4c18810
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.15-rc6&id=6457378fe796815c973f631a1904e147d6ee33b1
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/ipv4/route.c?h=v5.15-rc6&id=67d6d681e15b578c1725bad8ad079e05d1c48a8e
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/ipv6/route.c?h=v5.15-rc6&id=a00df2caffed3883c341d5685f830434312e4a43
- https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
- https://security.netapp.com/advisory/ntap-20220303-0002/
- https://www.debian.org/security/2022/dsa-5096
- https://www.oracle.com/security-alerts/cpujul2022.html
Modified: 2024-11-21
CVE-2021-28714
Guest can force Linux netback driver to hog large amounts of kernel memory T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Incoming data packets for a guest in the Linux kernel's netback driver are buffered until the guest is ready to process them. There are some measures taken for avoiding to pile up too much data, but those can be bypassed by the guest: There is a timeout how long the client side of an interface can stop consuming new packets before it is assumed to have stalled, but this timeout is rather long (60 seconds by default). Using a UDP connection on a fast interface can easily accumulate gigabytes of data in that time. (CVE-2021-28715) The timeout could even never trigger if the guest manages to have only one free slot in its RX queue ring page and the next package would require more than one free slot, which may be the case when using GSO, XDP, or software hashing. (CVE-2021-28714)
- https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html
- https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
- https://www.debian.org/security/2022/dsa-5050
- https://www.debian.org/security/2022/dsa-5096
- https://xenbits.xenproject.org/xsa/advisory-392.txt
- https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html
- https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
- https://www.debian.org/security/2022/dsa-5050
- https://www.debian.org/security/2022/dsa-5096
- https://xenbits.xenproject.org/xsa/advisory-392.txt
Modified: 2025-05-22
CVE-2021-28715
Guest can force Linux netback driver to hog large amounts of kernel memory T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Incoming data packets for a guest in the Linux kernel's netback driver are buffered until the guest is ready to process them. There are some measures taken for avoiding to pile up too much data, but those can be bypassed by the guest: There is a timeout how long the client side of an interface can stop consuming new packets before it is assumed to have stalled, but this timeout is rather long (60 seconds by default). Using a UDP connection on a fast interface can easily accumulate gigabytes of data in that time. (CVE-2021-28715) The timeout could even never trigger if the guest manages to have only one free slot in its RX queue ring page and the next package would require more than one free slot, which may be the case when using GSO, XDP, or software hashing. (CVE-2021-28714)
- https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html
- https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
- https://www.debian.org/security/2022/dsa-5050
- https://www.debian.org/security/2022/dsa-5096
- https://xenbits.xenproject.org/xsa/advisory-392.txt
- https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html
- https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
- https://www.debian.org/security/2022/dsa-5050
- https://www.debian.org/security/2022/dsa-5096
- https://xenbits.xenproject.org/xsa/advisory-392.txt
Modified: 2024-11-21
CVE-2021-3640
A flaw use-after-free in function sco_sock_sendmsg() of the Linux kernel HCI subsystem was found in the way user calls ioct UFFDIO_REGISTER or other way triggers race condition of the call sco_conn_del() together with the call sco_sock_sendmsg() with the expected controllable faulting memory page. A privileged local user could use this flaw to crash the system or escalate their privileges on the system.
- https://bugzilla.redhat.com/show_bug.cgi?id=1980646
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/bluetooth/sco.c?h=v5.16&id=99c23da0eed4fd20cae8243f2b51e10e66aa0951
- https://github.com/torvalds/linux/commit/99c23da0eed4fd20cae8243f2b51e10e66aa0951
- https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html
- https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
- https://security.netapp.com/advisory/ntap-20220419-0003/
- https://ubuntu.com/security/CVE-2021-3640
- https://www.debian.org/security/2022/dsa-5096
- https://www.openwall.com/lists/oss-security/2021/07/22/1
- https://bugzilla.redhat.com/show_bug.cgi?id=1980646
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/bluetooth/sco.c?h=v5.16&id=99c23da0eed4fd20cae8243f2b51e10e66aa0951
- https://github.com/torvalds/linux/commit/99c23da0eed4fd20cae8243f2b51e10e66aa0951
- https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html
- https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
- https://security.netapp.com/advisory/ntap-20220419-0003/
- https://ubuntu.com/security/CVE-2021-3640
- https://www.debian.org/security/2022/dsa-5096
- https://www.openwall.com/lists/oss-security/2021/07/22/1
Modified: 2024-11-21
CVE-2021-3736
A flaw was found in the Linux kernel. A memory leak problem was found in mbochs_ioctl in samples/vfio-mdev/mbochs.c in Virtual Function I/O (VFIO) Mediated devices. This flaw could allow a local attacker to leak internal kernel information.
- https://access.redhat.com/security/cve/CVE-2021-3736
- https://bugzilla.redhat.com/show_bug.cgi?id=1995570
- https://github.com/torvalds/linux/commit/de5494af4815a4c9328536c72741229b7de88e7f
- https://access.redhat.com/security/cve/CVE-2021-3736
- https://bugzilla.redhat.com/show_bug.cgi?id=1995570
- https://github.com/torvalds/linux/commit/de5494af4815a4c9328536c72741229b7de88e7f
Modified: 2024-11-21
CVE-2021-3739
A NULL pointer dereference flaw was found in the btrfs_rm_device function in fs/btrfs/volumes.c in the Linux Kernel, where triggering the bug requires ‘CAP_SYS_ADMIN’. This flaw allows a local attacker to crash the system or leak kernel internal information. The highest threat from this vulnerability is to system availability.
- https://bugzilla.redhat.com/show_bug.cgi?id=1997958
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e4571b8c5e9ffa1e85c0c671995bd4dcc5c75091
- https://github.com/torvalds/linux/commit/e4571b8c5e9ffa1e85c0c671995bd4dcc5c75091
- https://security.netapp.com/advisory/ntap-20220407-0006/
- https://ubuntu.com/security/CVE-2021-3739
- https://www.openwall.com/lists/oss-security/2021/08/25/3
- https://bugzilla.redhat.com/show_bug.cgi?id=1997958
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e4571b8c5e9ffa1e85c0c671995bd4dcc5c75091
- https://github.com/torvalds/linux/commit/e4571b8c5e9ffa1e85c0c671995bd4dcc5c75091
- https://security.netapp.com/advisory/ntap-20220407-0006/
- https://ubuntu.com/security/CVE-2021-3739
- https://www.openwall.com/lists/oss-security/2021/08/25/3
Modified: 2024-11-21
CVE-2021-3744
A memory leak flaw was found in the Linux kernel in the ccp_run_aes_gcm_cmd() function in drivers/crypto/ccp/ccp-ops.c, which allows attackers to cause a denial of service (memory consumption). This vulnerability is similar with the older CVE-2019-18808.
- http://www.openwall.com/lists/oss-security/2021/09/14/1
- https://bugzilla.redhat.com/show_bug.cgi?id=2000627
- https://github.com/torvalds/linux/commit/505d9dcb0f7ddf9d075e729523a33d38642ae680
- https://kernel.googlesource.com/pub/scm/linux/kernel/git/herbert/crypto-2.6/+/505d9dcb0f7ddf9d075e729523a33d38642ae680%5E%21/#F0
- https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7BLLVKYAIETEORUPTFO3TR3C33ZPFXQM/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LAT3RERO6QBKSPJBNNRWY3D4NCGTFOS7/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SYKURLXBB2555ASWMPDNMBUPD6AG2JKQ/
- https://seclists.org/oss-sec/2021/q3/164
- https://www.debian.org/security/2022/dsa-5096
- https://www.oracle.com/security-alerts/cpujul2022.html
- http://www.openwall.com/lists/oss-security/2021/09/14/1
- https://bugzilla.redhat.com/show_bug.cgi?id=2000627
- https://github.com/torvalds/linux/commit/505d9dcb0f7ddf9d075e729523a33d38642ae680
- https://kernel.googlesource.com/pub/scm/linux/kernel/git/herbert/crypto-2.6/+/505d9dcb0f7ddf9d075e729523a33d38642ae680%5E%21/#F0
- https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7BLLVKYAIETEORUPTFO3TR3C33ZPFXQM/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LAT3RERO6QBKSPJBNNRWY3D4NCGTFOS7/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SYKURLXBB2555ASWMPDNMBUPD6AG2JKQ/
- https://seclists.org/oss-sec/2021/q3/164
- https://www.debian.org/security/2022/dsa-5096
- https://www.oracle.com/security-alerts/cpujul2022.html
Modified: 2024-11-21
CVE-2021-3752
A use-after-free flaw was found in the Linux kernel’s Bluetooth subsystem in the way user calls connect to the socket and disconnect simultaneously due to a race condition. This flaw allows a user to crash the system or escalate their privileges. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
- https://bugzilla.redhat.com/show_bug.cgi?id=1999544
- https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html
- https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
- https://lore.kernel.org/lkml/20211115165435.133245729%40linuxfoundation.org/
- https://security.netapp.com/advisory/ntap-20220318-0009/
- https://www.debian.org/security/2022/dsa-5096
- https://www.openwall.com/lists/oss-security/2021/09/15/4
- https://www.oracle.com/security-alerts/cpujul2022.html
- https://bugzilla.redhat.com/show_bug.cgi?id=1999544
- https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html
- https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
- https://lore.kernel.org/lkml/20211115165435.133245729%40linuxfoundation.org/
- https://security.netapp.com/advisory/ntap-20220318-0009/
- https://www.debian.org/security/2022/dsa-5096
- https://www.openwall.com/lists/oss-security/2021/09/15/4
- https://www.oracle.com/security-alerts/cpujul2022.html
Modified: 2024-11-21
CVE-2021-3753
A race problem was seen in the vt_k_ioctl in drivers/tty/vt/vt_ioctl.c in the Linux kernel, which may cause an out of bounds read in vt as the write access to vc_mode is not protected by lock-in vt_ioctl (KDSETMDE). The highest threat from this vulnerability is to data confidentiality.
- https://bugzilla.redhat.com/show_bug.cgi?id=1999589
- https://github.com/torvalds/linux/commit/2287a51ba822384834dafc1c798453375d1107c7
- https://security.netapp.com/advisory/ntap-20221028-0003/
- https://www.openwall.com/lists/oss-security/2021/09/01/4
- https://bugzilla.redhat.com/show_bug.cgi?id=1999589
- https://github.com/torvalds/linux/commit/2287a51ba822384834dafc1c798453375d1107c7
- https://security.netapp.com/advisory/ntap-20221028-0003/
- https://www.openwall.com/lists/oss-security/2021/09/01/4
Modified: 2024-11-21
CVE-2021-3764
A memory leak flaw was found in the Linux kernel's ccp_run_aes_gcm_cmd() function that allows an attacker to cause a denial of service. The vulnerability is similar to the older CVE-2019-18808. The highest threat from this vulnerability is to system availability.
- https://access.redhat.com/security/cve/CVE-2021-3764
- https://bugzilla.redhat.com/show_bug.cgi?id=1997467
- https://github.com/torvalds/linux/commit/505d9dcb0f7ddf9d075e729523a33d38642ae680
- https://security-tracker.debian.org/tracker/CVE-2021-3764
- https://access.redhat.com/security/cve/CVE-2021-3764
- https://bugzilla.redhat.com/show_bug.cgi?id=1997467
- https://github.com/torvalds/linux/commit/505d9dcb0f7ddf9d075e729523a33d38642ae680
- https://security-tracker.debian.org/tracker/CVE-2021-3764
Modified: 2024-11-21
CVE-2021-3772
A flaw was found in the Linux SCTP stack. A blind attacker may be able to kill an existing SCTP association through invalid chunks if the attacker knows the IP-addresses and port numbers being used and the attacker can send packets with spoofed IP addresses.
- https://bugzilla.redhat.com/show_bug.cgi?id=2000694
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=32f8807a48ae55be0e76880cfe8607a18b5bb0df
- https://github.com/torvalds/linux/commit/32f8807a48ae55be0e76880cfe8607a18b5bb0df
- https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
- https://security.netapp.com/advisory/ntap-20221007-0001/
- https://ubuntu.com/security/CVE-2021-3772
- https://www.debian.org/security/2022/dsa-5096
- https://www.oracle.com/security-alerts/cpujul2022.html
- https://bugzilla.redhat.com/show_bug.cgi?id=2000694
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=32f8807a48ae55be0e76880cfe8607a18b5bb0df
- https://github.com/torvalds/linux/commit/32f8807a48ae55be0e76880cfe8607a18b5bb0df
- https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
- https://security.netapp.com/advisory/ntap-20221007-0001/
- https://ubuntu.com/security/CVE-2021-3772
- https://www.debian.org/security/2022/dsa-5096
- https://www.oracle.com/security-alerts/cpujul2022.html
Modified: 2024-11-21
CVE-2021-4001
A race condition was found in the Linux kernel's ebpf verifier between bpf_map_update_elem and bpf_map_freeze due to a missing lock in kernel/bpf/syscall.c. In this flaw, a local user with a special privilege (cap_sys_admin or cap_bpf) can modify the frozen mapped address space. This flaw affects kernel versions prior to 5.16 rc2.
- https://bugzilla.redhat.com/show_bug.cgi?id=2025645
- https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/commit/?id=353050be4c19e102178ccc05988101887c25ae53
- https://bugzilla.redhat.com/show_bug.cgi?id=2025645
- https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/commit/?id=353050be4c19e102178ccc05988101887c25ae53
Modified: 2024-11-21
CVE-2021-4149
A vulnerability was found in btrfs_alloc_tree_b in fs/btrfs/extent-tree.c in the Linux kernel due to an improper lock operation in btrfs. In this flaw, a user with a local privilege may cause a denial of service (DOS) due to a deadlock problem.
- https://bugzilla.redhat.com/show_bug.cgi?id=2026485
- https://lists.debian.org/debian-lts-announce/2022/07/msg00000.html
- https://lkml.org/lkml/2021/10/18/885
- https://lkml.org/lkml/2021/9/13/2565
- https://bugzilla.redhat.com/show_bug.cgi?id=2026485
- https://lists.debian.org/debian-lts-announce/2022/07/msg00000.html
- https://lkml.org/lkml/2021/10/18/885
- https://lkml.org/lkml/2021/9/13/2565
Modified: 2024-11-21
CVE-2021-4150
A use-after-free flaw was found in the add_partition in block/partitions/core.c in the Linux kernel. A local attacker with user privileges could cause a denial of service on the system. The issue results from the lack of code cleanup when device_add call fails when adding a partition to the disk.
Modified: 2024-11-21
CVE-2021-4203
A use-after-free read flaw was found in sock_getsockopt() in net/core/sock.c due to SO_PEERCRED and SO_PEERGROUPS race with listen() (and connect()) in the Linux kernel. In this flaw, an attacker with a user privileges may crash the system or leak internal kernel information.
- https://bugs.chromium.org/p/project-zero/issues/detail?id=2230&can=7&q=modified-after%3Atoday-30&sort=-modified&colspec=ID%20Type%20Status%20Priority%20Milestone%20Owner%20Summary%20Modified%20Cve&cells=tiles&redir=1
- https://bugzilla.redhat.com/show_bug.cgi?id=2036934
- https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=35306eb23814
- https://lore.kernel.org/netdev/20210929225750.2548112-1-eric.dumazet%40gmail.com/T/
- https://security.netapp.com/advisory/ntap-20221111-0003/
- https://www.oracle.com/security-alerts/cpujul2022.html
- https://bugs.chromium.org/p/project-zero/issues/detail?id=2230&can=7&q=modified-after%3Atoday-30&sort=-modified&colspec=ID%20Type%20Status%20Priority%20Milestone%20Owner%20Summary%20Modified%20Cve&cells=tiles&redir=1
- https://bugzilla.redhat.com/show_bug.cgi?id=2036934
- https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=35306eb23814
- https://lore.kernel.org/netdev/20210929225750.2548112-1-eric.dumazet%40gmail.com/T/
- https://security.netapp.com/advisory/ntap-20221111-0003/
- https://www.oracle.com/security-alerts/cpujul2022.html
Modified: 2024-11-21
CVE-2021-43975
In the Linux kernel through 5.15.2, hw_atl_utils_fw_rpc_wait in drivers/net/ethernet/aquantia/atlantic/hw_atl/hw_atl_utils.c allows an attacker (who can introduce a crafted device) to trigger an out-of-bounds write via a crafted length value.
- https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=b922f622592af76b57cbc566eaeccda0b31a3496
- https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X24M7KDC4OJOZNS3RDSYC7ELNELOLQ2N/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YODMYMGZYDXQKGJGX7TJG4XV4L5YLLBD/
- https://lore.kernel.org/netdev/163698540868.13805.17800408021782408762.git-patchwork-notify%40kernel.org/T/
- https://security.netapp.com/advisory/ntap-20211210-0001/
- https://www.debian.org/security/2022/dsa-5096
- https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=b922f622592af76b57cbc566eaeccda0b31a3496
- https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X24M7KDC4OJOZNS3RDSYC7ELNELOLQ2N/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YODMYMGZYDXQKGJGX7TJG4XV4L5YLLBD/
- https://lore.kernel.org/netdev/163698540868.13805.17800408021782408762.git-patchwork-notify%40kernel.org/T/
- https://security.netapp.com/advisory/ntap-20211210-0001/
- https://www.debian.org/security/2022/dsa-5096
Modified: 2024-11-21
CVE-2021-43976
In the Linux kernel through 5.15.2, mwifiex_usb_recv in drivers/net/wireless/marvell/mwifiex/usb.c allows an attacker (who can connect a crafted USB device) to cause a denial of service (skb_over_panic).
- https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=04d80663f67ccef893061b49ec8a42ff7045ae84
- https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html
- https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X24M7KDC4OJOZNS3RDSYC7ELNELOLQ2N/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YODMYMGZYDXQKGJGX7TJG4XV4L5YLLBD/
- https://patchwork.kernel.org/project/linux-wireless/patch/YX4CqjfRcTa6bVL+%40Zekuns-MBP-16.fios-router.home/
- https://security.netapp.com/advisory/ntap-20211210-0001/
- https://www.debian.org/security/2022/dsa-5092
- https://www.debian.org/security/2022/dsa-5096
- https://www.oracle.com/security-alerts/cpujul2022.html
- https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=04d80663f67ccef893061b49ec8a42ff7045ae84
- https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html
- https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X24M7KDC4OJOZNS3RDSYC7ELNELOLQ2N/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YODMYMGZYDXQKGJGX7TJG4XV4L5YLLBD/
- https://patchwork.kernel.org/project/linux-wireless/patch/YX4CqjfRcTa6bVL+%40Zekuns-MBP-16.fios-router.home/
- https://security.netapp.com/advisory/ntap-20211210-0001/
- https://www.debian.org/security/2022/dsa-5092
- https://www.debian.org/security/2022/dsa-5096
- https://www.oracle.com/security-alerts/cpujul2022.html
Modified: 2024-11-21
CVE-2021-45868
In the Linux kernel before 5.15.3, fs/quota/quota_tree.c does not validate the block number in the quota tree (on disk). This can, for example, lead to a kernel/locking/rwsem.c use-after-free if there is a corrupted quota file.
- https://bugzilla.kernel.org/show_bug.cgi?id=214655
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.3
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9bf3d20331295b1ecb81f4ed9ef358c51699a050
- https://security.netapp.com/advisory/ntap-20220419-0003/
- https://www.openwall.com/lists/oss-security/2022/03/17/1
- https://www.openwall.com/lists/oss-security/2022/03/17/2
- https://bugzilla.kernel.org/show_bug.cgi?id=214655
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.3
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9bf3d20331295b1ecb81f4ed9ef358c51699a050
- https://security.netapp.com/advisory/ntap-20220419-0003/
- https://www.openwall.com/lists/oss-security/2022/03/17/1
- https://www.openwall.com/lists/oss-security/2022/03/17/2
Modified: 2025-02-03
CVE-2021-47098
In the Linux kernel, the following vulnerability has been resolved: hwmon: (lm90) Prevent integer overflow/underflow in hysteresis calculations Commit b50aa49638c7 ("hwmon: (lm90) Prevent integer underflows of temperature calculations") addressed a number of underflow situations when writing temperature limits. However, it missed one situation, seen when an attempt is made to set the hysteresis value to MAX_LONG and the critical temperature limit is negative. Use clamp_val() when setting the hysteresis temperature to ensure that the provided value can never overflow or underflow.
Modified: 2025-01-14
CVE-2021-47202
In the Linux kernel, the following vulnerability has been resolved: thermal: Fix NULL pointer dereferences in of_thermal_ functions of_parse_thermal_zones() parses the thermal-zones node and registers a thermal_zone device for each subnode. However, if a thermal zone is consuming a thermal sensor and that thermal sensor device hasn't probed yet, an attempt to set trip_point_*_temp for that thermal zone device can cause a NULL pointer dereference. Fix it. console:/sys/class/thermal/thermal_zone87 # echo 120000 > trip_point_0_temp ... Unable to handle kernel NULL pointer dereference at virtual address 0000000000000020 ... Call trace: of_thermal_set_trip_temp+0x40/0xc4 trip_point_temp_store+0xc0/0x1dc dev_attr_store+0x38/0x88 sysfs_kf_write+0x64/0xc0 kernfs_fop_write_iter+0x108/0x1d0 vfs_write+0x2f4/0x368 ksys_write+0x7c/0xec __arm64_sys_write+0x20/0x30 el0_svc_common.llvm.7279915941325364641+0xbc/0x1bc do_el0_svc+0x28/0xa0 el0_svc+0x14/0x24 el0_sync_handler+0x88/0xec el0_sync+0x1c0/0x200 While at it, fix the possible NULL pointer dereference in other functions as well: of_thermal_get_temp(), of_thermal_set_emul_temp(), of_thermal_get_trend().
- https://git.kernel.org/stable/c/0750f769b95841b34a9fe8c418dd792ff526bf86
- https://git.kernel.org/stable/c/6a315471cb6a07f651e1d3adc8962730f4fcccac
- https://git.kernel.org/stable/c/828f4c31684da94ecf0b44a2cbd35bbede04f0bd
- https://git.kernel.org/stable/c/96cfe05051fd8543cdedd6807ec59a0e6c409195
- https://git.kernel.org/stable/c/ef2590a5305e0b8e9342f84c2214aa478ee7f28e
- https://git.kernel.org/stable/c/0750f769b95841b34a9fe8c418dd792ff526bf86
- https://git.kernel.org/stable/c/6a315471cb6a07f651e1d3adc8962730f4fcccac
- https://git.kernel.org/stable/c/828f4c31684da94ecf0b44a2cbd35bbede04f0bd
- https://git.kernel.org/stable/c/96cfe05051fd8543cdedd6807ec59a0e6c409195
- https://git.kernel.org/stable/c/ef2590a5305e0b8e9342f84c2214aa478ee7f28e
Modified: 2025-09-24
CVE-2021-47474
In the Linux kernel, the following vulnerability has been resolved: comedi: vmk80xx: fix bulk-buffer overflow The driver is using endpoint-sized buffers but must not assume that the tx and rx buffers are of equal size or a malicious device could overflow the slab-allocated receive buffer when doing bulk transfers.
- https://git.kernel.org/stable/c/063f576c43d589a4c153554b681d32b3f8317c7b
- https://git.kernel.org/stable/c/0866dcaa828c21bc2f94dac00e086078f11b5772
- https://git.kernel.org/stable/c/1ae4715121a57bc6fa29fd992127b01907f2f993
- https://git.kernel.org/stable/c/47b4636ebdbeba2044b3db937c4d2b6a4fe3d0f2
- https://git.kernel.org/stable/c/78cdfd62bd54af615fba9e3ca1ba35de39d3871d
- https://git.kernel.org/stable/c/7b0e356189327287d0eb98ec081bd6dd97068cd3
- https://git.kernel.org/stable/c/7cfb35db607760698d299fd1cf7402dfa8f09973
- https://git.kernel.org/stable/c/b7fd7f3387f070215e6be341e68eb5c087eeecc0
- https://git.kernel.org/stable/c/e0e6a63fd97ad95fe05dfd77268a1952551e11a7
- https://git.kernel.org/stable/c/063f576c43d589a4c153554b681d32b3f8317c7b
- https://git.kernel.org/stable/c/0866dcaa828c21bc2f94dac00e086078f11b5772
- https://git.kernel.org/stable/c/1ae4715121a57bc6fa29fd992127b01907f2f993
- https://git.kernel.org/stable/c/47b4636ebdbeba2044b3db937c4d2b6a4fe3d0f2
- https://git.kernel.org/stable/c/78cdfd62bd54af615fba9e3ca1ba35de39d3871d
- https://git.kernel.org/stable/c/7b0e356189327287d0eb98ec081bd6dd97068cd3
- https://git.kernel.org/stable/c/7cfb35db607760698d299fd1cf7402dfa8f09973
- https://git.kernel.org/stable/c/b7fd7f3387f070215e6be341e68eb5c087eeecc0
- https://git.kernel.org/stable/c/e0e6a63fd97ad95fe05dfd77268a1952551e11a7
Modified: 2025-09-24
CVE-2021-47475
In the Linux kernel, the following vulnerability has been resolved: comedi: vmk80xx: fix transfer-buffer overflows The driver uses endpoint-sized USB transfer buffers but up until recently had no sanity checks on the sizes. Commit e1f13c879a7c ("staging: comedi: check validity of wMaxPacketSize of usb endpoints found") inadvertently fixed NULL-pointer dereferences when accessing the transfer buffers in case a malicious device has a zero wMaxPacketSize. Make sure to allocate buffers large enough to handle also the other accesses that are done without a size check (e.g. byte 18 in vmk80xx_cnt_insn_read() for the VMK8061_MODEL) to avoid writing beyond the buffers, for example, when doing descriptor fuzzing. The original driver was for a low-speed device with 8-byte buffers. Support was later added for a device that uses bulk transfers and is presumably a full-speed device with a maximum 64-byte wMaxPacketSize.
- https://git.kernel.org/stable/c/06ac746d57e6d32b062e220415c607b7e2e0fa50
- https://git.kernel.org/stable/c/199acd8c110e3ae62833c24f632b0bb1c9f012a9
- https://git.kernel.org/stable/c/278484ae93297b1bb1ce755f9d3b6d95a48c7d47
- https://git.kernel.org/stable/c/33d7a470730dfe7c9bfc8da84575cf2cedd60d00
- https://git.kernel.org/stable/c/40d2a7e278e2e7c0a5fd7e997e7eb63945bf93f7
- https://git.kernel.org/stable/c/5229159f1d052821007aff1a1beb7873eacf1a9f
- https://git.kernel.org/stable/c/7a2021b896de1ad559d33b5c5cdd20b982242088
- https://git.kernel.org/stable/c/a23461c47482fc232ffc9b819539d1f837adf2b1
- https://git.kernel.org/stable/c/ec85bcff4ed09260243d8f39faba99e1041718ba
- https://git.kernel.org/stable/c/06ac746d57e6d32b062e220415c607b7e2e0fa50
- https://git.kernel.org/stable/c/199acd8c110e3ae62833c24f632b0bb1c9f012a9
- https://git.kernel.org/stable/c/278484ae93297b1bb1ce755f9d3b6d95a48c7d47
- https://git.kernel.org/stable/c/33d7a470730dfe7c9bfc8da84575cf2cedd60d00
- https://git.kernel.org/stable/c/40d2a7e278e2e7c0a5fd7e997e7eb63945bf93f7
- https://git.kernel.org/stable/c/5229159f1d052821007aff1a1beb7873eacf1a9f
- https://git.kernel.org/stable/c/7a2021b896de1ad559d33b5c5cdd20b982242088
- https://git.kernel.org/stable/c/a23461c47482fc232ffc9b819539d1f837adf2b1
- https://git.kernel.org/stable/c/ec85bcff4ed09260243d8f39faba99e1041718ba
Modified: 2025-04-02
CVE-2021-47476
In the Linux kernel, the following vulnerability has been resolved: comedi: ni_usb6501: fix NULL-deref in command paths The driver uses endpoint-sized USB transfer buffers but had no sanity checks on the sizes. This can lead to zero-size-pointer dereferences or overflowed transfer buffers in ni6501_port_command() and ni6501_counter_command() if a (malicious) device has smaller max-packet sizes than expected (or when doing descriptor fuzz testing). Add the missing sanity checks to probe().
- https://git.kernel.org/stable/c/4a9d43cb5d5f39fa39fc1da438517004cc95f7ea
- https://git.kernel.org/stable/c/58478143771b20ab219937b1c30a706590a59224
- https://git.kernel.org/stable/c/907767da8f3a925b060c740e0b5c92ea7dbec440
- https://git.kernel.org/stable/c/aa39738423503825625853b643b9e99d11c23816
- https://git.kernel.org/stable/c/b0156b7c9649d8f55a2ce3d3258509f1b2a181c3
- https://git.kernel.org/stable/c/bc51111bf6e8e7b6cc94b133e4c291273a16acd1
- https://git.kernel.org/stable/c/d6a727a681a39ae4f73081a9bedb45d14f95bdd1
- https://git.kernel.org/stable/c/df7b1238f3b599a0b9284249772cdfd1ea83a632
- https://git.kernel.org/stable/c/ef143dc0c3defe56730ecd3a9de7b3e1d7e557c1
- https://git.kernel.org/stable/c/4a9d43cb5d5f39fa39fc1da438517004cc95f7ea
- https://git.kernel.org/stable/c/58478143771b20ab219937b1c30a706590a59224
- https://git.kernel.org/stable/c/907767da8f3a925b060c740e0b5c92ea7dbec440
- https://git.kernel.org/stable/c/aa39738423503825625853b643b9e99d11c23816
- https://git.kernel.org/stable/c/b0156b7c9649d8f55a2ce3d3258509f1b2a181c3
- https://git.kernel.org/stable/c/bc51111bf6e8e7b6cc94b133e4c291273a16acd1
- https://git.kernel.org/stable/c/d6a727a681a39ae4f73081a9bedb45d14f95bdd1
- https://git.kernel.org/stable/c/df7b1238f3b599a0b9284249772cdfd1ea83a632
- https://git.kernel.org/stable/c/ef143dc0c3defe56730ecd3a9de7b3e1d7e557c1
Modified: 2025-09-24
CVE-2021-47477
In the Linux kernel, the following vulnerability has been resolved: comedi: dt9812: fix DMA buffers on stack USB transfer buffers are typically mapped for DMA and must not be allocated on the stack or transfers will fail. Allocate proper transfer buffers in the various command helpers and return an error on short transfers instead of acting on random stack data. Note that this also fixes a stack info leak on systems where DMA is not used as 32 bytes are always sent to the device regardless of how short the command is.
- https://git.kernel.org/stable/c/20cebb8b620dc987e55ddc46801de986e081757e
- https://git.kernel.org/stable/c/365a346cda82f51d835c49136a00a9df8a78c7f2
- https://git.kernel.org/stable/c/39ea61037ae78f14fa121228dd962ea3280eacf3
- https://git.kernel.org/stable/c/3ac273d154d634e2034508a14db82a95d7ad12ed
- https://git.kernel.org/stable/c/3efb7af8ac437085b6c776e5b54830b149d86efe
- https://git.kernel.org/stable/c/536de747bc48262225889a533db6650731ab25d3
- https://git.kernel.org/stable/c/786f5b03450454557ff858a8bead5d7c0cbf78d6
- https://git.kernel.org/stable/c/8a52bc480992c7c9da3ebfea456af731f50a4b97
- https://git.kernel.org/stable/c/a6af69768d5cb4b2528946d53be5fa19ade37723
- https://git.kernel.org/stable/c/20cebb8b620dc987e55ddc46801de986e081757e
- https://git.kernel.org/stable/c/365a346cda82f51d835c49136a00a9df8a78c7f2
- https://git.kernel.org/stable/c/39ea61037ae78f14fa121228dd962ea3280eacf3
- https://git.kernel.org/stable/c/3ac273d154d634e2034508a14db82a95d7ad12ed
- https://git.kernel.org/stable/c/3efb7af8ac437085b6c776e5b54830b149d86efe
- https://git.kernel.org/stable/c/536de747bc48262225889a533db6650731ab25d3
- https://git.kernel.org/stable/c/786f5b03450454557ff858a8bead5d7c0cbf78d6
- https://git.kernel.org/stable/c/8a52bc480992c7c9da3ebfea456af731f50a4b97
- https://git.kernel.org/stable/c/a6af69768d5cb4b2528946d53be5fa19ade37723
Modified: 2025-04-02
CVE-2021-47478
In the Linux kernel, the following vulnerability has been resolved: isofs: Fix out of bound access for corrupted isofs image When isofs image is suitably corrupted isofs_read_inode() can read data beyond the end of buffer. Sanity-check the directory entry length before using it.
- https://git.kernel.org/stable/c/156ce5bb6cc43a80a743810199defb1dc3f55b7f
- https://git.kernel.org/stable/c/6e80e9314f8bb52d9eabe1907698718ff01120f5
- https://git.kernel.org/stable/c/86d4aedcbc69c0f84551fb70f953c24e396de2d7
- https://git.kernel.org/stable/c/9ec33a9b8790c212cc926a88c5e2105f97f3f57e
- https://git.kernel.org/stable/c/afbd40f425227e661d991757e11cc4db024e761f
- https://git.kernel.org/stable/c/b0ddff8d68f2e43857a84dce54c3deab181c8ae1
- https://git.kernel.org/stable/c/b2fa1f52d22c5455217b294629346ad23a744945
- https://git.kernel.org/stable/c/e7fb722586a2936b37bdff096c095c30ca06404d
- https://git.kernel.org/stable/c/e96a1866b40570b5950cda8602c2819189c62a48
- https://git.kernel.org/stable/c/156ce5bb6cc43a80a743810199defb1dc3f55b7f
- https://git.kernel.org/stable/c/6e80e9314f8bb52d9eabe1907698718ff01120f5
- https://git.kernel.org/stable/c/86d4aedcbc69c0f84551fb70f953c24e396de2d7
- https://git.kernel.org/stable/c/9ec33a9b8790c212cc926a88c5e2105f97f3f57e
- https://git.kernel.org/stable/c/afbd40f425227e661d991757e11cc4db024e761f
- https://git.kernel.org/stable/c/b0ddff8d68f2e43857a84dce54c3deab181c8ae1
- https://git.kernel.org/stable/c/b2fa1f52d22c5455217b294629346ad23a744945
- https://git.kernel.org/stable/c/e7fb722586a2936b37bdff096c095c30ca06404d
- https://git.kernel.org/stable/c/e96a1866b40570b5950cda8602c2819189c62a48
Modified: 2025-09-24
CVE-2021-47479
In the Linux kernel, the following vulnerability has been resolved: staging: rtl8712: fix use-after-free in rtl8712_dl_fw Syzbot reported use-after-free in rtl8712_dl_fw(). The problem was in race condition between r871xu_dev_remove() ->ndo_open() callback. It's easy to see from crash log, that driver accesses released firmware in ->ndo_open() callback. It may happen, since driver was releasing firmware _before_ unregistering netdev. Fix it by moving unregister_netdev() before cleaning up resources. Call Trace: ... rtl871x_open_fw drivers/staging/rtl8712/hal_init.c:83 [inline] rtl8712_dl_fw+0xd95/0xe10 drivers/staging/rtl8712/hal_init.c:170 rtl8712_hal_init drivers/staging/rtl8712/hal_init.c:330 [inline] rtl871x_hal_init+0xae/0x180 drivers/staging/rtl8712/hal_init.c:394 netdev_open+0xe6/0x6c0 drivers/staging/rtl8712/os_intfs.c:380 __dev_open+0x2bc/0x4d0 net/core/dev.c:1484 Freed by task 1306: ... release_firmware+0x1b/0x30 drivers/base/firmware_loader/main.c:1053 r871xu_dev_remove+0xcc/0x2c0 drivers/staging/rtl8712/usb_intf.c:599 usb_unbind_interface+0x1d8/0x8d0 drivers/usb/core/driver.c:458
- https://git.kernel.org/stable/c/a65c9afe9f2f55b7a7fb4a25ab654cd4139683a4
- https://git.kernel.org/stable/c/befd23bd3b17f1a3f9c943a8580b47444c7c63ed
- https://git.kernel.org/stable/c/c052cc1a069c3e575619cf64ec427eb41176ca70
- https://git.kernel.org/stable/c/c430094541a80575259a94ff879063ef01473506
- https://git.kernel.org/stable/c/a65c9afe9f2f55b7a7fb4a25ab654cd4139683a4
- https://git.kernel.org/stable/c/befd23bd3b17f1a3f9c943a8580b47444c7c63ed
- https://git.kernel.org/stable/c/c052cc1a069c3e575619cf64ec427eb41176ca70
- https://git.kernel.org/stable/c/c430094541a80575259a94ff879063ef01473506
Modified: 2025-09-29
CVE-2021-47480
In the Linux kernel, the following vulnerability has been resolved: scsi: core: Put LLD module refcnt after SCSI device is released SCSI host release is triggered when SCSI device is freed. We have to make sure that the low-level device driver module won't be unloaded before SCSI host instance is released because shost->hostt is required in the release handler. Make sure to put LLD module refcnt after SCSI device is released. Fixes a kernel panic of 'BUG: unable to handle page fault for address' reported by Changhui and Yi.
- https://git.kernel.org/stable/c/1105573d964f7b78734348466b01f5f6ba8a1813
- https://git.kernel.org/stable/c/1ce287eff9f23181d5644db787f472463a61f68b
- https://git.kernel.org/stable/c/61a0faa89f21861d1f8d059123b5c285a5d9ffee
- https://git.kernel.org/stable/c/7b57c38d12aed1b5d92f74748bed25e0d041729f
- https://git.kernel.org/stable/c/8e4814a461787e15a31d322d9efbe0d4f6822428
- https://git.kernel.org/stable/c/c2df161f69fb1c67f63adbd193368b47f511edc0
- https://git.kernel.org/stable/c/f2b85040acec9a928b4eb1b57a989324e8e38d3f
- https://git.kernel.org/stable/c/f30822c0b4c35ec86187ab055263943dc71a6836
- https://git.kernel.org/stable/c/1105573d964f7b78734348466b01f5f6ba8a1813
- https://git.kernel.org/stable/c/1ce287eff9f23181d5644db787f472463a61f68b
- https://git.kernel.org/stable/c/61a0faa89f21861d1f8d059123b5c285a5d9ffee
- https://git.kernel.org/stable/c/7b57c38d12aed1b5d92f74748bed25e0d041729f
- https://git.kernel.org/stable/c/8e4814a461787e15a31d322d9efbe0d4f6822428
- https://git.kernel.org/stable/c/c2df161f69fb1c67f63adbd193368b47f511edc0
- https://git.kernel.org/stable/c/f2b85040acec9a928b4eb1b57a989324e8e38d3f
- https://git.kernel.org/stable/c/f30822c0b4c35ec86187ab055263943dc71a6836
Modified: 2025-04-21
CVE-2021-47671
In the Linux kernel, the following vulnerability has been resolved: can: etas_es58x: es58x_rx_err_msg(): fix memory leak in error path In es58x_rx_err_msg(), if can->do_set_mode() fails, the function directly returns without calling netif_rx(skb). This means that the skb previously allocated by alloc_can_err_skb() is not freed. In other terms, this is a memory leak. This patch simply removes the return statement in the error branch and let the function continue. Issue was found with GCC -fanalyzer, please follow the link below for details.
Modified: 2024-11-21
CVE-2022-0322
A flaw was found in the sctp_make_strreset_req function in net/sctp/sm_make_chunk.c in the SCTP network protocol in the Linux kernel with a local user privilege access. In this flaw, an attempt to use more buffer than is allocated triggers a BUG_ON issue, leading to a denial of service (DOS).
- https://bugzilla.redhat.com/show_bug.cgi?id=2042822
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a2d859e3fc97e79d907761550dbc03ff1b36479c
- https://www.oracle.com/security-alerts/cpujul2022.html
- https://bugzilla.redhat.com/show_bug.cgi?id=2042822
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a2d859e3fc97e79d907761550dbc03ff1b36479c
- https://www.oracle.com/security-alerts/cpujul2022.html
Modified: 2024-11-21
CVE-2022-0480
A flaw was found in the filelock_init in fs/locks.c function in the Linux kernel. This issue can lead to host memory exhaustion due to memcg not limiting the number of Portable Operating System Interface (POSIX) file locks.
- https://access.redhat.com/security/cve/CVE-2022-0480
- https://bugzilla.redhat.com/show_bug.cgi?id=2049700
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0f12156dff2862ac54235fc72703f18770769042
- https://github.com/kata-containers/kata-containers/issues/3373
- https://lore.kernel.org/linux-mm/20210902215519.AWcuVc3li%25akpm%40linux-foundation.org/
- https://ubuntu.com/security/CVE-2022-0480
- https://access.redhat.com/security/cve/CVE-2022-0480
- https://bugzilla.redhat.com/show_bug.cgi?id=2049700
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0f12156dff2862ac54235fc72703f18770769042
- https://github.com/kata-containers/kata-containers/issues/3373
- https://lore.kernel.org/linux-mm/20210902215519.AWcuVc3li%25akpm%40linux-foundation.org/
- https://ubuntu.com/security/CVE-2022-0480
Modified: 2024-11-21
CVE-2022-1508
An out-of-bounds read flaw was found in the Linux kernel’s io_uring module in the way a user triggers the io_read() function with some special parameters. This flaw allows a local user to read some memory out of bounds.
- https://access.redhat.com/security/cve/CVE-2022-1508
- https://bugzilla.redhat.com/show_bug.cgi?id=2075533
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=89c2b3b74918200e46699338d7bcc19b1ea12110
- https://ubuntu.com/security/CVE-2022-1508
- https://access.redhat.com/security/cve/CVE-2022-1508
- https://bugzilla.redhat.com/show_bug.cgi?id=2075533
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=89c2b3b74918200e46699338d7bcc19b1ea12110
- https://ubuntu.com/security/CVE-2022-1508
Modified: 2024-11-21
CVE-2022-2991
A heap-based buffer overflow was found in the Linux kernel's LightNVM subsystem. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. This vulnerability allows a local attacker to escalate privileges and execute arbitrary code in the context of the kernel. The attacker must first obtain the ability to execute high-privileged code on the target system to exploit this vulnerability.
- https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/drivers/lightnvm/Kconfig?h=v5.10.114&id=549209caabc89f2877ad5f62d11fca5c052e0e8
- https://www.zerodayinitiative.com/advisories/ZDI-22-960/
- https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/drivers/lightnvm/Kconfig?h=v5.10.114&id=549209caabc89f2877ad5f62d11fca5c052e0e8
- https://www.zerodayinitiative.com/advisories/ZDI-22-960/
Modified: 2025-04-23
CVE-2023-1252
A use-after-free flaw was found in the Linux kernel’s Ext4 File System in how a user triggers several file operations simultaneously with the overlay FS usage. This flaw allows a local user to crash or potentially escalate their privileges on the system. Only if patch 9a2544037600 ("ovl: fix use after free in struct ovl_aio_req") not applied yet, the kernel could be affected.
Modified: 2024-11-25
CVE-2024-0564
A flaw was found in the Linux kernel's memory deduplication mechanism. The max page sharing of Kernel Samepage Merging (KSM), added in Linux kernel version 4.4.0-96.119, can create a side channel. When the attacker and the victim share the same host and the default setting of KSM is "max page sharing=256", it is possible for the attacker to time the unmap to merge with the victim's page. The unmapping time depends on whether it merges with the victim's page and additional physical pages are created beyond the KSM's "max page share". Through these operations, the attacker can leak the victim's page.
- https://access.redhat.com/security/cve/CVE-2024-0564
- https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1680513
- https://bugzilla.redhat.com/show_bug.cgi?id=2258514
- https://link.springer.com/conference/wisa
- https://wisa.or.kr/accepted
- https://access.redhat.com/security/cve/CVE-2024-0564
- https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1680513
- https://bugzilla.redhat.com/show_bug.cgi?id=2258514
- https://link.springer.com/conference/wisa
- https://wisa.or.kr/accepted
Modified: 2025-11-03
CVE-2024-50121
In the Linux kernel, the following vulnerability has been resolved: nfsd: cancel nfsd_shrinker_work using sync mode in nfs4_state_shutdown_net In the normal case, when we excute `echo 0 > /proc/fs/nfsd/threads`, the function `nfs4_state_destroy_net` in `nfs4_state_shutdown_net` will release all resources related to the hashed `nfs4_client`. If the `nfsd_client_shrinker` is running concurrently, the `expire_client` function will first unhash this client and then destroy it. This can lead to the following warning. Additionally, numerous use-after-free errors may occur as well. nfsd_client_shrinker echo 0 > /proc/fs/nfsd/threads expire_client nfsd_shutdown_net unhash_client ... nfs4_state_shutdown_net /* won't wait shrinker exit */ /* cancel_work(&nn->nfsd_shrinker_work) * nfsd_file for this /* won't destroy unhashed client1 */ * client1 still alive nfs4_state_destroy_net */ nfsd_file_cache_shutdown /* trigger warning */ kmem_cache_destroy(nfsd_file_slab) kmem_cache_destroy(nfsd_file_mark_slab) /* release nfsd_file and mark */ __destroy_client ==================================================================== BUG nfsd_file (Not tainted): Objects remaining in nfsd_file on __kmem_cache_shutdown() -------------------------------------------------------------------- CPU: 4 UID: 0 PID: 764 Comm: sh Not tainted 6.12.0-rc3+ #1 dump_stack_lvl+0x53/0x70 slab_err+0xb0/0xf0 __kmem_cache_shutdown+0x15c/0x310 kmem_cache_destroy+0x66/0x160 nfsd_file_cache_shutdown+0xac/0x210 [nfsd] nfsd_destroy_serv+0x251/0x2a0 [nfsd] nfsd_svc+0x125/0x1e0 [nfsd] write_threads+0x16a/0x2a0 [nfsd] nfsctl_transaction_write+0x74/0xa0 [nfsd] vfs_write+0x1a5/0x6d0 ksys_write+0xc1/0x160 do_syscall_64+0x5f/0x170 entry_SYSCALL_64_after_hwframe+0x76/0x7e ==================================================================== BUG nfsd_file_mark (Tainted: G B W ): Objects remaining nfsd_file_mark on __kmem_cache_shutdown() -------------------------------------------------------------------- dump_stack_lvl+0x53/0x70 slab_err+0xb0/0xf0 __kmem_cache_shutdown+0x15c/0x310 kmem_cache_destroy+0x66/0x160 nfsd_file_cache_shutdown+0xc8/0x210 [nfsd] nfsd_destroy_serv+0x251/0x2a0 [nfsd] nfsd_svc+0x125/0x1e0 [nfsd] write_threads+0x16a/0x2a0 [nfsd] nfsctl_transaction_write+0x74/0xa0 [nfsd] vfs_write+0x1a5/0x6d0 ksys_write+0xc1/0x160 do_syscall_64+0x5f/0x170 entry_SYSCALL_64_after_hwframe+0x76/0x7e To resolve this issue, cancel `nfsd_shrinker_work` using synchronous mode in nfs4_state_shutdown_net.
- https://git.kernel.org/stable/c/36775f42e039b01d4abe8998bf66771a37d3cdcc
- https://git.kernel.org/stable/c/5ade4382de16c34d9259cb548f36ec5c4555913c
- https://git.kernel.org/stable/c/add1df5eba163a3a6ece11cb85890e2e410baaea
- https://git.kernel.org/stable/c/d5ff2fb2e7167e9483846e34148e60c0c016a1f6
- https://git.kernel.org/stable/c/f67138dd338cb564ade7d3755c8cd4f68b46d397
- https://git.kernel.org/stable/c/f965dc0f099a54fca100acf6909abe52d0c85328
- https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html
- https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html
