ALT-PU-2021-3282-2
Package kernel-image-std-def updated to version 5.10.78-alt0.c9f.2 for branch c9f2 in task 289377.
Closed vulnerabilities
Modified: 2024-04-03
BDU:2021-05673
Уязвимость реализации функции tipc_crypto_key_rcv() протокола для внутрикластерного взаимодействия Transparent Inter-Process Communication (TIPC) ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии
Modified: 2024-06-10
BDU:2022-05646
Уязвимость интерфейса контроллера NFC (NCI) ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии
Modified: 2024-12-05
BDU:2024-07041
Уязвимость функции cmtp_add_connection драйвера /isdn/capi/kcapi.c компонента isdn ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2024-10595
Уязвимость компонентов net/tls ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2024-10626
Уязвимость компонента cfg80211 ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2024-10627
Уязвимость компонента ocfs2 ядра операционной системы Linux, позволяющая нарушителю повысить привилегии в системе
BDU:2024-10629
Уязвимость компонентов mm, thp ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-08-19
BDU:2024-10630
Уязвимость компонента khugepaged ядра операционной системы Linux, позволяющая нарушителю читать и манипулировать данными
BDU:2024-10633
Уязвимость компонентов riscv, bpf ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2026-02-09
BDU:2024-10634
Уязвимость компонентов IB/qib ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
Modified: 2026-01-20
BDU:2024-10636
Уязвимость компонента regmap ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2024-10637
Уязвимость компонента batman-adv ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2025-00786
Уязвимость функции devm_regmap_init_encx24j600 компонента encx24j600 ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2025-02850
Уязвимость функции nouveau_gem_new() модуля drivers/gpu/drm/nouveau/nouveau_gem.c - драйвера поддержки инфраструктуры прямого рендеринга (DRI) видеокарт Nouveau (NVIDIA) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании.
BDU:2025-03279
Уязвимость функции ttm_transfered_destroy() модуля drivers/gpu/drm/ttm/ttm_bo_util.c - драйвера поддержки инфраструктуры прямого рендеринга (DRI) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании.
BDU:2025-03655
Уязвимость функции ci_hdrc_imx_probe() модуля drivers/usb/chipidea/ci_hdrc_imx.c - драйвера поддержки устройств шины USB ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании.
BDU:2025-03657
Уязвимость структуры nouveau_pstate_fops{} модуля drivers/gpu/drm/nouveau/nouveau_debugfs.c - драйвера поддержки инфраструктуры прямого рендеринга (DRI) видеокарт Nouveau (NVIDIA) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании.
BDU:2025-03658
Уязвимость функции dsps_probe() модуля drivers/usb/musb/musb_dsps.c - драйвера поддержки устройств шины USB ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании.
BDU:2025-03659
Уязвимость функции digital_in_send_sdd_req() модуля net/nfc/digital_technology.c подсистемы NFC ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании.
BDU:2025-03661
Уязвимость функции qla2x00_process_els() модуля drivers/scsi/qla2xxx/qla_bsg.c - драйвера поддержки устройств SCSI ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании.
Modified: 2025-08-19
BDU:2025-04382
Уязвимость функции kmem_cache_open() модуля mm/slub.c подсистемы управления памятью ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2025-04384
Уязвимость функции mlx5_core_destroy_cq() модуля drivers/net/ethernet/mellanox/mlx5/core/cq.c - драйвера поддержки сетевых адаптеров Ethernet Mellanox ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2025-04387
Уязвимость функции bpf_int_jit_compile() модуля arch/s390/net/bpf_jit_comp.c на платформе S390 ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2025-04388
Уязвимость структуры nv50_crc_flip_threshold_fops{} модуля drivers/gpu/drm/nouveau/dispnv50/crc.c - драйвера поддержки инфраструктуры прямого рендеринга (DRI) видеокарт Nouveau (NVIDIA) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2026-01-20
BDU:2025-04680
Уязвимость функции kmmpd() модуля fs/ext4/mmp.c поддержки файловой системы Ext4 ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2025-06022
Уязвимость кластерной файловой системы OCFS2 ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
BDU:2025-07411
Уязвимость функции peak_pci_remove() модуля drivers/net/can/sja1000/peak_pci.c - драйвера поддержки сетевых устройств CAN ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2025-07467
Уязвимость функции j1939_netdev_start() модуля net/can/j1939/main.c поддержки сокетов j1939 шины CAN ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2025-07490
Уязвимость функции audit_filter_rules() модуля kernel/auditsc.c ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2025-07491
Уязвимость функции mlxsw_thermal_set_cur_state() модуля drivers/net/ethernet/mellanox/mlxsw/core_thermal.c - драйвера поддержки сетевых адаптеров Ethernet Mellanox ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2025-07496
Уязвимость функции _GLOBAL_TOC модуля arch/powerpc/kvm/book3s_hv_rmhandlers.S подсистемы виртуализации на платформе PowerPC ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код с повышенными привилегиями или вызвать отказ в обслуживании
BDU:2025-14223
Уязвимость функции __mdiobus_register() модуля drivers/net/phy/mdio_bus.c драйвера поддержки сетевых адаптеров ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2025-14225
Уязвимость функции fifo_set_limit() модуля net/sched/sch_fifo.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2025-14226
Уязвимость функции taprio_destroy() модуля net/sched/sch_taprio.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2025-14228
Уязвимость функции btrfs_replace_file_extents() модуля fs/btrfs/file.c поддержки файловой системы btrfs ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2025-14230
Уязвимость функции ksz_switch_remove() модуля drivers/net/dsa/microchip/ksz_common.c драйвера поддержки DSA ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2025-14231
Уязвимость функции digital_tg_configure_hw() модуля net/nfc/digital_core.c подсистемы NFC ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2025-14232
Уязвимость функции ocfs2_set_inode_data_inline() модуля fs/ocfs2/alloc.c поддержки файловой системы OCFS2 ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на целостность и доступность защищаемой информации
BDU:2025-14233
Уязвимость функции scsi_device_put() модуля drivers/scsi/scsi.c драйвера поддержки устройств SCSI ядра операционной системы Linux, позволяющая нарушителю получить доступ к защищаемой информации или вызвать отказ в обслуживании
BDU:2025-14234
Уязвимость функции msm_edp_ctrl_power() модуля drivers/gpu/drm/msm/edp/edp_ctrl.c драйвера поддержки инфраструктуры прямого рендеринга (DRI) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2025-14236
Уязвимость функции idletimer_tg_create() модуля net/netfilter/xt_IDLETIMER.c компонента netfilter ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2025-14238
Уязвимость функции isotp_sendmsg() модуля net/can/isotp.c подсистемы шины CAN ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2025-14239
Уязвимость функции mxsfb_irq_disable() модуля drivers/gpu/drm/mxsfb/mxsfb_drv.c драйвера поддержки инфраструктуры прямого рендеринга (DRI) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2025-14324
Уязвимость функции connector_bad_edid() модуля drivers/gpu/drm/drm_edid.c драйвера поддержки инфраструктуры прямого рендеринга (DRI) ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на целостность и доступность защищаемой информации
BDU:2025-14327
Уязвимость функции xhci_handle_stopped_cmd_ring() модуля drivers/usb/host/xhci-ring.c драйвера поддержки устройств шины USB ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на доступность защищаемой информации
BDU:2025-14343
Уязвимость функции ipi_remote_fence_i() модуля arch/riscv/mm/cacheflush.c на процессорах с архитектурой RISC-V ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2025-14382
Уязвимость функции i40e_clear_interrupt_scheme() модуля drivers/net/ethernet/intel/i40e/i40e_main.c драйвера поддержки сетевых адаптеров Ethernet Intel ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2025-14383
Уязвимость функции i2c_acpi_notify() модуля drivers/i2c/i2c-core-acpi.c драйвера поддержки I2C ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2025-14384
Уязвимость функции program_check_common() модуля arch/powerpc/kernel/exceptions-64s.S ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2025-14562
Уязвимость функции nj_release() модуля drivers/isdn/hardware/mISDN/netjet.c драйвера поддержки оборудования mISDN ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2025-14563
Уязвимость функции usbnet_probe() модуля drivers/net/usb/usbnet.c драйвера поддержки сетевых адаптеров USB ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2025-14571
Уязвимость функции nvmem_shift_read_buffer_in_place() модуля drivers/nvmem/core.c драйвера поддержки устройств NVMEM (энергонезависимой памяти) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2025-14596
Уязвимость функции __cpu_die() модуля arch/powerpc/kernel/smp.c поддержки платформы PowerPC ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2025-14599
Уязвимость функции gmc_v10_0_hw_fini() модуля drivers/gpu/drm/amd/amdgpu/gmc_v10_0.c драйвера поддержки инфраструктуры прямого рендеринга (DRI) AMD GPU ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2025-14600
Уязвимость функции setup_smap() модуля arch/x86/kernel/cpu/common.c на платформе x86 ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на доступность защищаемой информации
BDU:2026-00017
Уязвимость функции userfaultfd_writeprotect() модуля fs/userfaultfd.c поддержки файловой системы ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
Modified: 2024-12-11
CVE-2020-36788
In the Linux kernel, the following vulnerability has been resolved: drm/nouveau: avoid a use-after-free when BO init fails nouveau_bo_init() is backed by ttm_bo_init() and ferries its return code back to the caller. On failures, ttm_bo_init() invokes the provided destructor which should de-initialize and free the memory. Thus, when nouveau_bo_init() returns an error the gem object has already been released and the memory freed by nouveau_bo_del_ttm().
- https://git.kernel.org/stable/c/548f2ff8ea5e0ce767ae3418d1ec5308990be87d
- https://git.kernel.org/stable/c/bcf34aa5082ee2343574bc3f4d1c126030913e54
- https://git.kernel.org/stable/c/f86e19d918a85492ad1a01fcdc0ad5ecbdac6f96
- https://git.kernel.org/stable/c/548f2ff8ea5e0ce767ae3418d1ec5308990be87d
- https://git.kernel.org/stable/c/bcf34aa5082ee2343574bc3f4d1c126030913e54
- https://git.kernel.org/stable/c/f86e19d918a85492ad1a01fcdc0ad5ecbdac6f96
Modified: 2024-11-21
CVE-2021-3760
A flaw was found in the Linux kernel. A use-after-free vulnerability in the NFC stack can lead to a threat to confidentiality, integrity, and system availability.
- https://bugzilla.redhat.com/show_bug.cgi?id=2000585
- https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
- https://security.netapp.com/advisory/ntap-20220318-0007/
- https://www.debian.org/security/2022/dsa-5096
- https://bugzilla.redhat.com/show_bug.cgi?id=2000585
- https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
- https://security.netapp.com/advisory/ntap-20220318-0007/
- https://www.debian.org/security/2022/dsa-5096
Modified: 2024-11-21
CVE-2021-43267
An issue was discovered in net/tipc/crypto.c in the Linux kernel before 5.14.16. The Transparent Inter-Process Communication (TIPC) functionality allows remote attackers to exploit insufficient validation of user-supplied sizes for the MSG_CRYPTO message type.
- http://www.openwall.com/lists/oss-security/2022/02/10/1
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.16
- https://github.com/torvalds/linux/commit/fa40d9734a57bcbfa79a280189799f76c88f7bb0
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CVWL7HZV5T5OEKJPO2D67RMFMKBBXGGB/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RDDEW4APTYKJK365HC2JZIVXYUV7ZRN7/
- https://security.netapp.com/advisory/ntap-20211125-0002/
- http://www.openwall.com/lists/oss-security/2022/02/10/1
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.16
- https://github.com/torvalds/linux/commit/fa40d9734a57bcbfa79a280189799f76c88f7bb0
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CVWL7HZV5T5OEKJPO2D67RMFMKBBXGGB/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RDDEW4APTYKJK365HC2JZIVXYUV7ZRN7/
- https://security.netapp.com/advisory/ntap-20211125-0002/
Modified: 2024-11-21
CVE-2021-4439
In the Linux kernel, the following vulnerability has been resolved: isdn: cpai: check ctr->cnr to avoid array index out of bound The cmtp_add_connection() would add a cmtp session to a controller and run a kernel thread to process cmtp. __module_get(THIS_MODULE); session->task = kthread_run(cmtp_session, session, "kcmtpd_ctr_%d", session->num); During this process, the kernel thread would call detach_capi_ctr() to detach a register controller. if the controller was not attached yet, detach_capi_ctr() would trigger an array-index-out-bounds bug. [ 46.866069][ T6479] UBSAN: array-index-out-of-bounds in drivers/isdn/capi/kcapi.c:483:21 [ 46.867196][ T6479] index -1 is out of range for type 'capi_ctr *[32]' [ 46.867982][ T6479] CPU: 1 PID: 6479 Comm: kcmtpd_ctr_0 Not tainted 5.15.0-rc2+ #8 [ 46.869002][ T6479] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.14.0-2 04/01/2014 [ 46.870107][ T6479] Call Trace: [ 46.870473][ T6479] dump_stack_lvl+0x57/0x7d [ 46.870974][ T6479] ubsan_epilogue+0x5/0x40 [ 46.871458][ T6479] __ubsan_handle_out_of_bounds.cold+0x43/0x48 [ 46.872135][ T6479] detach_capi_ctr+0x64/0xc0 [ 46.872639][ T6479] cmtp_session+0x5c8/0x5d0 [ 46.873131][ T6479] ? __init_waitqueue_head+0x60/0x60 [ 46.873712][ T6479] ? cmtp_add_msgpart+0x120/0x120 [ 46.874256][ T6479] kthread+0x147/0x170 [ 46.874709][ T6479] ? set_kthread_struct+0x40/0x40 [ 46.875248][ T6479] ret_from_fork+0x1f/0x30 [ 46.875773][ T6479]
- https://git.kernel.org/stable/c/1f3e2e97c003f80c4b087092b225c8787ff91e4d
- https://git.kernel.org/stable/c/24219a977bfe3d658687e45615c70998acdbac5a
- https://git.kernel.org/stable/c/285e9210b1fab96a11c0be3ed5cea9dd48b6ac54
- https://git.kernel.org/stable/c/7d91adc0ccb060ce564103315189466eb822cc6a
- https://git.kernel.org/stable/c/7f221ccbee4ec662e2292d490a43ce6c314c4594
- https://git.kernel.org/stable/c/9b6b2db77bc3121fe435f1d4b56e34de443bec75
- https://git.kernel.org/stable/c/cc20226e218a2375d50dd9ac14fb4121b43375ff
- https://git.kernel.org/stable/c/e8b8de17e164c9f1b7777f1c6f99d05539000036
- https://git.kernel.org/stable/c/1f3e2e97c003f80c4b087092b225c8787ff91e4d
- https://git.kernel.org/stable/c/24219a977bfe3d658687e45615c70998acdbac5a
- https://git.kernel.org/stable/c/285e9210b1fab96a11c0be3ed5cea9dd48b6ac54
- https://git.kernel.org/stable/c/7d91adc0ccb060ce564103315189466eb822cc6a
- https://git.kernel.org/stable/c/7f221ccbee4ec662e2292d490a43ce6c314c4594
- https://git.kernel.org/stable/c/9b6b2db77bc3121fe435f1d4b56e34de443bec75
- https://git.kernel.org/stable/c/cc20226e218a2375d50dd9ac14fb4121b43375ff
- https://git.kernel.org/stable/c/e8b8de17e164c9f1b7777f1c6f99d05539000036
Modified: 2024-12-26
CVE-2021-47342
In the Linux kernel, the following vulnerability has been resolved: ext4: fix possible UAF when remounting r/o a mmp-protected file system After commit 618f003199c6 ("ext4: fix memory leak in ext4_fill_super"), after the file system is remounted read-only, there is a race where the kmmpd thread can exit, causing sbi->s_mmp_tsk to point at freed memory, which the call to ext4_stop_mmpd() can trip over. Fix this by only allowing kmmpd() to exit when it is stopped via ext4_stop_mmpd(). Bug-Report-Link: <20210629143603.2166962-1-yebin10@huawei.com>
- https://git.kernel.org/stable/c/61bb4a1c417e5b95d9edb4f887f131de32e419cb
- https://git.kernel.org/stable/c/7ed572cdf11081f8f9e07abd4bea56a3f2c4edbd
- https://git.kernel.org/stable/c/b663890d854403e566169f7e90aed5cd6ff64f6b
- https://git.kernel.org/stable/c/61bb4a1c417e5b95d9edb4f887f131de32e419cb
- https://git.kernel.org/stable/c/7ed572cdf11081f8f9e07abd4bea56a3f2c4edbd
- https://git.kernel.org/stable/c/b663890d854403e566169f7e90aed5cd6ff64f6b
Modified: 2024-12-30
CVE-2021-47413
In the Linux kernel, the following vulnerability has been resolved: usb: chipidea: ci_hdrc_imx: Also search for 'phys' phandle When passing 'phys' in the devicetree to describe the USB PHY phandle (which is the recommended way according to Documentation/devicetree/bindings/usb/ci-hdrc-usb2.txt) the following NULL pointer dereference is observed on i.MX7 and i.MX8MM: [ 1.489344] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000098 [ 1.498170] Mem abort info: [ 1.500966] ESR = 0x96000044 [ 1.504030] EC = 0x25: DABT (current EL), IL = 32 bits [ 1.509356] SET = 0, FnV = 0 [ 1.512416] EA = 0, S1PTW = 0 [ 1.515569] FSC = 0x04: level 0 translation fault [ 1.520458] Data abort info: [ 1.523349] ISV = 0, ISS = 0x00000044 [ 1.527196] CM = 0, WnR = 1 [ 1.530176] [0000000000000098] user address but active_mm is swapper [ 1.536544] Internal error: Oops: 96000044 [#1] PREEMPT SMP [ 1.542125] Modules linked in: [ 1.545190] CPU: 3 PID: 7 Comm: kworker/u8:0 Not tainted 5.14.0-dirty #3 [ 1.551901] Hardware name: Kontron i.MX8MM N801X S (DT) [ 1.557133] Workqueue: events_unbound deferred_probe_work_func [ 1.562984] pstate: 80000005 (Nzcv daif -PAN -UAO -TCO BTYPE=--) [ 1.568998] pc : imx7d_charger_detection+0x3f0/0x510 [ 1.573973] lr : imx7d_charger_detection+0x22c/0x510 This happens because the charger functions check for the phy presence inside the imx_usbmisc_data structure (data->usb_phy), but the chipidea core populates the usb_phy passed via 'phys' inside 'struct ci_hdrc' (ci->usb_phy) instead. This causes the NULL pointer dereference inside imx7d_charger_detection(). Fix it by also searching for 'phys' in case 'fsl,usbphy' is not found. Tested on a imx7s-warp board.
- https://git.kernel.org/stable/c/66dd03b10e1c0b2fae006c6e34c18ea8ee033e7b
- https://git.kernel.org/stable/c/8253a34bfae3278baca52fc1209b7c29270486ca
- https://git.kernel.org/stable/c/b3265b88e83b16c7be762fa5fb7e0632bce0002c
- https://git.kernel.org/stable/c/66dd03b10e1c0b2fae006c6e34c18ea8ee033e7b
- https://git.kernel.org/stable/c/8253a34bfae3278baca52fc1209b7c29270486ca
- https://git.kernel.org/stable/c/b3265b88e83b16c7be762fa5fb7e0632bce0002c
Modified: 2025-09-25
CVE-2021-47414
In the Linux kernel, the following vulnerability has been resolved:
riscv: Flush current cpu icache before other cpus
On SiFive Unmatched, I recently fell onto the following BUG when booting:
[ 0.000000] ftrace: allocating 36610 entries in 144 pages
[ 0.000000] Oops - illegal instruction [#1]
[ 0.000000] Modules linked in:
[ 0.000000] CPU: 0 PID: 0 Comm: swapper Not tainted 5.13.1+ #5
[ 0.000000] Hardware name: SiFive HiFive Unmatched A00 (DT)
[ 0.000000] epc : riscv_cpuid_to_hartid_mask+0x6/0xae
[ 0.000000] ra : __sbi_rfence_v02+0xc8/0x10a
[ 0.000000] epc : ffffffff80007240 ra : ffffffff80009964 sp : ffffffff81803e10
[ 0.000000] gp : ffffffff81a1ea70 tp : ffffffff8180f500 t0 : ffffffe07fe30000
[ 0.000000] t1 : 0000000000000004 t2 : 0000000000000000 s0 : ffffffff81803e60
[ 0.000000] s1 : 0000000000000000 a0 : ffffffff81a22238 a1 : ffffffff81803e10
[ 0.000000] a2 : 0000000000000000 a3 : 0000000000000000 a4 : 0000000000000000
[ 0.000000] a5 : 0000000000000000 a6 : ffffffff8000989c a7 : 0000000052464e43
[ 0.000000] s2 : ffffffff81a220c8 s3 : 0000000000000000 s4 : 0000000000000000
[ 0.000000] s5 : 0000000000000000 s6 : 0000000200000100 s7 : 0000000000000001
[ 0.000000] s8 : ffffffe07fe04040 s9 : ffffffff81a22c80 s10: 0000000000001000
[ 0.000000] s11: 0000000000000004 t3 : 0000000000000001 t4 : 0000000000000008
[ 0.000000] t5 : ffffffcf04000808 t6 : ffffffe3ffddf188
[ 0.000000] status: 0000000200000100 badaddr: 0000000000000000 cause: 0000000000000002
[ 0.000000] [
- https://git.kernel.org/stable/c/427faa29e06f0709476ea1bd59758f997ec8b64e
- https://git.kernel.org/stable/c/bb8958d5dc79acbd071397abb57b8756375fe1ce
- https://git.kernel.org/stable/c/f1c7aa87c423e765e3862349c2f095fdfccdd9b3
- https://git.kernel.org/stable/c/427faa29e06f0709476ea1bd59758f997ec8b64e
- https://git.kernel.org/stable/c/bb8958d5dc79acbd071397abb57b8756375fe1ce
- https://git.kernel.org/stable/c/f1c7aa87c423e765e3862349c2f095fdfccdd9b3
Modified: 2024-12-31
CVE-2021-47416
In the Linux kernel, the following vulnerability has been resolved: phy: mdio: fix memory leak Syzbot reported memory leak in MDIO bus interface, the problem was in wrong state logic. MDIOBUS_ALLOCATED indicates 2 states: 1. Bus is only allocated 2. Bus allocated and __mdiobus_register() fails, but device_register() was called In case of device_register() has been called we should call put_device() to correctly free the memory allocated for this device, but mdiobus_free() calls just kfree(dev) in case of MDIOBUS_ALLOCATED state To avoid this behaviour we need to set bus->state to MDIOBUS_UNREGISTERED _before_ calling device_register(), because put_device() should be called even in case of device_register() failure.
- https://git.kernel.org/stable/c/064c2616234a7394867c924b5c1303974f3a4f4d
- https://git.kernel.org/stable/c/0d2dd40a7be61b89a7c99dae8ee96389d27b413a
- https://git.kernel.org/stable/c/2250392d930bd0d989f24d355d6355b0150256e7
- https://git.kernel.org/stable/c/2397b9e118721292429fea8807a698e71b94795f
- https://git.kernel.org/stable/c/25e9f88c7e3cc35f5e3d3db199660d28a15df639
- https://git.kernel.org/stable/c/414bb4ead1362ef2c8592db723c017258f213988
- https://git.kernel.org/stable/c/ca6e11c337daf7925ff8a2aac8e84490a8691905
- https://git.kernel.org/stable/c/f4f502a04ee1e543825af78f47eb7785015cd9f6
- https://git.kernel.org/stable/c/064c2616234a7394867c924b5c1303974f3a4f4d
- https://git.kernel.org/stable/c/0d2dd40a7be61b89a7c99dae8ee96389d27b413a
- https://git.kernel.org/stable/c/2250392d930bd0d989f24d355d6355b0150256e7
- https://git.kernel.org/stable/c/2397b9e118721292429fea8807a698e71b94795f
- https://git.kernel.org/stable/c/25e9f88c7e3cc35f5e3d3db199660d28a15df639
- https://git.kernel.org/stable/c/414bb4ead1362ef2c8592db723c017258f213988
- https://git.kernel.org/stable/c/ca6e11c337daf7925ff8a2aac8e84490a8691905
- https://git.kernel.org/stable/c/f4f502a04ee1e543825af78f47eb7785015cd9f6
Modified: 2024-12-31
CVE-2021-47418
In the Linux kernel, the following vulnerability has been resolved: net_sched: fix NULL deref in fifo_set_limit() syzbot reported another NULL deref in fifo_set_limit() [1] I could repro the issue with : unshare -n tc qd add dev lo root handle 1:0 tbf limit 200000 burst 70000 rate 100Mbit tc qd replace dev lo parent 1:0 pfifo_fast tc qd change dev lo root handle 1:0 tbf limit 300000 burst 70000 rate 100Mbit pfifo_fast does not have a change() operation. Make fifo_set_limit() more robust about this. [1] BUG: kernel NULL pointer dereference, address: 0000000000000000 PGD 1cf99067 P4D 1cf99067 PUD 7ca49067 PMD 0 Oops: 0010 [#1] PREEMPT SMP KASAN CPU: 1 PID: 14443 Comm: syz-executor959 Not tainted 5.15.0-rc3-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:0x0 Code: Unable to access opcode bytes at RIP 0xffffffffffffffd6. RSP: 0018:ffffc9000e2f7310 EFLAGS: 00010246 RAX: dffffc0000000000 RBX: ffffffff8d6ecc00 RCX: 0000000000000000 RDX: 0000000000000000 RSI: ffff888024c27910 RDI: ffff888071e34000 RBP: ffff888071e34000 R08: 0000000000000001 R09: ffffffff8fcfb947 R10: 0000000000000001 R11: 0000000000000000 R12: ffff888024c27910 R13: ffff888071e34018 R14: 0000000000000000 R15: ffff88801ef74800 FS: 00007f321d897700(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffffffffffffd6 CR3: 00000000722c3000 CR4: 00000000003506e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: fifo_set_limit net/sched/sch_fifo.c:242 [inline] fifo_set_limit+0x198/0x210 net/sched/sch_fifo.c:227 tbf_change+0x6ec/0x16d0 net/sched/sch_tbf.c:418 qdisc_change net/sched/sch_api.c:1332 [inline] tc_modify_qdisc+0xd9a/0x1a60 net/sched/sch_api.c:1634 rtnetlink_rcv_msg+0x413/0xb80 net/core/rtnetlink.c:5572 netlink_rcv_skb+0x153/0x420 net/netlink/af_netlink.c:2504 netlink_unicast_kernel net/netlink/af_netlink.c:1314 [inline] netlink_unicast+0x533/0x7d0 net/netlink/af_netlink.c:1340 netlink_sendmsg+0x86d/0xdb0 net/netlink/af_netlink.c:1929 sock_sendmsg_nosec net/socket.c:704 [inline] sock_sendmsg+0xcf/0x120 net/socket.c:724 ____sys_sendmsg+0x6e8/0x810 net/socket.c:2409 ___sys_sendmsg+0xf3/0x170 net/socket.c:2463 __sys_sendmsg+0xe5/0x1b0 net/socket.c:2492 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x44/0xae
- https://git.kernel.org/stable/c/08d7056e8e250fd2e67dbea5be5fdecdd75bf6b4
- https://git.kernel.org/stable/c/0dd7ddc462b9c2d31eb5a9926a2cc63eaa3e9f52
- https://git.kernel.org/stable/c/26af64d71b6277841285fa40e3f7164a378dfda9
- https://git.kernel.org/stable/c/560ee196fe9e5037e5015e2cdb14b3aecb1cd7dc
- https://git.kernel.org/stable/c/acff2d182c0768a713cee77442caeb07668bd68f
- https://git.kernel.org/stable/c/c951a3be5e8803e93bb49a0aca0d30457d3c1b67
- https://git.kernel.org/stable/c/d07098f45be868a9cdce6c616563c36c64dbbd87
- https://git.kernel.org/stable/c/fb58cd7991747b5e0b110c98c922d7b0e47a1f14
- https://git.kernel.org/stable/c/08d7056e8e250fd2e67dbea5be5fdecdd75bf6b4
- https://git.kernel.org/stable/c/0dd7ddc462b9c2d31eb5a9926a2cc63eaa3e9f52
- https://git.kernel.org/stable/c/26af64d71b6277841285fa40e3f7164a378dfda9
- https://git.kernel.org/stable/c/560ee196fe9e5037e5015e2cdb14b3aecb1cd7dc
- https://git.kernel.org/stable/c/acff2d182c0768a713cee77442caeb07668bd68f
- https://git.kernel.org/stable/c/c951a3be5e8803e93bb49a0aca0d30457d3c1b67
- https://git.kernel.org/stable/c/d07098f45be868a9cdce6c616563c36c64dbbd87
- https://git.kernel.org/stable/c/fb58cd7991747b5e0b110c98c922d7b0e47a1f14
Modified: 2025-09-25
CVE-2021-47419
In the Linux kernel, the following vulnerability has been resolved: net/sched: sch_taprio: properly cancel timer from taprio_destroy() There is a comment in qdisc_create() about us not calling ops->reset() in some cases. err_out4: /* * Any broken qdiscs that would require a ops->reset() here? * The qdisc was never in action so it shouldn't be necessary. */ As taprio sets a timer before actually receiving a packet, we need to cancel it from ops->destroy, just in case ops->reset has not been called. syzbot reported: ODEBUG: free active (active state 0) object type: hrtimer hint: advance_sched+0x0/0x9a0 arch/x86/include/asm/atomic64_64.h:22 WARNING: CPU: 0 PID: 8441 at lib/debugobjects.c:505 debug_print_object+0x16e/0x250 lib/debugobjects.c:505 Modules linked in: CPU: 0 PID: 8441 Comm: syz-executor813 Not tainted 5.14.0-rc6-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:debug_print_object+0x16e/0x250 lib/debugobjects.c:505 Code: ff df 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 af 00 00 00 48 8b 14 dd e0 d3 e3 89 4c 89 ee 48 c7 c7 e0 c7 e3 89 e8 5b 86 11 05 <0f> 0b 83 05 85 03 92 09 01 48 83 c4 18 5b 5d 41 5c 41 5d 41 5e c3 RSP: 0018:ffffc9000130f330 EFLAGS: 00010282 RAX: 0000000000000000 RBX: 0000000000000003 RCX: 0000000000000000 RDX: ffff88802baeb880 RSI: ffffffff815d87b5 RDI: fffff52000261e58 RBP: 0000000000000001 R08: 0000000000000000 R09: 0000000000000000 R10: ffffffff815d25ee R11: 0000000000000000 R12: ffffffff898dd020 R13: ffffffff89e3ce20 R14: ffffffff81653630 R15: dffffc0000000000 FS: 0000000000f0d300(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007ffb64b3e000 CR3: 0000000036557000 CR4: 00000000001506e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: __debug_check_no_obj_freed lib/debugobjects.c:987 [inline] debug_check_no_obj_freed+0x301/0x420 lib/debugobjects.c:1018 slab_free_hook mm/slub.c:1603 [inline] slab_free_freelist_hook+0x171/0x240 mm/slub.c:1653 slab_free mm/slub.c:3213 [inline] kfree+0xe4/0x540 mm/slub.c:4267 qdisc_create+0xbcf/0x1320 net/sched/sch_api.c:1299 tc_modify_qdisc+0x4c8/0x1a60 net/sched/sch_api.c:1663 rtnetlink_rcv_msg+0x413/0xb80 net/core/rtnetlink.c:5571 netlink_rcv_skb+0x153/0x420 net/netlink/af_netlink.c:2504 netlink_unicast_kernel net/netlink/af_netlink.c:1314 [inline] netlink_unicast+0x533/0x7d0 net/netlink/af_netlink.c:1340 netlink_sendmsg+0x86d/0xdb0 net/netlink/af_netlink.c:1929 sock_sendmsg_nosec net/socket.c:704 [inline] sock_sendmsg+0xcf/0x120 net/socket.c:724 ____sys_sendmsg+0x6e8/0x810 net/socket.c:2403 ___sys_sendmsg+0xf3/0x170 net/socket.c:2457 __sys_sendmsg+0xe5/0x1b0 net/socket.c:2486 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
- https://git.kernel.org/stable/c/3ec73ffeef54596c32aff0e73fe60971b9c8b866
- https://git.kernel.org/stable/c/7a1c1af341041221b3acb9d7036cc2b43e0efa75
- https://git.kernel.org/stable/c/a56d447f196fa9973c568f54c0d76d5391c3b0c0
- https://git.kernel.org/stable/c/c951c08a5996365aecbc5f1a9bddec3905e1ddfc
- https://git.kernel.org/stable/c/3ec73ffeef54596c32aff0e73fe60971b9c8b866
- https://git.kernel.org/stable/c/7a1c1af341041221b3acb9d7036cc2b43e0efa75
- https://git.kernel.org/stable/c/a56d447f196fa9973c568f54c0d76d5391c3b0c0
- https://git.kernel.org/stable/c/c951c08a5996365aecbc5f1a9bddec3905e1ddfc
Modified: 2024-12-30
CVE-2021-47422
In the Linux kernel, the following vulnerability has been resolved: drm/nouveau/kms/nv50-: fix file release memory leak When using single_open() for opening, single_release() should be called, otherwise the 'op' allocated in single_open() will be leaked.
- https://git.kernel.org/stable/c/0b3d4945cc7e7ea1acd52cb06dfa83bfe265b6d5
- https://git.kernel.org/stable/c/0b4e9fc14973a94ac0520f19b3633493ae13c912
- https://git.kernel.org/stable/c/65fff0a8efcdca8d84ffe3e23057c3b32403482d
- https://git.kernel.org/stable/c/0b3d4945cc7e7ea1acd52cb06dfa83bfe265b6d5
- https://git.kernel.org/stable/c/0b4e9fc14973a94ac0520f19b3633493ae13c912
- https://git.kernel.org/stable/c/65fff0a8efcdca8d84ffe3e23057c3b32403482d
Modified: 2024-12-30
CVE-2021-47423
In the Linux kernel, the following vulnerability has been resolved: drm/nouveau/debugfs: fix file release memory leak When using single_open() for opening, single_release() should be called, otherwise the 'op' allocated in single_open() will be leaked.
- https://git.kernel.org/stable/c/11cd944bb87d9e575b94c07c952105eda745b459
- https://git.kernel.org/stable/c/1508b09945bde393326a9dab73b1fc35f672d771
- https://git.kernel.org/stable/c/88c3610045ca6e699331b6bb5c095c5565f30721
- https://git.kernel.org/stable/c/9f9d4c88b2edc7924e19c44909cfc3fa4e4d3d43
- https://git.kernel.org/stable/c/df0c9418923679bc6d0060bdb1b5bf2c755159e0
- https://git.kernel.org/stable/c/f5a8703a9c418c6fc54eb772712dfe7641e3991c
- https://git.kernel.org/stable/c/f69556a42043b5444ca712ee889829ba89fdcba8
- https://git.kernel.org/stable/c/11cd944bb87d9e575b94c07c952105eda745b459
- https://git.kernel.org/stable/c/1508b09945bde393326a9dab73b1fc35f672d771
- https://git.kernel.org/stable/c/88c3610045ca6e699331b6bb5c095c5565f30721
- https://git.kernel.org/stable/c/9f9d4c88b2edc7924e19c44909cfc3fa4e4d3d43
- https://git.kernel.org/stable/c/df0c9418923679bc6d0060bdb1b5bf2c755159e0
- https://git.kernel.org/stable/c/f5a8703a9c418c6fc54eb772712dfe7641e3991c
- https://git.kernel.org/stable/c/f69556a42043b5444ca712ee889829ba89fdcba8
Modified: 2025-09-23
CVE-2021-47424
In the Linux kernel, the following vulnerability has been resolved: i40e: Fix freeing of uninitialized misc IRQ vector When VSI set up failed in i40e_probe() as part of PF switch set up driver was trying to free misc IRQ vectors in i40e_clear_interrupt_scheme and produced a kernel Oops: Trying to free already-free IRQ 266 WARNING: CPU: 0 PID: 5 at kernel/irq/manage.c:1731 __free_irq+0x9a/0x300 Workqueue: events work_for_cpu_fn RIP: 0010:__free_irq+0x9a/0x300 Call Trace: ? synchronize_irq+0x3a/0xa0 free_irq+0x2e/0x60 i40e_clear_interrupt_scheme+0x53/0x190 [i40e] i40e_probe.part.108+0x134b/0x1a40 [i40e] ? kmem_cache_alloc+0x158/0x1c0 ? acpi_ut_update_ref_count.part.1+0x8e/0x345 ? acpi_ut_update_object_reference+0x15e/0x1e2 ? strstr+0x21/0x70 ? irq_get_irq_data+0xa/0x20 ? mp_check_pin_attr+0x13/0xc0 ? irq_get_irq_data+0xa/0x20 ? mp_map_pin_to_irq+0xd3/0x2f0 ? acpi_register_gsi_ioapic+0x93/0x170 ? pci_conf1_read+0xa4/0x100 ? pci_bus_read_config_word+0x49/0x70 ? do_pci_enable_device+0xcc/0x100 local_pci_probe+0x41/0x90 work_for_cpu_fn+0x16/0x20 process_one_work+0x1a7/0x360 worker_thread+0x1cf/0x390 ? create_worker+0x1a0/0x1a0 kthread+0x112/0x130 ? kthread_flush_work_fn+0x10/0x10 ret_from_fork+0x1f/0x40 The problem is that at that point misc IRQ vectors were not allocated yet and we get a call trace that driver is trying to free already free IRQ vectors. Add a check in i40e_clear_interrupt_scheme for __I40E_MISC_IRQ_REQUESTED PF state before calling i40e_free_misc_vector. This state is set only if misc IRQ vectors were properly initialized.
- https://git.kernel.org/stable/c/17063cac4088b8e2fc0f633abddca5426ed58312
- https://git.kernel.org/stable/c/2e5a20573a926302b233b0c2e1077f5debc7ab2e
- https://git.kernel.org/stable/c/60ad4cde0ad28921f9ea25b0201c774b95ffa4b4
- https://git.kernel.org/stable/c/75099439209d3cda439a1d9b00d19a50f0066fef
- https://git.kernel.org/stable/c/97aeed72af4f83ae51534f0a2473ff52f8d66236
- https://git.kernel.org/stable/c/17063cac4088b8e2fc0f633abddca5426ed58312
- https://git.kernel.org/stable/c/2e5a20573a926302b233b0c2e1077f5debc7ab2e
- https://git.kernel.org/stable/c/60ad4cde0ad28921f9ea25b0201c774b95ffa4b4
- https://git.kernel.org/stable/c/75099439209d3cda439a1d9b00d19a50f0066fef
- https://git.kernel.org/stable/c/97aeed72af4f83ae51534f0a2473ff52f8d66236
Modified: 2025-09-23
CVE-2021-47425
In the Linux kernel, the following vulnerability has been resolved: i2c: acpi: fix resource leak in reconfiguration device addition acpi_i2c_find_adapter_by_handle() calls bus_find_device() which takes a reference on the adapter which is never released which will result in a reference count leak and render the adapter unremovable. Make sure to put the adapter after creating the client in the same manner that we do for OF. [wsa: fixed title]
- https://git.kernel.org/stable/c/3d9d458a8aaafa47268ea4f1b4114a9f12927989
- https://git.kernel.org/stable/c/60bacf259e8c2eb2324f3e13275200baaee9494b
- https://git.kernel.org/stable/c/6558b646ce1c2a872fe1c2c7cb116f05a2c1950f
- https://git.kernel.org/stable/c/90f1077c9184ec2ae9989e4642f211263f301694
- https://git.kernel.org/stable/c/b8090a84d7758b929d348bafbd86bb7a10c5fb63
- https://git.kernel.org/stable/c/f86de018fd7a24ee07372d55ffa7824f0c674a95
- https://git.kernel.org/stable/c/3d9d458a8aaafa47268ea4f1b4114a9f12927989
- https://git.kernel.org/stable/c/60bacf259e8c2eb2324f3e13275200baaee9494b
- https://git.kernel.org/stable/c/6558b646ce1c2a872fe1c2c7cb116f05a2c1950f
- https://git.kernel.org/stable/c/90f1077c9184ec2ae9989e4642f211263f301694
- https://git.kernel.org/stable/c/b8090a84d7758b929d348bafbd86bb7a10c5fb63
- https://git.kernel.org/stable/c/f86de018fd7a24ee07372d55ffa7824f0c674a95
Modified: 2024-12-31
CVE-2021-47426
In the Linux kernel, the following vulnerability has been resolved: bpf, s390: Fix potential memory leak about jit_data Make sure to free jit_data through kfree() in the error path.
- https://git.kernel.org/stable/c/29fdb11ca88d3c490a3d56f0dc77eb9444d086be
- https://git.kernel.org/stable/c/686cb8b9f6b46787f035afe8fbd132a74e6b1bdd
- https://git.kernel.org/stable/c/a326f9c01cfbee4450ae49ce618ae6cbc0f76842
- https://git.kernel.org/stable/c/d590a410e472417a22336c7c37685bfb38e801f2
- https://git.kernel.org/stable/c/29fdb11ca88d3c490a3d56f0dc77eb9444d086be
- https://git.kernel.org/stable/c/686cb8b9f6b46787f035afe8fbd132a74e6b1bdd
- https://git.kernel.org/stable/c/a326f9c01cfbee4450ae49ce618ae6cbc0f76842
- https://git.kernel.org/stable/c/d590a410e472417a22336c7c37685bfb38e801f2
Modified: 2025-09-25
CVE-2021-47428
In the Linux kernel, the following vulnerability has been resolved:
powerpc/64s: fix program check interrupt emergency stack path
Emergency stack path was jumping into a 3: label inside the
__GEN_COMMON_BODY macro for the normal path after it had finished,
rather than jumping over it. By a small miracle this is the correct
place to build up a new interrupt frame with the existing stack
pointer, so things basically worked okay with an added weird looking
700 trap frame on top (which had the wrong ->nip so it didn't decode
bug messages either).
Fix this by avoiding using numeric labels when jumping over non-trivial
macros.
Before:
LE PAGE_SIZE=64K MMU=Radix SMP NR_CPUS=2048 NUMA PowerNV
Modules linked in:
CPU: 0 PID: 88 Comm: sh Not tainted 5.15.0-rc2-00034-ge057cdade6e5 #2637
NIP: 7265677368657265 LR: c00000000006c0c8 CTR: c0000000000097f0
REGS: c0000000fffb3a50 TRAP: 0700 Not tainted
MSR: 9000000000021031
- https://git.kernel.org/stable/c/3e607dc4df180b72a38e75030cb0f94d12808712
- https://git.kernel.org/stable/c/411b38fe68ba20a8bbe724b0939762c3f16e16ca
- https://git.kernel.org/stable/c/c835b3d1d6362b4a4ebb192da7e7fd27a0a45d01
- https://git.kernel.org/stable/c/3e607dc4df180b72a38e75030cb0f94d12808712
- https://git.kernel.org/stable/c/411b38fe68ba20a8bbe724b0939762c3f16e16ca
- https://git.kernel.org/stable/c/c835b3d1d6362b4a4ebb192da7e7fd27a0a45d01
Modified: 2025-09-25
CVE-2021-47430
In the Linux kernel, the following vulnerability has been resolved: x86/entry: Clear X86_FEATURE_SMAP when CONFIG_X86_SMAP=n Commit 3c73b81a9164 ("x86/entry, selftests: Further improve user entry sanity checks") added a warning if AC is set when in the kernel. Commit 662a0221893a3d ("x86/entry: Fix AC assertion") changed the warning to only fire if the CPU supports SMAP. However, the warning can still trigger on a machine that supports SMAP but where it's disabled in the kernel config and when running the syscall_nt selftest, for example: ------------[ cut here ]------------ WARNING: CPU: 0 PID: 49 at irqentry_enter_from_user_mode CPU: 0 PID: 49 Comm: init Tainted: G T 5.15.0-rc4+ #98 e6202628ee053b4f310759978284bd8bb0ce6905 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.10.2-1ubuntu1 04/01/2014 RIP: 0010:irqentry_enter_from_user_mode ... Call Trace: ? irqentry_enter ? exc_general_protection ? asm_exc_general_protection ? asm_exc_general_protectio IS_ENABLED(CONFIG_X86_SMAP) could be added to the warning condition, but even this would not be enough in case SMAP is disabled at boot time with the "nosmap" parameter. To be consistent with "nosmap" behaviour, clear X86_FEATURE_SMAP when !CONFIG_X86_SMAP. Found using entry-fuzz + satrandconfig. [ bp: Massage commit message. ]
- https://git.kernel.org/stable/c/3958b9c34c2729597e182cc606cc43942fd19f7c
- https://git.kernel.org/stable/c/4e9ec1c65da98c293f75d83755dfa5e03075a6d0
- https://git.kernel.org/stable/c/f2447f6587b8ffe42ba04d14ce67d429a1163e5e
- https://git.kernel.org/stable/c/3958b9c34c2729597e182cc606cc43942fd19f7c
- https://git.kernel.org/stable/c/4e9ec1c65da98c293f75d83755dfa5e03075a6d0
- https://git.kernel.org/stable/c/f2447f6587b8ffe42ba04d14ce67d429a1163e5e
Modified: 2025-09-23
CVE-2021-47431
In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: fix gart.bo pin_count leak gmc_v{9,10}_0_gart_disable() isn't called matched with correspoding gart_enbale function in SRIOV case. This will lead to gart.bo pin_count leak on driver unload.
- https://git.kernel.org/stable/c/18d1c5ea3798ba42cfa0f8b2264d873463facb03
- https://git.kernel.org/stable/c/621ddffb70db824eabd63d18ac635180fe9500f9
- https://git.kernel.org/stable/c/66805763a97f8f7bdf742fc0851d85c02ed9411f
- https://git.kernel.org/stable/c/83d857d6b0967b6709cd38750c3ce2ed8ced1a95
- https://git.kernel.org/stable/c/18d1c5ea3798ba42cfa0f8b2264d873463facb03
- https://git.kernel.org/stable/c/621ddffb70db824eabd63d18ac635180fe9500f9
- https://git.kernel.org/stable/c/66805763a97f8f7bdf742fc0851d85c02ed9411f
- https://git.kernel.org/stable/c/83d857d6b0967b6709cd38750c3ce2ed8ced1a95
Modified: 2025-09-25
CVE-2021-47433
In the Linux kernel, the following vulnerability has been resolved: btrfs: fix abort logic in btrfs_replace_file_extents Error injection testing uncovered a case where we'd end up with a corrupt file system with a missing extent in the middle of a file. This occurs because the if statement to decide if we should abort is wrong. The only way we would abort in this case is if we got a ret != -EOPNOTSUPP and we called from the file clone code. However the prealloc code uses this path too. Instead we need to abort if there is an error, and the only error we _don't_ abort on is -EOPNOTSUPP and only if we came from the clone file code.
- https://git.kernel.org/stable/c/0e309e1152fc34ef75991d9d69b165dbf75bf26c
- https://git.kernel.org/stable/c/0e32a2b85c7d92ece86c17dfef390c5ed79c6378
- https://git.kernel.org/stable/c/4afb912f439c4bc4e6a4f3e7547f2e69e354108f
- https://git.kernel.org/stable/c/0e309e1152fc34ef75991d9d69b165dbf75bf26c
- https://git.kernel.org/stable/c/0e32a2b85c7d92ece86c17dfef390c5ed79c6378
- https://git.kernel.org/stable/c/4afb912f439c4bc4e6a4f3e7547f2e69e354108f
Modified: 2025-09-25
CVE-2021-47434
In the Linux kernel, the following vulnerability has been resolved: xhci: Fix command ring pointer corruption while aborting a command The command ring pointer is located at [6:63] bits of the command ring control register (CRCR). All the control bits like command stop, abort are located at [0:3] bits. While aborting a command, we read the CRCR and set the abort bit and write to the CRCR. The read will always give command ring pointer as all zeros. So we essentially write only the control bits. Since we split the 64 bit write into two 32 bit writes, there is a possibility of xHC command ring stopped before the upper dword (all zeros) is written. If that happens, xHC updates the upper dword of its internal command ring pointer with all zeros. Next time, when the command ring is restarted, we see xHC memory access failures. Fix this issue by only writing to the lower dword of CRCR where all control bits are located.
- https://git.kernel.org/stable/c/01c2dcb67e71c351006dd17cbba86c26b7f61eaf
- https://git.kernel.org/stable/c/22bcb65ea41072ab5d03c0c6290e04e0df6d09a0
- https://git.kernel.org/stable/c/62c182b5e763e5f4062e72678e72ce3e02dd4d1b
- https://git.kernel.org/stable/c/dec944bb7079b37968cf69c8a438f91f15c4cc61
- https://git.kernel.org/stable/c/e54abefe703ab7c4e5983e889babd1447738ca42
- https://git.kernel.org/stable/c/ff0e50d3564f33b7f4b35cadeabd951d66cfc570
- https://git.kernel.org/stable/c/01c2dcb67e71c351006dd17cbba86c26b7f61eaf
- https://git.kernel.org/stable/c/22bcb65ea41072ab5d03c0c6290e04e0df6d09a0
- https://git.kernel.org/stable/c/62c182b5e763e5f4062e72678e72ce3e02dd4d1b
- https://git.kernel.org/stable/c/dec944bb7079b37968cf69c8a438f91f15c4cc61
- https://git.kernel.org/stable/c/e54abefe703ab7c4e5983e889babd1447738ca42
- https://git.kernel.org/stable/c/ff0e50d3564f33b7f4b35cadeabd951d66cfc570
Modified: 2025-03-01
CVE-2021-47436
In the Linux kernel, the following vulnerability has been resolved: usb: musb: dsps: Fix the probe error path Commit 7c75bde329d7 ("usb: musb: musb_dsps: request_irq() after initializing musb") has inverted the calls to dsps_setup_optional_vbus_irq() and dsps_create_musb_pdev() without updating correctly the error path. dsps_create_musb_pdev() allocates and registers a new platform device which must be unregistered and freed with platform_device_unregister(), and this is missing upon dsps_setup_optional_vbus_irq() error. While on the master branch it seems not to trigger any issue, I observed a kernel crash because of a NULL pointer dereference with a v5.10.70 stable kernel where the patch mentioned above was backported. With this kernel version, -EPROBE_DEFER is returned the first time dsps_setup_optional_vbus_irq() is called which triggers the probe to error out without unregistering the platform device. Unfortunately, on the Beagle Bone Black Wireless, the platform device still living in the system is being used by the USB Ethernet gadget driver, which during the boot phase triggers the crash. My limited knowledge of the musb world prevents me to revert this commit which was sent to silence a robot warning which, as far as I understand, does not make sense. The goal of this patch was to prevent an IRQ to fire before the platform device being registered. I think this cannot ever happen due to the fact that enabling the interrupts is done by the ->enable() callback of the platform musb device, and this platform device must be already registered in order for the core or any other user to use this callback. Hence, I decided to fix the error path, which might prevent future errors on mainline kernels while also fixing older ones.
- https://git.kernel.org/stable/c/5ed60a430fb5f3d93e7fef66264daef466b4d10c
- https://git.kernel.org/stable/c/9ab5d539bc975b8dcde86eca1b58d836b657732e
- https://git.kernel.org/stable/c/9d89e287116796bf987cc48f5c8632ef3048f8eb
- https://git.kernel.org/stable/c/c2115b2b16421d93d4993f3fe4c520e91d6fe801
- https://git.kernel.org/stable/c/e923bce31ffefe4f60edfc6b84f62d4a858f3676
- https://git.kernel.org/stable/c/ff9249aab39820be11b6975a10d94253b7d426fc
- https://git.kernel.org/stable/c/5ed60a430fb5f3d93e7fef66264daef466b4d10c
- https://git.kernel.org/stable/c/9ab5d539bc975b8dcde86eca1b58d836b657732e
- https://git.kernel.org/stable/c/9d89e287116796bf987cc48f5c8632ef3048f8eb
- https://git.kernel.org/stable/c/c2115b2b16421d93d4993f3fe4c520e91d6fe801
- https://git.kernel.org/stable/c/e923bce31ffefe4f60edfc6b84f62d4a858f3676
- https://git.kernel.org/stable/c/ff9249aab39820be11b6975a10d94253b7d426fc
Modified: 2025-01-07
CVE-2021-47438
In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Fix memory leak in mlx5_core_destroy_cq() error path Prior to this patch in case mlx5_core_destroy_cq() failed it returns without completing all destroy operations and that leads to memory leak. Instead, complete the destroy flow before return error. Also move mlx5_debug_cq_remove() to the beginning of mlx5_core_destroy_cq() to be symmetrical with mlx5_core_create_cq(). kmemleak complains on: unreferenced object 0xc000000038625100 (size 64): comm "ethtool", pid 28301, jiffies 4298062946 (age 785.380s) hex dump (first 32 bytes): 60 01 48 94 00 00 00 c0 b8 05 34 c3 00 00 00 c0 `.H.......4..... 02 00 00 00 00 00 00 00 00 db 7d c1 00 00 00 c0 ..........}..... backtrace: [<000000009e8643cb>] add_res_tree+0xd0/0x270 [mlx5_core] [<00000000e7cb8e6c>] mlx5_debug_cq_add+0x5c/0xc0 [mlx5_core] [<000000002a12918f>] mlx5_core_create_cq+0x1d0/0x2d0 [mlx5_core] [<00000000cef0a696>] mlx5e_create_cq+0x210/0x3f0 [mlx5_core] [<000000009c642c26>] mlx5e_open_cq+0xb4/0x130 [mlx5_core] [<0000000058dfa578>] mlx5e_ptp_open+0x7f4/0xe10 [mlx5_core] [<0000000081839561>] mlx5e_open_channels+0x9cc/0x13e0 [mlx5_core] [<0000000009cf05d4>] mlx5e_switch_priv_channels+0xa4/0x230 [mlx5_core] [<0000000042bbedd8>] mlx5e_safe_switch_params+0x14c/0x300 [mlx5_core] [<0000000004bc9db8>] set_pflag_tx_port_ts+0x9c/0x160 [mlx5_core] [<00000000a0553443>] mlx5e_set_priv_flags+0xd0/0x1b0 [mlx5_core] [<00000000a8f3d84b>] ethnl_set_privflags+0x234/0x2d0 [<00000000fd27f27c>] genl_family_rcv_msg_doit+0x108/0x1d0 [<00000000f495e2bb>] genl_family_rcv_msg+0xe4/0x1f0 [<00000000646c5c2c>] genl_rcv_msg+0x78/0x120 [<00000000d53e384e>] netlink_rcv_skb+0x74/0x1a0
- https://git.kernel.org/stable/c/4f7bddf8c5c01cac74373443b13a68e1c6723a94
- https://git.kernel.org/stable/c/94b960b9deffc02fc0747afc01f72cc62ab099e3
- https://git.kernel.org/stable/c/ed8aafea4fec9c654e63445236e0b505e27ed3a7
- https://git.kernel.org/stable/c/4f7bddf8c5c01cac74373443b13a68e1c6723a94
- https://git.kernel.org/stable/c/94b960b9deffc02fc0747afc01f72cc62ab099e3
- https://git.kernel.org/stable/c/ed8aafea4fec9c654e63445236e0b505e27ed3a7
Modified: 2025-04-02
CVE-2021-47439
In the Linux kernel, the following vulnerability has been resolved: net: dsa: microchip: Added the condition for scheduling ksz_mib_read_work When the ksz module is installed and removed using rmmod, kernel crashes with null pointer dereferrence error. During rmmod, ksz_switch_remove function tries to cancel the mib_read_workqueue using cancel_delayed_work_sync routine and unregister switch from dsa. During dsa_unregister_switch it calls ksz_mac_link_down, which in turn reschedules the workqueue since mib_interval is non-zero. Due to which queue executed after mib_interval and it tries to access dp->slave. But the slave is unregistered in the ksz_switch_remove function. Hence kernel crashes. To avoid this crash, before canceling the workqueue, resetted the mib_interval to 0. v1 -> v2: -Removed the if condition in ksz_mib_read_work
- https://git.kernel.org/stable/c/383239a33cf29ebee9ce0d4e0e5c900b77a16148
- https://git.kernel.org/stable/c/ef1100ef20f29aec4e62abeccdb5bdbebba1e378
- https://git.kernel.org/stable/c/f2e1de075018cf71bcd7d628e9f759cb8540b0c3
- https://git.kernel.org/stable/c/383239a33cf29ebee9ce0d4e0e5c900b77a16148
- https://git.kernel.org/stable/c/ef1100ef20f29aec4e62abeccdb5bdbebba1e378
- https://git.kernel.org/stable/c/f2e1de075018cf71bcd7d628e9f759cb8540b0c3
Modified: 2025-04-02
CVE-2021-47440
In the Linux kernel, the following vulnerability has been resolved: net: encx24j600: check error in devm_regmap_init_encx24j600 devm_regmap_init may return error which caused by like out of memory, this will results in null pointer dereference later when reading or writing register: general protection fault in encx24j600_spi_probe KASAN: null-ptr-deref in range [0x0000000000000090-0x0000000000000097] CPU: 0 PID: 286 Comm: spi-encx24j600- Not tainted 5.15.0-rc2-00142-g9978db750e31-dirty #11 9c53a778c1306b1b02359f3c2bbedc0222cba652 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.13.0-1ubuntu1.1 04/01/2014 RIP: 0010:regcache_cache_bypass drivers/base/regmap/regcache.c:540 Code: 54 41 89 f4 55 53 48 89 fb 48 83 ec 08 e8 26 94 a8 fe 48 8d bb a0 00 00 00 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 4a 03 00 00 4c 8d ab b0 00 00 00 48 8b ab a0 00 RSP: 0018:ffffc900010476b8 EFLAGS: 00010207 RAX: dffffc0000000000 RBX: fffffffffffffff4 RCX: 0000000000000000 RDX: 0000000000000012 RSI: ffff888002de0000 RDI: 0000000000000094 RBP: ffff888013c9a000 R08: 0000000000000000 R09: fffffbfff3f9cc6a R10: ffffc900010476e8 R11: fffffbfff3f9cc69 R12: 0000000000000001 R13: 000000000000000a R14: ffff888013c9af54 R15: ffff888013c9ad08 FS: 00007ffa984ab580(0000) GS:ffff88801fe00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000055a6384136c8 CR3: 000000003bbe6003 CR4: 0000000000770ef0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 PKRU: 55555554 Call Trace: encx24j600_spi_probe drivers/net/ethernet/microchip/encx24j600.c:459 spi_probe drivers/spi/spi.c:397 really_probe drivers/base/dd.c:517 __driver_probe_device drivers/base/dd.c:751 driver_probe_device drivers/base/dd.c:782 __device_attach_driver drivers/base/dd.c:899 bus_for_each_drv drivers/base/bus.c:427 __device_attach drivers/base/dd.c:971 bus_probe_device drivers/base/bus.c:487 device_add drivers/base/core.c:3364 __spi_add_device drivers/spi/spi.c:599 spi_add_device drivers/spi/spi.c:641 spi_new_device drivers/spi/spi.c:717 new_device_store+0x18c/0x1f1 [spi_stub 4e02719357f1ff33f5a43d00630982840568e85e] dev_attr_store drivers/base/core.c:2074 sysfs_kf_write fs/sysfs/file.c:139 kernfs_fop_write_iter fs/kernfs/file.c:300 new_sync_write fs/read_write.c:508 (discriminator 4) vfs_write fs/read_write.c:594 ksys_write fs/read_write.c:648 do_syscall_64 arch/x86/entry/common.c:50 entry_SYSCALL_64_after_hwframe arch/x86/entry/entry_64.S:113 Add error check in devm_regmap_init_encx24j600 to avoid this situation.
- https://git.kernel.org/stable/c/322c0e53496309e634d9db7349678eaad1d25b55
- https://git.kernel.org/stable/c/4c2eb80fc90b05559ce6ed1b8dfb2348420b5644
- https://git.kernel.org/stable/c/5e5494e6fc8a29c927e0478bec4a078a40da8901
- https://git.kernel.org/stable/c/66358471fa75a713fd76bc8a4bd74cb14cd50a4f
- https://git.kernel.org/stable/c/e19c10d6e07c59c96e90fe053a72683ad8b0397e
- https://git.kernel.org/stable/c/f03dca0c9e2297c84a018e306f8a9cd534ee4287
- https://git.kernel.org/stable/c/f043fac1133a6c5ef960a8422c0f6dd711dee462
- https://git.kernel.org/stable/c/fddc7f678d7fb93caa0d7bc512f968ff1e2bddbc
- https://git.kernel.org/stable/c/322c0e53496309e634d9db7349678eaad1d25b55
- https://git.kernel.org/stable/c/4c2eb80fc90b05559ce6ed1b8dfb2348420b5644
- https://git.kernel.org/stable/c/5e5494e6fc8a29c927e0478bec4a078a40da8901
- https://git.kernel.org/stable/c/66358471fa75a713fd76bc8a4bd74cb14cd50a4f
- https://git.kernel.org/stable/c/e19c10d6e07c59c96e90fe053a72683ad8b0397e
- https://git.kernel.org/stable/c/f03dca0c9e2297c84a018e306f8a9cd534ee4287
- https://git.kernel.org/stable/c/f043fac1133a6c5ef960a8422c0f6dd711dee462
- https://git.kernel.org/stable/c/fddc7f678d7fb93caa0d7bc512f968ff1e2bddbc
Modified: 2025-04-02
CVE-2021-47441
In the Linux kernel, the following vulnerability has been resolved: mlxsw: thermal: Fix out-of-bounds memory accesses Currently, mlxsw allows cooling states to be set above the maximum cooling state supported by the driver: # cat /sys/class/thermal/thermal_zone2/cdev0/type mlxsw_fan # cat /sys/class/thermal/thermal_zone2/cdev0/max_state 10 # echo 18 > /sys/class/thermal/thermal_zone2/cdev0/cur_state # echo $? 0 This results in out-of-bounds memory accesses when thermal state transition statistics are enabled (CONFIG_THERMAL_STATISTICS=y), as the transition table is accessed with a too large index (state) [1]. According to the thermal maintainer, it is the responsibility of the driver to reject such operations [2]. Therefore, return an error when the state to be set exceeds the maximum cooling state supported by the driver. To avoid dead code, as suggested by the thermal maintainer [3], partially revert commit a421ce088ac8 ("mlxsw: core: Extend cooling device with cooling levels") that tried to interpret these invalid cooling states (above the maximum) in a special way. The cooling levels array is not removed in order to prevent the fans going below 20% PWM, which would cause them to get stuck at 0% PWM. [1] BUG: KASAN: slab-out-of-bounds in thermal_cooling_device_stats_update+0x271/0x290 Read of size 4 at addr ffff8881052f7bf8 by task kworker/0:0/5 CPU: 0 PID: 5 Comm: kworker/0:0 Not tainted 5.15.0-rc3-custom-45935-gce1adf704b14 #122 Hardware name: Mellanox Technologies Ltd. "MSN2410-CB2FO"/"SA000874", BIOS 4.6.5 03/08/2016 Workqueue: events_freezable_power_ thermal_zone_device_check Call Trace: dump_stack_lvl+0x8b/0xb3 print_address_description.constprop.0+0x1f/0x140 kasan_report.cold+0x7f/0x11b thermal_cooling_device_stats_update+0x271/0x290 __thermal_cdev_update+0x15e/0x4e0 thermal_cdev_update+0x9f/0xe0 step_wise_throttle+0x770/0xee0 thermal_zone_device_update+0x3f6/0xdf0 process_one_work+0xa42/0x1770 worker_thread+0x62f/0x13e0 kthread+0x3ee/0x4e0 ret_from_fork+0x1f/0x30 Allocated by task 1: kasan_save_stack+0x1b/0x40 __kasan_kmalloc+0x7c/0x90 thermal_cooling_device_setup_sysfs+0x153/0x2c0 __thermal_cooling_device_register.part.0+0x25b/0x9c0 thermal_cooling_device_register+0xb3/0x100 mlxsw_thermal_init+0x5c5/0x7e0 __mlxsw_core_bus_device_register+0xcb3/0x19c0 mlxsw_core_bus_device_register+0x56/0xb0 mlxsw_pci_probe+0x54f/0x710 local_pci_probe+0xc6/0x170 pci_device_probe+0x2b2/0x4d0 really_probe+0x293/0xd10 __driver_probe_device+0x2af/0x440 driver_probe_device+0x51/0x1e0 __driver_attach+0x21b/0x530 bus_for_each_dev+0x14c/0x1d0 bus_add_driver+0x3ac/0x650 driver_register+0x241/0x3d0 mlxsw_sp_module_init+0xa2/0x174 do_one_initcall+0xee/0x5f0 kernel_init_freeable+0x45a/0x4de kernel_init+0x1f/0x210 ret_from_fork+0x1f/0x30 The buggy address belongs to the object at ffff8881052f7800 which belongs to the cache kmalloc-1k of size 1024 The buggy address is located 1016 bytes inside of 1024-byte region [ffff8881052f7800, ffff8881052f7c00) The buggy address belongs to the page: page:0000000052355272 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1052f0 head:0000000052355272 order:3 compound_mapcount:0 compound_pincount:0 flags: 0x200000000010200(slab|head|node=0|zone=2) raw: 0200000000010200 ffffea0005034800 0000000300000003 ffff888100041dc0 raw: 0000000000000000 0000000000100010 00000001ffffffff 0000000000000000 page dumped because: kasan: bad access detected Memory state around the buggy address: ffff8881052f7a80: 00 00 00 00 00 00 04 fc fc fc fc fc fc fc fc fc ffff8881052f7b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc >ffff8881052f7b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc ^ ffff8881052f7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc ffff8881052f7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [2] https://lore.kernel.org/linux-pm/9aca37cb-1629-5c67- ---truncated---
- https://git.kernel.org/stable/c/332fdf951df8b870e3da86b122ae304e2aabe88c
- https://git.kernel.org/stable/c/ae0993739e14a102d506aa09e11b0065f3144f10
- https://git.kernel.org/stable/c/df8e58716afb3bee2b59de66b1ba1033f2e26303
- https://git.kernel.org/stable/c/e59d839743b50cb1d3f42a786bea48cc5621d254
- https://git.kernel.org/stable/c/332fdf951df8b870e3da86b122ae304e2aabe88c
- https://git.kernel.org/stable/c/ae0993739e14a102d506aa09e11b0065f3144f10
- https://git.kernel.org/stable/c/df8e58716afb3bee2b59de66b1ba1033f2e26303
- https://git.kernel.org/stable/c/e59d839743b50cb1d3f42a786bea48cc5621d254
Modified: 2025-01-07
CVE-2021-47442
In the Linux kernel, the following vulnerability has been resolved: NFC: digital: fix possible memory leak in digital_in_send_sdd_req() 'skb' is allocated in digital_in_send_sdd_req(), but not free when digital_in_send_cmd() failed, which will cause memory leak. Fix it by freeing 'skb' if digital_in_send_cmd() return failed.
- https://git.kernel.org/stable/c/071bdef36391958c89af5fa2172f691b31baa212
- https://git.kernel.org/stable/c/291c932fc3692e4d211a445ba8aa35663831bac7
- https://git.kernel.org/stable/c/2bde4aca56db9fe25405d39ddb062531493a65db
- https://git.kernel.org/stable/c/50cb95487c265187289810addec5093d4fed8329
- https://git.kernel.org/stable/c/6432d7f1d1c3aa74cfe8f5e3afdf81b786c32e86
- https://git.kernel.org/stable/c/74569c78aa84f8c958f1334b465bc530906ec99a
- https://git.kernel.org/stable/c/88c890b0b9a1fb9fcd01c61ada515e8b636c34f9
- https://git.kernel.org/stable/c/fcce6e5255474ca33c27dda0cdf9bf5087278873
- https://git.kernel.org/stable/c/071bdef36391958c89af5fa2172f691b31baa212
- https://git.kernel.org/stable/c/291c932fc3692e4d211a445ba8aa35663831bac7
- https://git.kernel.org/stable/c/2bde4aca56db9fe25405d39ddb062531493a65db
- https://git.kernel.org/stable/c/50cb95487c265187289810addec5093d4fed8329
- https://git.kernel.org/stable/c/6432d7f1d1c3aa74cfe8f5e3afdf81b786c32e86
- https://git.kernel.org/stable/c/74569c78aa84f8c958f1334b465bc530906ec99a
- https://git.kernel.org/stable/c/88c890b0b9a1fb9fcd01c61ada515e8b636c34f9
- https://git.kernel.org/stable/c/fcce6e5255474ca33c27dda0cdf9bf5087278873
Modified: 2025-04-02
CVE-2021-47443
In the Linux kernel, the following vulnerability has been resolved: NFC: digital: fix possible memory leak in digital_tg_listen_mdaa() 'params' is allocated in digital_tg_listen_mdaa(), but not free when digital_send_cmd() failed, which will cause memory leak. Fix it by freeing 'params' if digital_send_cmd() return failed.
- https://git.kernel.org/stable/c/3f2960b39f22e26cf8addae93c3f5884d1c183c9
- https://git.kernel.org/stable/c/429054ec51e648d241a7e0b465cf44f6633334c5
- https://git.kernel.org/stable/c/564249219e5b5673a8416b5181875d828c3f1e8c
- https://git.kernel.org/stable/c/58e7dcc9ca29c14e44267a4d0ea61e3229124907
- https://git.kernel.org/stable/c/7ab488d7228a9dceb2456867f1f0919decf6efed
- https://git.kernel.org/stable/c/9881b0c860649f27ef2565deef011e516390f416
- https://git.kernel.org/stable/c/a67d47e32c91e2b10402cb8c081774cbf08edb2e
- https://git.kernel.org/stable/c/b7b023e6ff567e991c31cd425b0e1d16779c938b
- https://git.kernel.org/stable/c/3f2960b39f22e26cf8addae93c3f5884d1c183c9
- https://git.kernel.org/stable/c/429054ec51e648d241a7e0b465cf44f6633334c5
- https://git.kernel.org/stable/c/564249219e5b5673a8416b5181875d828c3f1e8c
- https://git.kernel.org/stable/c/58e7dcc9ca29c14e44267a4d0ea61e3229124907
- https://git.kernel.org/stable/c/7ab488d7228a9dceb2456867f1f0919decf6efed
- https://git.kernel.org/stable/c/9881b0c860649f27ef2565deef011e516390f416
- https://git.kernel.org/stable/c/a67d47e32c91e2b10402cb8c081774cbf08edb2e
- https://git.kernel.org/stable/c/b7b023e6ff567e991c31cd425b0e1d16779c938b
Modified: 2025-09-25
CVE-2021-47444
In the Linux kernel, the following vulnerability has been resolved: drm/edid: In connector_bad_edid() cap num_of_ext by num_blocks read In commit e11f5bd8228f ("drm: Add support for DP 1.4 Compliance edid corruption test") the function connector_bad_edid() started assuming that the memory for the EDID passed to it was big enough to hold `edid[0x7e] + 1` blocks of data (1 extra for the base block). It completely ignored the fact that the function was passed `num_blocks` which indicated how much memory had been allocated for the EDID. Let's fix this by adding a bounds check. This is important for handling the case where there's an error in the first block of the EDID. In that case we will call connector_bad_edid() without having re-allocated memory based on `edid[0x7e]`.
- https://git.kernel.org/stable/c/09f3946bb452918dbfb1982add56f9ffaae393dc
- https://git.kernel.org/stable/c/97794170b696856483f74b47bfb6049780d2d3a0
- https://git.kernel.org/stable/c/a7b45024f66f9ec769e8dbb1a51ae83cd05929c7
- https://git.kernel.org/stable/c/09f3946bb452918dbfb1982add56f9ffaae393dc
- https://git.kernel.org/stable/c/97794170b696856483f74b47bfb6049780d2d3a0
- https://git.kernel.org/stable/c/a7b45024f66f9ec769e8dbb1a51ae83cd05929c7
Modified: 2025-01-14
CVE-2021-47445
In the Linux kernel, the following vulnerability has been resolved: drm/msm: Fix null pointer dereference on pointer edp The initialization of pointer dev dereferences pointer edp before edp is null checked, so there is a potential null pointer deference issue. Fix this by only dereferencing edp after edp has been null checked. Addresses-Coverity: ("Dereference before null check")
- https://git.kernel.org/stable/c/0cd063aa0a09822cc1620fc59a67fe2f9f6338ac
- https://git.kernel.org/stable/c/2133c4fc8e1348dcb752f267a143fe2254613b34
- https://git.kernel.org/stable/c/46c8ddede0273d1d132beefa9de8b820326982be
- https://git.kernel.org/stable/c/7f642b93710b6b1119bdff90be01e6b5a2a5d669
- https://git.kernel.org/stable/c/91a340768b012f5b910a203a805b97a345b3db37
- https://git.kernel.org/stable/c/bacac7d26849c8e903ceb7466d9ce8dc3c2797eb
- https://git.kernel.org/stable/c/f175b9a83e5c252d7c74acddc792840016caae0a
- https://git.kernel.org/stable/c/f302be08e3de94db8863a0b2958b2bb3e8e998e6
- https://git.kernel.org/stable/c/0cd063aa0a09822cc1620fc59a67fe2f9f6338ac
- https://git.kernel.org/stable/c/2133c4fc8e1348dcb752f267a143fe2254613b34
- https://git.kernel.org/stable/c/46c8ddede0273d1d132beefa9de8b820326982be
- https://git.kernel.org/stable/c/7f642b93710b6b1119bdff90be01e6b5a2a5d669
- https://git.kernel.org/stable/c/91a340768b012f5b910a203a805b97a345b3db37
- https://git.kernel.org/stable/c/bacac7d26849c8e903ceb7466d9ce8dc3c2797eb
- https://git.kernel.org/stable/c/f175b9a83e5c252d7c74acddc792840016caae0a
- https://git.kernel.org/stable/c/f302be08e3de94db8863a0b2958b2bb3e8e998e6
Modified: 2025-09-24
CVE-2021-47451
In the Linux kernel, the following vulnerability has been resolved: netfilter: xt_IDLETIMER: fix panic that occurs when timer_type has garbage value Currently, when the rule related to IDLETIMER is added, idletimer_tg timer structure is initialized by kmalloc on executing idletimer_tg_create function. However, in this process timer->timer_type is not defined to a specific value. Thus, timer->timer_type has garbage value and it occurs kernel panic. So, this commit fixes the panic by initializing timer->timer_type using kzalloc instead of kmalloc. Test commands: # iptables -A OUTPUT -j IDLETIMER --timeout 1 --label test $ cat /sys/class/xt_idletimer/timers/test Killed Splat looks like: BUG: KASAN: user-memory-access in alarm_expires_remaining+0x49/0x70 Read of size 8 at addr 0000002e8c7bc4c8 by task cat/917 CPU: 12 PID: 917 Comm: cat Not tainted 5.14.0+ #3 79940a339f71eb14fc81aee1757a20d5bf13eb0e Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.13.0-1ubuntu1.1 04/01/2014 Call Trace: dump_stack_lvl+0x6e/0x9c kasan_report.cold+0x112/0x117 ? alarm_expires_remaining+0x49/0x70 __asan_load8+0x86/0xb0 alarm_expires_remaining+0x49/0x70 idletimer_tg_show+0xe5/0x19b [xt_IDLETIMER 11219304af9316a21bee5ba9d58f76a6b9bccc6d] dev_attr_show+0x3c/0x60 sysfs_kf_seq_show+0x11d/0x1f0 ? device_remove_bin_file+0x20/0x20 kernfs_seq_show+0xa4/0xb0 seq_read_iter+0x29c/0x750 kernfs_fop_read_iter+0x25a/0x2c0 ? __fsnotify_parent+0x3d1/0x570 ? iov_iter_init+0x70/0x90 new_sync_read+0x2a7/0x3d0 ? __x64_sys_llseek+0x230/0x230 ? rw_verify_area+0x81/0x150 vfs_read+0x17b/0x240 ksys_read+0xd9/0x180 ? vfs_write+0x460/0x460 ? do_syscall_64+0x16/0xc0 ? lockdep_hardirqs_on+0x79/0x120 __x64_sys_read+0x43/0x50 do_syscall_64+0x3b/0xc0 entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x7f0cdc819142 Code: c0 e9 c2 fe ff ff 50 48 8d 3d 3a ca 0a 00 e8 f5 19 02 00 0f 1f 44 00 00 f3 0f 1e fa 64 8b 04 25 18 00 00 00 85 c0 75 10 0f 05 <48> 3d 00 f0 ff ff 77 56 c3 0f 1f 44 00 00 48 83 ec 28 48 89 54 24 RSP: 002b:00007fff28eee5b8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 RAX: ffffffffffffffda RBX: 0000000000020000 RCX: 00007f0cdc819142 RDX: 0000000000020000 RSI: 00007f0cdc032000 RDI: 0000000000000003 RBP: 00007f0cdc032000 R08: 00007f0cdc031010 R09: 0000000000000000 R10: 0000000000000022 R11: 0000000000000246 R12: 00005607e9ee31f0 R13: 0000000000000003 R14: 0000000000020000 R15: 0000000000020000
- https://git.kernel.org/stable/c/2a670c323055282c9b72794a491d53cef86bbeaf
- https://git.kernel.org/stable/c/902c0b1887522a099aa4e1e6b4b476c2fe5dd13e
- https://git.kernel.org/stable/c/cae7cab804c943d723d52724a3aeb07a3f4a2650
- https://git.kernel.org/stable/c/2a670c323055282c9b72794a491d53cef86bbeaf
- https://git.kernel.org/stable/c/902c0b1887522a099aa4e1e6b4b476c2fe5dd13e
- https://git.kernel.org/stable/c/cae7cab804c943d723d52724a3aeb07a3f4a2650
Modified: 2025-09-29
CVE-2021-47454
In the Linux kernel, the following vulnerability has been resolved: powerpc/smp: do not decrement idle task preempt count in CPU offline With PREEMPT_COUNT=y, when a CPU is offlined and then onlined again, we get: BUG: scheduling while atomic: swapper/1/0/0x00000000 no locks held by swapper/1/0. CPU: 1 PID: 0 Comm: swapper/1 Not tainted 5.15.0-rc2+ #100 Call Trace: dump_stack_lvl+0xac/0x108 __schedule_bug+0xac/0xe0 __schedule+0xcf8/0x10d0 schedule_idle+0x3c/0x70 do_idle+0x2d8/0x4a0 cpu_startup_entry+0x38/0x40 start_secondary+0x2ec/0x3a0 start_secondary_prolog+0x10/0x14 This is because powerpc's arch_cpu_idle_dead() decrements the idle task's preempt count, for reasons explained in commit a7c2bb8279d2 ("powerpc: Re-enable preemption before cpu_die()"), specifically "start_secondary() expects a preempt_count() of 0." However, since commit 2c669ef6979c ("powerpc/preempt: Don't touch the idle task's preempt_count during hotplug") and commit f1a0a376ca0c ("sched/core: Initialize the idle task with preemption disabled"), that justification no longer holds. The idle task isn't supposed to re-enable preemption, so remove the vestigial preempt_enable() from the CPU offline path. Tested with pseries and powernv in qemu, and pseries on PowerVM.
- https://git.kernel.org/stable/c/3ea0b497a7a2fff6a4b7090310c9f52c91975934
- https://git.kernel.org/stable/c/53770a411559cf7bc0906d1df319cc533d2f4f58
- https://git.kernel.org/stable/c/787252a10d9422f3058df9a4821f389e5326c440
- https://git.kernel.org/stable/c/3ea0b497a7a2fff6a4b7090310c9f52c91975934
- https://git.kernel.org/stable/c/53770a411559cf7bc0906d1df319cc533d2f4f58
- https://git.kernel.org/stable/c/787252a10d9422f3058df9a4821f389e5326c440
Modified: 2025-04-02
CVE-2021-47456
In the Linux kernel, the following vulnerability has been resolved: can: peak_pci: peak_pci_remove(): fix UAF When remove the module peek_pci, referencing 'chan' again after releasing 'dev' will cause UAF. Fix this by releasing 'dev' later. The following log reveals it: [ 35.961814 ] BUG: KASAN: use-after-free in peak_pci_remove+0x16f/0x270 [peak_pci] [ 35.963414 ] Read of size 8 at addr ffff888136998ee8 by task modprobe/5537 [ 35.965513 ] Call Trace: [ 35.965718 ] dump_stack_lvl+0xa8/0xd1 [ 35.966028 ] print_address_description+0x87/0x3b0 [ 35.966420 ] kasan_report+0x172/0x1c0 [ 35.966725 ] ? peak_pci_remove+0x16f/0x270 [peak_pci] [ 35.967137 ] ? trace_irq_enable_rcuidle+0x10/0x170 [ 35.967529 ] ? peak_pci_remove+0x16f/0x270 [peak_pci] [ 35.967945 ] __asan_report_load8_noabort+0x14/0x20 [ 35.968346 ] peak_pci_remove+0x16f/0x270 [peak_pci] [ 35.968752 ] pci_device_remove+0xa9/0x250
- https://git.kernel.org/stable/c/0e5afdc2315b0737edcf55bede4ee1640d2d464d
- https://git.kernel.org/stable/c/1248582e47a9f7ce0ecd156c39fc61f8b6aa3699
- https://git.kernel.org/stable/c/1c616528ba4aeb1125a06b407572ab7b56acae38
- https://git.kernel.org/stable/c/28f28e4bc3a5e0051faa963f10b778ab38c1db69
- https://git.kernel.org/stable/c/34914971bb3244db4ce2be44e9438a9b30c56250
- https://git.kernel.org/stable/c/447d44cd2f67a20b596ede3ca3cd67086dfd9ca9
- https://git.kernel.org/stable/c/949fe9b35570361bc6ee2652f89a0561b26eec98
- https://git.kernel.org/stable/c/adbda14730aacce41c0d3596415aa39ad63eafd9
- https://git.kernel.org/stable/c/0e5afdc2315b0737edcf55bede4ee1640d2d464d
- https://git.kernel.org/stable/c/1248582e47a9f7ce0ecd156c39fc61f8b6aa3699
- https://git.kernel.org/stable/c/1c616528ba4aeb1125a06b407572ab7b56acae38
- https://git.kernel.org/stable/c/28f28e4bc3a5e0051faa963f10b778ab38c1db69
- https://git.kernel.org/stable/c/34914971bb3244db4ce2be44e9438a9b30c56250
- https://git.kernel.org/stable/c/447d44cd2f67a20b596ede3ca3cd67086dfd9ca9
- https://git.kernel.org/stable/c/949fe9b35570361bc6ee2652f89a0561b26eec98
- https://git.kernel.org/stable/c/adbda14730aacce41c0d3596415aa39ad63eafd9
Modified: 2025-09-29
CVE-2021-47457
In the Linux kernel, the following vulnerability has been resolved:
can: isotp: isotp_sendmsg(): add result check for wait_event_interruptible()
Using wait_event_interruptible() to wait for complete transmission,
but do not check the result of wait_event_interruptible() which can be
interrupted. It will result in TX buffer has multiple accessors and
the later process interferes with the previous process.
Following is one of the problems reported by syzbot.
=============================================================
WARNING: CPU: 0 PID: 0 at net/can/isotp.c:840 isotp_tx_timer_handler+0x2e0/0x4c0
CPU: 0 PID: 0 Comm: swapper/0 Not tainted 5.13.0-rc7+ #68
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.13.0-1ubuntu1 04/01/2014
RIP: 0010:isotp_tx_timer_handler+0x2e0/0x4c0
Call Trace:
- https://git.kernel.org/stable/c/053bc12df0d6097c1126d0e14fa778a0a8faeb64
- https://git.kernel.org/stable/c/9acf636215a6ce9362fe618e7da4913b8bfe84c8
- https://git.kernel.org/stable/c/a76abedd2be3926d6deba236a935c7f98abf9110
- https://git.kernel.org/stable/c/053bc12df0d6097c1126d0e14fa778a0a8faeb64
- https://git.kernel.org/stable/c/9acf636215a6ce9362fe618e7da4913b8bfe84c8
- https://git.kernel.org/stable/c/a76abedd2be3926d6deba236a935c7f98abf9110
Modified: 2025-09-23
CVE-2021-47458
In the Linux kernel, the following vulnerability has been resolved: ocfs2: mount fails with buffer overflow in strlen Starting with kernel 5.11 built with CONFIG_FORTIFY_SOURCE mouting an ocfs2 filesystem with either o2cb or pcmk cluster stack fails with the trace below. Problem seems to be that strings for cluster stack and cluster name are not guaranteed to be null terminated in the disk representation, while strlcpy assumes that the source string is always null terminated. This causes a read outside of the source string triggering the buffer overflow detection. detected buffer overflow in strlen ------------[ cut here ]------------ kernel BUG at lib/string.c:1149! invalid opcode: 0000 [#1] SMP PTI CPU: 1 PID: 910 Comm: mount.ocfs2 Not tainted 5.14.0-1-amd64 #1 Debian 5.14.6-2 RIP: 0010:fortify_panic+0xf/0x11 ... Call Trace: ocfs2_initialize_super.isra.0.cold+0xc/0x18 [ocfs2] ocfs2_fill_super+0x359/0x19b0 [ocfs2] mount_bdev+0x185/0x1b0 legacy_get_tree+0x27/0x40 vfs_get_tree+0x25/0xb0 path_mount+0x454/0xa20 __x64_sys_mount+0x103/0x140 do_syscall_64+0x3b/0xc0 entry_SYSCALL_64_after_hwframe+0x44/0xae
- https://git.kernel.org/stable/c/0e677ea5b7396f715a76b6b0ef441430e4c4b57f
- https://git.kernel.org/stable/c/232ed9752510de4436468b653d145565669c8498
- https://git.kernel.org/stable/c/4b74ddcc22ee6455946e80a9c4808801f8f8561e
- https://git.kernel.org/stable/c/7623b1035ca2d17bde0f6a086ad6844a34648df1
- https://git.kernel.org/stable/c/93be0eeea14cf39235e585c8f56df3b3859deaad
- https://git.kernel.org/stable/c/ac011cb3ff7a76b3e0e6e77158ee4ba2f929e1fb
- https://git.kernel.org/stable/c/b15fa9224e6e1239414525d8d556d824701849fc
- https://git.kernel.org/stable/c/d3a83576378b4c904f711598dde2c5e881c4295c
- https://git.kernel.org/stable/c/0e677ea5b7396f715a76b6b0ef441430e4c4b57f
- https://git.kernel.org/stable/c/232ed9752510de4436468b653d145565669c8498
- https://git.kernel.org/stable/c/4b74ddcc22ee6455946e80a9c4808801f8f8561e
- https://git.kernel.org/stable/c/7623b1035ca2d17bde0f6a086ad6844a34648df1
- https://git.kernel.org/stable/c/93be0eeea14cf39235e585c8f56df3b3859deaad
- https://git.kernel.org/stable/c/ac011cb3ff7a76b3e0e6e77158ee4ba2f929e1fb
- https://git.kernel.org/stable/c/b15fa9224e6e1239414525d8d556d824701849fc
- https://git.kernel.org/stable/c/d3a83576378b4c904f711598dde2c5e881c4295c
Modified: 2025-01-14
CVE-2021-47459
In the Linux kernel, the following vulnerability has been resolved: can: j1939: j1939_netdev_start(): fix UAF for rx_kref of j1939_priv It will trigger UAF for rx_kref of j1939_priv as following. cpu0 cpu1 j1939_sk_bind(socket0, ndev0, ...) j1939_netdev_start j1939_sk_bind(socket1, ndev0, ...) j1939_netdev_start j1939_priv_set j1939_priv_get_by_ndev_locked j1939_jsk_add ..... j1939_netdev_stop kref_put_lock(&priv->rx_kref, ...) kref_get(&priv->rx_kref, ...) REFCOUNT_WARN("addition on 0;...") ==================================================== refcount_t: addition on 0; use-after-free. WARNING: CPU: 1 PID: 20874 at lib/refcount.c:25 refcount_warn_saturate+0x169/0x1e0 RIP: 0010:refcount_warn_saturate+0x169/0x1e0 Call Trace: j1939_netdev_start+0x68b/0x920 j1939_sk_bind+0x426/0xeb0 ? security_socket_bind+0x83/0xb0 The rx_kref's kref_get() and kref_put() should use j1939_netdev_lock to protect.
- https://git.kernel.org/stable/c/6e8811707e2df0c6ba920f0cad3a3bca7b42132f
- https://git.kernel.org/stable/c/864e77771a24c877aaf53aee019f78619cbcd668
- https://git.kernel.org/stable/c/a0e47d2833b4f65e6c799f28c6b636d36b8b936d
- https://git.kernel.org/stable/c/d9d52a3ebd284882f5562c88e55991add5d01586
- https://git.kernel.org/stable/c/6e8811707e2df0c6ba920f0cad3a3bca7b42132f
- https://git.kernel.org/stable/c/864e77771a24c877aaf53aee019f78619cbcd668
- https://git.kernel.org/stable/c/a0e47d2833b4f65e6c799f28c6b636d36b8b936d
- https://git.kernel.org/stable/c/d9d52a3ebd284882f5562c88e55991add5d01586
Modified: 2025-09-24
CVE-2021-47460
In the Linux kernel, the following vulnerability has been resolved: ocfs2: fix data corruption after conversion from inline format Commit 6dbf7bb55598 ("fs: Don't invalidate page buffers in block_write_full_page()") uncovered a latent bug in ocfs2 conversion from inline inode format to a normal inode format. The code in ocfs2_convert_inline_data_to_extents() attempts to zero out the whole cluster allocated for file data by grabbing, zeroing, and dirtying all pages covering this cluster. However these pages are beyond i_size, thus writeback code generally ignores these dirty pages and no blocks were ever actually zeroed on the disk. This oversight was fixed by commit 693c241a5f6a ("ocfs2: No need to zero pages past i_size.") for standard ocfs2 write path, inline conversion path was apparently forgotten; the commit log also has a reasoning why the zeroing actually is not needed. After commit 6dbf7bb55598, things became worse as writeback code stopped invalidating buffers on pages beyond i_size and thus these pages end up with clean PageDirty bit but with buffers attached to these pages being still dirty. So when a file is converted from inline format, then writeback triggers, and then the file is grown so that these pages become valid, the invalid dirtiness state is preserved, mark_buffer_dirty() does nothing on these pages (buffers are already dirty) but page is never written back because it is clean. So data written to these pages is lost once pages are reclaimed. Simple reproducer for the problem is: xfs_io -f -c "pwrite 0 2000" -c "pwrite 2000 2000" -c "fsync" \ -c "pwrite 4000 2000" ocfs2_file After unmounting and mounting the fs again, you can observe that end of 'ocfs2_file' has lost its contents. Fix the problem by not doing the pointless zeroing during conversion from inline format similarly as in the standard write path. [akpm@linux-foundation.org: fix whitespace, per Joseph]
- https://git.kernel.org/stable/c/5314454ea3ff6fc746eaf71b9a7ceebed52888fa
- https://git.kernel.org/stable/c/560edd14de2bf9dbc0129681eeb4d5ef87cc105f
- https://git.kernel.org/stable/c/8e6bfb4f70168ddfd32fb6dc028ad52faaf1f32e
- https://git.kernel.org/stable/c/a3a089c241cd49b33a8cdd7fcb37cc87a086912a
- https://git.kernel.org/stable/c/b05caf023b14cbed9223bb5b48ecc7bffe38f632
- https://git.kernel.org/stable/c/f1b98569e81c37d7e0deada7172f8f60860c1360
- https://git.kernel.org/stable/c/fa9b6b6c953e3f6441ed6cf83b4c771dac2dae08
- https://git.kernel.org/stable/c/5314454ea3ff6fc746eaf71b9a7ceebed52888fa
- https://git.kernel.org/stable/c/560edd14de2bf9dbc0129681eeb4d5ef87cc105f
- https://git.kernel.org/stable/c/8e6bfb4f70168ddfd32fb6dc028ad52faaf1f32e
- https://git.kernel.org/stable/c/a3a089c241cd49b33a8cdd7fcb37cc87a086912a
- https://git.kernel.org/stable/c/b05caf023b14cbed9223bb5b48ecc7bffe38f632
- https://git.kernel.org/stable/c/f1b98569e81c37d7e0deada7172f8f60860c1360
- https://git.kernel.org/stable/c/fa9b6b6c953e3f6441ed6cf83b4c771dac2dae08
Modified: 2025-09-24
CVE-2021-47461
In the Linux kernel, the following vulnerability has been resolved: userfaultfd: fix a race between writeprotect and exit_mmap() A race is possible when a process exits, its VMAs are removed by exit_mmap() and at the same time userfaultfd_writeprotect() is called. The race was detected by KASAN on a development kernel, but it appears to be possible on vanilla kernels as well. Use mmget_not_zero() to prevent the race as done in other userfaultfd operations.
- https://git.kernel.org/stable/c/149958ecd0627a9f1e9c678c25c665400054cd6a
- https://git.kernel.org/stable/c/3cda4bfffd4f755645577aaa9e96a606657b4525
- https://git.kernel.org/stable/c/cb185d5f1ebf900f4ae3bf84cee212e6dd035aca
- https://git.kernel.org/stable/c/149958ecd0627a9f1e9c678c25c665400054cd6a
- https://git.kernel.org/stable/c/3cda4bfffd4f755645577aaa9e96a606657b4525
- https://git.kernel.org/stable/c/cb185d5f1ebf900f4ae3bf84cee212e6dd035aca
Modified: 2025-04-02
CVE-2021-47464
In the Linux kernel, the following vulnerability has been resolved: audit: fix possible null-pointer dereference in audit_filter_rules Fix possible null-pointer dereference in audit_filter_rules. audit_filter_rules() error: we previously assumed 'ctx' could be null
- https://git.kernel.org/stable/c/16802fa4c33eb1a8efb23f1e93365190e4047d05
- https://git.kernel.org/stable/c/4e9e46a700201b4c85081fd478c99c692a9aaa0d
- https://git.kernel.org/stable/c/6e3ee990c90494561921c756481d0e2125d8b895
- https://git.kernel.org/stable/c/d6f451f1f60c58d73038c7c3177066f8f084e2a2
- https://git.kernel.org/stable/c/16802fa4c33eb1a8efb23f1e93365190e4047d05
- https://git.kernel.org/stable/c/4e9e46a700201b4c85081fd478c99c692a9aaa0d
- https://git.kernel.org/stable/c/6e3ee990c90494561921c756481d0e2125d8b895
- https://git.kernel.org/stable/c/d6f451f1f60c58d73038c7c3177066f8f084e2a2
Modified: 2025-09-24
CVE-2021-47465
In the Linux kernel, the following vulnerability has been resolved: KVM: PPC: Book3S HV: Fix stack handling in idle_kvm_start_guest() In commit 10d91611f426 ("powerpc/64s: Reimplement book3s idle code in C") kvm_start_guest() became idle_kvm_start_guest(). The old code allocated a stack frame on the emergency stack, but didn't use the frame to store anything, and also didn't store anything in its caller's frame. idle_kvm_start_guest() on the other hand is written more like a normal C function, it creates a frame on entry, and also stores CR/LR into its callers frame (per the ABI). The problem is that there is no caller frame on the emergency stack. The emergency stack for a given CPU is allocated with: paca_ptrs[i]->emergency_sp = alloc_stack(limit, i) + THREAD_SIZE; So emergency_sp actually points to the first address above the emergency stack allocation for a given CPU, we must not store above it without first decrementing it to create a frame. This is different to the regular kernel stack, paca->kstack, which is initialised to point at an initial frame that is ready to use. idle_kvm_start_guest() stores the backchain, CR and LR all of which write outside the allocation for the emergency stack. It then creates a stack frame and saves the non-volatile registers. Unfortunately the frame it creates is not large enough to fit the non-volatiles, and so the saving of the non-volatile registers also writes outside the emergency stack allocation. The end result is that we corrupt whatever is at 0-24 bytes, and 112-248 bytes above the emergency stack allocation. In practice this has gone unnoticed because the memory immediately above the emergency stack happens to be used for other stack allocations, either another CPUs mc_emergency_sp or an IRQ stack. See the order of calls to irqstack_early_init() and emergency_stack_init(). The low addresses of another stack are the top of that stack, and so are only used if that stack is under extreme pressue, which essentially never happens in practice - and if it did there's a high likelyhood we'd crash due to that stack overflowing. Still, we shouldn't be corrupting someone else's stack, and it is purely luck that we aren't corrupting something else. To fix it we save CR/LR into the caller's frame using the existing r1 on entry, we then create a SWITCH_FRAME_SIZE frame (which has space for pt_regs) on the emergency stack with the backchain pointing to the existing stack, and then finally we switch to the new frame on the emergency stack.
- https://git.kernel.org/stable/c/6d077c37c4643394b1bae9682da48164fc147ea8
- https://git.kernel.org/stable/c/80bbb0bc3a0288442f7fe6fc514f4ee1cb06ccb7
- https://git.kernel.org/stable/c/9b4416c5095c20e110c82ae602c254099b83b72f
- https://git.kernel.org/stable/c/fbd724c49bead048ae9fc1a5b7bff2fb3e54f855
- https://git.kernel.org/stable/c/6d077c37c4643394b1bae9682da48164fc147ea8
- https://git.kernel.org/stable/c/80bbb0bc3a0288442f7fe6fc514f4ee1cb06ccb7
- https://git.kernel.org/stable/c/9b4416c5095c20e110c82ae602c254099b83b72f
- https://git.kernel.org/stable/c/fbd724c49bead048ae9fc1a5b7bff2fb3e54f855
Modified: 2025-01-07
CVE-2021-47466
In the Linux kernel, the following vulnerability has been resolved: mm, slub: fix potential memoryleak in kmem_cache_open() In error path, the random_seq of slub cache might be leaked. Fix this by using __kmem_cache_release() to release all the relevant resources.
- https://git.kernel.org/stable/c/42b81946e3ac9ea0372ba16e05160dc11e02694f
- https://git.kernel.org/stable/c/4f5d1c29cfab5cb0ab885059818751bdef32e2bb
- https://git.kernel.org/stable/c/568f906340b43120abd6fcc67c37396482f85930
- https://git.kernel.org/stable/c/9037c57681d25e4dcc442d940d6dbe24dd31f461
- https://git.kernel.org/stable/c/42b81946e3ac9ea0372ba16e05160dc11e02694f
- https://git.kernel.org/stable/c/4f5d1c29cfab5cb0ab885059818751bdef32e2bb
- https://git.kernel.org/stable/c/568f906340b43120abd6fcc67c37396482f85930
- https://git.kernel.org/stable/c/9037c57681d25e4dcc442d940d6dbe24dd31f461
Modified: 2025-09-24
CVE-2021-47468
In the Linux kernel, the following vulnerability has been resolved:
isdn: mISDN: Fix sleeping function called from invalid context
The driver can call card->isac.release() function from an atomic
context.
Fix this by calling this function after releasing the lock.
The following log reveals it:
[ 44.168226 ] BUG: sleeping function called from invalid context at kernel/workqueue.c:3018
[ 44.168941 ] in_atomic(): 1, irqs_disabled(): 1, non_block: 0, pid: 5475, name: modprobe
[ 44.169574 ] INFO: lockdep is turned off.
[ 44.169899 ] irq event stamp: 0
[ 44.170160 ] hardirqs last enabled at (0): [<0000000000000000>] 0x0
[ 44.170627 ] hardirqs last disabled at (0): [
- https://git.kernel.org/stable/c/37e4f57b22cc5ebb3f80cf0f74fdeb487f082367
- https://git.kernel.org/stable/c/4054b869dc263228d30a4755800b78f0f2ba0c89
- https://git.kernel.org/stable/c/6510e80a0b81b5d814e3aea6297ba42f5e76f73c
- https://git.kernel.org/stable/c/6f95c97e0f9d6eb39c3f2cb45e8fa4268d1b372b
- https://git.kernel.org/stable/c/9f591cbdbed3d7822b2bdba89b34a6d7b434317d
- https://git.kernel.org/stable/c/a5b34409d3fc52114c828be4adbc30744fa3258b
- https://git.kernel.org/stable/c/ef269a8808cb1759245a98a7fe16fceaebad894c
- https://git.kernel.org/stable/c/f5966ba53013149bcf94e1536644a958dd00a026
- https://git.kernel.org/stable/c/37e4f57b22cc5ebb3f80cf0f74fdeb487f082367
- https://git.kernel.org/stable/c/4054b869dc263228d30a4755800b78f0f2ba0c89
- https://git.kernel.org/stable/c/6510e80a0b81b5d814e3aea6297ba42f5e76f73c
- https://git.kernel.org/stable/c/6f95c97e0f9d6eb39c3f2cb45e8fa4268d1b372b
- https://git.kernel.org/stable/c/9f591cbdbed3d7822b2bdba89b34a6d7b434317d
- https://git.kernel.org/stable/c/a5b34409d3fc52114c828be4adbc30744fa3258b
- https://git.kernel.org/stable/c/ef269a8808cb1759245a98a7fe16fceaebad894c
- https://git.kernel.org/stable/c/f5966ba53013149bcf94e1536644a958dd00a026
Modified: 2025-04-02
CVE-2021-47471
In the Linux kernel, the following vulnerability has been resolved: drm: mxsfb: Fix NULL pointer dereference crash on unload The mxsfb->crtc.funcs may already be NULL when unloading the driver, in which case calling mxsfb_irq_disable() via drm_irq_uninstall() from mxsfb_unload() leads to NULL pointer dereference. Since all we care about is masking the IRQ and mxsfb->base is still valid, just use that to clear and mask the IRQ.
- https://git.kernel.org/stable/c/3cfc183052c3dbf8eae57b6c1685dab00ed3db4a
- https://git.kernel.org/stable/c/b0e6db0656ddfd8bb57303c2ef61ee1c1cc694a8
- https://git.kernel.org/stable/c/f40c2281d2c0674d32ba732fee45222d76495472
- https://git.kernel.org/stable/c/3cfc183052c3dbf8eae57b6c1685dab00ed3db4a
- https://git.kernel.org/stable/c/b0e6db0656ddfd8bb57303c2ef61ee1c1cc694a8
- https://git.kernel.org/stable/c/f40c2281d2c0674d32ba732fee45222d76495472
Modified: 2025-01-07
CVE-2021-47473
In the Linux kernel, the following vulnerability has been resolved: scsi: qla2xxx: Fix a memory leak in an error path of qla2x00_process_els() Commit 8c0eb596baa5 ("[SCSI] qla2xxx: Fix a memory leak in an error path of qla2x00_process_els()"), intended to change: bsg_job->request->msgcode == FC_BSG_HST_ELS_NOLOGIN bsg_job->request->msgcode != FC_BSG_RPT_ELS but changed it to: bsg_job->request->msgcode == FC_BSG_RPT_ELS instead. Change the == to a != to avoid leaking the fcport structure or freeing unallocated memory.
- https://git.kernel.org/stable/c/7fb223d0ad801f633c78cbe42b1d1b55f5d163ad
- https://git.kernel.org/stable/c/96f0aebf29be25254fa585af43924e34aa21fd9a
- https://git.kernel.org/stable/c/a7fbb56e6c941d9f59437b96412a348e66388d3e
- https://git.kernel.org/stable/c/7fb223d0ad801f633c78cbe42b1d1b55f5d163ad
- https://git.kernel.org/stable/c/96f0aebf29be25254fa585af43924e34aa21fd9a
- https://git.kernel.org/stable/c/a7fbb56e6c941d9f59437b96412a348e66388d3e
Modified: 2025-09-29
CVE-2021-47480
In the Linux kernel, the following vulnerability has been resolved: scsi: core: Put LLD module refcnt after SCSI device is released SCSI host release is triggered when SCSI device is freed. We have to make sure that the low-level device driver module won't be unloaded before SCSI host instance is released because shost->hostt is required in the release handler. Make sure to put LLD module refcnt after SCSI device is released. Fixes a kernel panic of 'BUG: unable to handle page fault for address' reported by Changhui and Yi.
- https://git.kernel.org/stable/c/1105573d964f7b78734348466b01f5f6ba8a1813
- https://git.kernel.org/stable/c/1ce287eff9f23181d5644db787f472463a61f68b
- https://git.kernel.org/stable/c/61a0faa89f21861d1f8d059123b5c285a5d9ffee
- https://git.kernel.org/stable/c/7b57c38d12aed1b5d92f74748bed25e0d041729f
- https://git.kernel.org/stable/c/8e4814a461787e15a31d322d9efbe0d4f6822428
- https://git.kernel.org/stable/c/c2df161f69fb1c67f63adbd193368b47f511edc0
- https://git.kernel.org/stable/c/f2b85040acec9a928b4eb1b57a989324e8e38d3f
- https://git.kernel.org/stable/c/f30822c0b4c35ec86187ab055263943dc71a6836
- https://git.kernel.org/stable/c/1105573d964f7b78734348466b01f5f6ba8a1813
- https://git.kernel.org/stable/c/1ce287eff9f23181d5644db787f472463a61f68b
- https://git.kernel.org/stable/c/61a0faa89f21861d1f8d059123b5c285a5d9ffee
- https://git.kernel.org/stable/c/7b57c38d12aed1b5d92f74748bed25e0d041729f
- https://git.kernel.org/stable/c/8e4814a461787e15a31d322d9efbe0d4f6822428
- https://git.kernel.org/stable/c/c2df161f69fb1c67f63adbd193368b47f511edc0
- https://git.kernel.org/stable/c/f2b85040acec9a928b4eb1b57a989324e8e38d3f
- https://git.kernel.org/stable/c/f30822c0b4c35ec86187ab055263943dc71a6836
Modified: 2025-04-02
CVE-2021-47482
In the Linux kernel, the following vulnerability has been resolved: net: batman-adv: fix error handling Syzbot reported ODEBUG warning in batadv_nc_mesh_free(). The problem was in wrong error handling in batadv_mesh_init(). Before this patch batadv_mesh_init() was calling batadv_mesh_free() in case of any batadv_*_init() calls failure. This approach may work well, when there is some kind of indicator, which can tell which parts of batadv are initialized; but there isn't any. All written above lead to cleaning up uninitialized fields. Even if we hide ODEBUG warning by initializing bat_priv->nc.work, syzbot was able to hit GPF in batadv_nc_purge_paths(), because hash pointer in still NULL. [1] To fix these bugs we can unwind batadv_*_init() calls one by one. It is good approach for 2 reasons: 1) It fixes bugs on error handling path 2) It improves the performance, since we won't call unneeded batadv_*_free() functions. So, this patch makes all batadv_*_init() clean up all allocated memory before returning with an error to no call correspoing batadv_*_free() and open-codes batadv_mesh_free() with proper order to avoid touching uninitialized fields.
- https://git.kernel.org/stable/c/07533f1a673ce1126d0a72ef1e4b5eaaa3dd6d20
- https://git.kernel.org/stable/c/0c6b199f09be489c48622537a550787fc80aea73
- https://git.kernel.org/stable/c/6422e8471890273994fe8cc6d452b0dcd2c9483e
- https://git.kernel.org/stable/c/6f68cd634856f8ca93bafd623ba5357e0f648c68
- https://git.kernel.org/stable/c/a8f7359259dd5923adc6129284fdad12fc5db347
- https://git.kernel.org/stable/c/b0a2cd38553c77928ef1646ed1518486b1e70ae8
- https://git.kernel.org/stable/c/e50f957652190b5a88a8ebce7e5ab14ebd0d3f00
- https://git.kernel.org/stable/c/fbf150b16a3635634b7dfb7f229d8fcd643c6c51
- https://git.kernel.org/stable/c/07533f1a673ce1126d0a72ef1e4b5eaaa3dd6d20
- https://git.kernel.org/stable/c/0c6b199f09be489c48622537a550787fc80aea73
- https://git.kernel.org/stable/c/6422e8471890273994fe8cc6d452b0dcd2c9483e
- https://git.kernel.org/stable/c/6f68cd634856f8ca93bafd623ba5357e0f648c68
- https://git.kernel.org/stable/c/a8f7359259dd5923adc6129284fdad12fc5db347
- https://git.kernel.org/stable/c/b0a2cd38553c77928ef1646ed1518486b1e70ae8
- https://git.kernel.org/stable/c/e50f957652190b5a88a8ebce7e5ab14ebd0d3f00
- https://git.kernel.org/stable/c/fbf150b16a3635634b7dfb7f229d8fcd643c6c51
Modified: 2025-01-06
CVE-2021-47483
In the Linux kernel, the following vulnerability has been resolved: regmap: Fix possible double-free in regcache_rbtree_exit() In regcache_rbtree_insert_to_block(), when 'present' realloc failed, the 'blk' which is supposed to assign to 'rbnode->block' will be freed, so 'rbnode->block' points a freed memory, in the error handling path of regcache_rbtree_init(), 'rbnode->block' will be freed again in regcache_rbtree_exit(), KASAN will report double-free as follows: BUG: KASAN: double-free or invalid-free in kfree+0xce/0x390 Call Trace: slab_free_freelist_hook+0x10d/0x240 kfree+0xce/0x390 regcache_rbtree_exit+0x15d/0x1a0 regcache_rbtree_init+0x224/0x2c0 regcache_init+0x88d/0x1310 __regmap_init+0x3151/0x4a80 __devm_regmap_init+0x7d/0x100 madera_spi_probe+0x10f/0x333 [madera_spi] spi_probe+0x183/0x210 really_probe+0x285/0xc30 To fix this, moving up the assignment of rbnode->block to immediately after the reallocation has succeeded so that the data structure stays valid even if the second reallocation fails.
- https://git.kernel.org/stable/c/1cead23c1c0bc766dacb900a3b0269f651ad596f
- https://git.kernel.org/stable/c/36e911a16b377bde0ad91a8c679069d0d310b1a6
- https://git.kernel.org/stable/c/3dae1a4eced3ee733d7222e69b8a55caf2d61091
- https://git.kernel.org/stable/c/50cc1462a668dc62949a1127388bc3af785ce047
- https://git.kernel.org/stable/c/55e6d8037805b3400096d621091dfbf713f97e83
- https://git.kernel.org/stable/c/758ced2c3878ff789801e6fee808e185c5cf08d6
- https://git.kernel.org/stable/c/e72dce9afbdbfa70d9b44f5908a50ff6c4858999
- https://git.kernel.org/stable/c/fc081477b47dfc3a6cb50a96087fc29674013fc2
- https://git.kernel.org/stable/c/1cead23c1c0bc766dacb900a3b0269f651ad596f
- https://git.kernel.org/stable/c/36e911a16b377bde0ad91a8c679069d0d310b1a6
- https://git.kernel.org/stable/c/3dae1a4eced3ee733d7222e69b8a55caf2d61091
- https://git.kernel.org/stable/c/50cc1462a668dc62949a1127388bc3af785ce047
- https://git.kernel.org/stable/c/55e6d8037805b3400096d621091dfbf713f97e83
- https://git.kernel.org/stable/c/758ced2c3878ff789801e6fee808e185c5cf08d6
- https://git.kernel.org/stable/c/e72dce9afbdbfa70d9b44f5908a50ff6c4858999
- https://git.kernel.org/stable/c/fc081477b47dfc3a6cb50a96087fc29674013fc2
Modified: 2025-01-06
CVE-2021-47485
In the Linux kernel, the following vulnerability has been resolved: IB/qib: Protect from buffer overflow in struct qib_user_sdma_pkt fields Overflowing either addrlimit or bytes_togo can allow userspace to trigger a buffer overflow of kernel memory. Check for overflows in all the places doing math on user controlled buffers.
- https://git.kernel.org/stable/c/0d4395477741608d123dad51def9fe50b7ebe952
- https://git.kernel.org/stable/c/0f8cdfff06829a0b0348b6debc29ff6a61967724
- https://git.kernel.org/stable/c/3f57c3f67fd93b4da86aeffea1ca32c484d054ad
- https://git.kernel.org/stable/c/60833707b968d5ae02a75edb7886dcd4a957cf0d
- https://git.kernel.org/stable/c/73d2892148aa4397a885b4f4afcfc5b27a325c42
- https://git.kernel.org/stable/c/bda41654b6e0c125a624ca35d6d20beb8015b5d0
- https://git.kernel.org/stable/c/c3e17e58f571f34c51aeb17274ed02c2ed5cf780
- https://git.kernel.org/stable/c/d39bf40e55e666b5905fdbd46a0dced030ce87be
- https://git.kernel.org/stable/c/0d4395477741608d123dad51def9fe50b7ebe952
- https://git.kernel.org/stable/c/0f8cdfff06829a0b0348b6debc29ff6a61967724
- https://git.kernel.org/stable/c/3f57c3f67fd93b4da86aeffea1ca32c484d054ad
- https://git.kernel.org/stable/c/60833707b968d5ae02a75edb7886dcd4a957cf0d
- https://git.kernel.org/stable/c/73d2892148aa4397a885b4f4afcfc5b27a325c42
- https://git.kernel.org/stable/c/bda41654b6e0c125a624ca35d6d20beb8015b5d0
- https://git.kernel.org/stable/c/c3e17e58f571f34c51aeb17274ed02c2ed5cf780
- https://git.kernel.org/stable/c/d39bf40e55e666b5905fdbd46a0dced030ce87be
Modified: 2025-04-01
CVE-2021-47486
In the Linux kernel, the following vulnerability has been resolved: riscv, bpf: Fix potential NULL dereference The bpf_jit_binary_free() function requires a non-NULL argument. When the RISC-V BPF JIT fails to converge in NR_JIT_ITERATIONS steps, jit_data->header will be NULL, which triggers a NULL dereference. Avoid this by checking the argument, prior calling the function.
- https://git.kernel.org/stable/c/27de809a3d83a6199664479ebb19712533d6fd9b
- https://git.kernel.org/stable/c/cac6b043cea3e120f4fccec16f7381747cbfdc0d
- https://git.kernel.org/stable/c/e1b80a5ebe5431caeb20f88c32d4a024777a2d41
- https://git.kernel.org/stable/c/27de809a3d83a6199664479ebb19712533d6fd9b
- https://git.kernel.org/stable/c/cac6b043cea3e120f4fccec16f7381747cbfdc0d
- https://git.kernel.org/stable/c/e1b80a5ebe5431caeb20f88c32d4a024777a2d41
Modified: 2025-01-24
CVE-2021-47490
In the Linux kernel, the following vulnerability has been resolved: drm/ttm: fix memleak in ttm_transfered_destroy We need to cleanup the fences for ghost objects as well. Bug: https://bugzilla.kernel.org/show_bug.cgi?id=214029 Bug: https://bugzilla.kernel.org/show_bug.cgi?id=214447
- https://git.kernel.org/stable/c/0db55f9a1bafbe3dac750ea669de9134922389b5
- https://git.kernel.org/stable/c/132a3d998d6753047f22152731fba2b0d6b463dd
- https://git.kernel.org/stable/c/0db55f9a1bafbe3dac750ea669de9134922389b5
- https://git.kernel.org/stable/c/132a3d998d6753047f22152731fba2b0d6b463dd
- https://git.kernel.org/stable/c/960b1fdfc39aba8f41e9e27b2de0c925c74182d9
- https://git.kernel.org/stable/c/bbc920fb320f1c241cc34ac85edaa0058922246a
- https://git.kernel.org/stable/c/bd99782f3ca491879e8524c89b1c0f40071903bd
- https://git.kernel.org/stable/c/c21b4002214c1c7e7b627b9b53375612f7aab6db
Modified: 2025-09-29
CVE-2021-47491
In the Linux kernel, the following vulnerability has been resolved: mm: khugepaged: skip huge page collapse for special files The read-only THP for filesystems will collapse THP for files opened readonly and mapped with VM_EXEC. The intended usecase is to avoid TLB misses for large text segments. But it doesn't restrict the file types so a THP could be collapsed for a non-regular file, for example, block device, if it is opened readonly and mapped with EXEC permission. This may cause bugs, like [1] and [2]. This is definitely not the intended usecase, so just collapse THP for regular files in order to close the attack surface. [shy828301@gmail.com: fix vm_file check [3]]
- https://git.kernel.org/stable/c/5fcb6fce74ffa614d964667110cf1a516c48c6d9
- https://git.kernel.org/stable/c/6d67b2a73b8e3a079c355bab3c1aef7d85a044b8
- https://git.kernel.org/stable/c/a4aeaa06d45e90f9b279f0b09de84bd00006e733
- https://git.kernel.org/stable/c/5fcb6fce74ffa614d964667110cf1a516c48c6d9
- https://git.kernel.org/stable/c/6d67b2a73b8e3a079c355bab3c1aef7d85a044b8
- https://git.kernel.org/stable/c/a4aeaa06d45e90f9b279f0b09de84bd00006e733
Modified: 2025-09-29
CVE-2021-47492
In the Linux kernel, the following vulnerability has been resolved: mm, thp: bail out early in collapse_file for writeback page Currently collapse_file does not explicitly check PG_writeback, instead, page_has_private and try_to_release_page are used to filter writeback pages. This does not work for xfs with blocksize equal to or larger than pagesize, because in such case xfs has no page->private. This makes collapse_file bail out early for writeback page. Otherwise, xfs end_page_writeback will panic as follows. page:fffffe00201bcc80 refcount:0 mapcount:0 mapping:ffff0003f88c86a8 index:0x0 pfn:0x84ef32 aops:xfs_address_space_operations [xfs] ino:30000b7 dentry name:"libtest.so" flags: 0x57fffe0000008027(locked|referenced|uptodate|active|writeback) raw: 57fffe0000008027 ffff80001b48bc28 ffff80001b48bc28 ffff0003f88c86a8 raw: 0000000000000000 0000000000000000 00000000ffffffff ffff0000c3e9a000 page dumped because: VM_BUG_ON_PAGE(((unsigned int) page_ref_count(page) + 127u <= 127u)) page->mem_cgroup:ffff0000c3e9a000 ------------[ cut here ]------------ kernel BUG at include/linux/mm.h:1212! Internal error: Oops - BUG: 0 [#1] SMP Modules linked in: BUG: Bad page state in process khugepaged pfn:84ef32 xfs(E) page:fffffe00201bcc80 refcount:0 mapcount:0 mapping:0 index:0x0 pfn:0x84ef32 libcrc32c(E) rfkill(E) aes_ce_blk(E) crypto_simd(E) ... CPU: 25 PID: 0 Comm: swapper/25 Kdump: loaded Tainted: ... pstate: 60400005 (nZCv daif +PAN -UAO -TCO BTYPE=--) Call trace: end_page_writeback+0x1c0/0x214 iomap_finish_page_writeback+0x13c/0x204 iomap_finish_ioend+0xe8/0x19c iomap_writepage_end_bio+0x38/0x50 bio_endio+0x168/0x1ec blk_update_request+0x278/0x3f0 blk_mq_end_request+0x34/0x15c virtblk_request_done+0x38/0x74 [virtio_blk] blk_done_softirq+0xc4/0x110 __do_softirq+0x128/0x38c __irq_exit_rcu+0x118/0x150 irq_exit+0x1c/0x30 __handle_domain_irq+0x8c/0xf0 gic_handle_irq+0x84/0x108 el1_irq+0xcc/0x180 arch_cpu_idle+0x18/0x40 default_idle_call+0x4c/0x1a0 cpuidle_idle_call+0x168/0x1e0 do_idle+0xb4/0x104 cpu_startup_entry+0x30/0x9c secondary_start_kernel+0x104/0x180 Code: d4210000 b0006161 910c8021 94013f4d (d4210000) ---[ end trace 4a88c6a074082f8c ]--- Kernel panic - not syncing: Oops - BUG: Fatal exception in interrupt
- https://git.kernel.org/stable/c/5e669d8ab30ab61dec3c36e27b4711f07611e6fc
- https://git.kernel.org/stable/c/69a7fa5cb0de06c8956b040f19a7248c8c8308ca
- https://git.kernel.org/stable/c/74c42e1baacf206338b1dd6b6199ac964512b5bb
- https://git.kernel.org/stable/c/5e669d8ab30ab61dec3c36e27b4711f07611e6fc
- https://git.kernel.org/stable/c/69a7fa5cb0de06c8956b040f19a7248c8c8308ca
- https://git.kernel.org/stable/c/74c42e1baacf206338b1dd6b6199ac964512b5bb
Modified: 2025-09-24
CVE-2021-47493
In the Linux kernel, the following vulnerability has been resolved: ocfs2: fix race between searching chunks and release journal_head from buffer_head Encountered a race between ocfs2_test_bg_bit_allocatable() and jbd2_journal_put_journal_head() resulting in the below vmcore. PID: 106879 TASK: ffff880244ba9c00 CPU: 2 COMMAND: "loop3" Call trace: panic oops_end no_context __bad_area_nosemaphore bad_area_nosemaphore __do_page_fault do_page_fault page_fault [exception RIP: ocfs2_block_group_find_clear_bits+316] ocfs2_block_group_find_clear_bits [ocfs2] ocfs2_cluster_group_search [ocfs2] ocfs2_search_chain [ocfs2] ocfs2_claim_suballoc_bits [ocfs2] __ocfs2_claim_clusters [ocfs2] ocfs2_claim_clusters [ocfs2] ocfs2_local_alloc_slide_window [ocfs2] ocfs2_reserve_local_alloc_bits [ocfs2] ocfs2_reserve_clusters_with_limit [ocfs2] ocfs2_reserve_clusters [ocfs2] ocfs2_lock_refcount_allocators [ocfs2] ocfs2_make_clusters_writable [ocfs2] ocfs2_replace_cow [ocfs2] ocfs2_refcount_cow [ocfs2] ocfs2_file_write_iter [ocfs2] lo_rw_aio loop_queue_work kthread_worker_fn kthread ret_from_fork When ocfs2_test_bg_bit_allocatable() called bh2jh(bg_bh), the bg_bh->b_private NULL as jbd2_journal_put_journal_head() raced and released the jounal head from the buffer head. Needed to take bit lock for the bit 'BH_JournalHead' to fix this race.
- https://git.kernel.org/stable/c/2e382600e8856ea654677b5134ee66e03ea72bc2
- https://git.kernel.org/stable/c/5043fbd294f5909a080ade0f04b70a4da9e122b7
- https://git.kernel.org/stable/c/6f1b228529ae49b0f85ab89bcdb6c365df401558
- https://git.kernel.org/stable/c/2e382600e8856ea654677b5134ee66e03ea72bc2
- https://git.kernel.org/stable/c/5043fbd294f5909a080ade0f04b70a4da9e122b7
- https://git.kernel.org/stable/c/6f1b228529ae49b0f85ab89bcdb6c365df401558
Modified: 2025-09-24
CVE-2021-47494
In the Linux kernel, the following vulnerability has been resolved: cfg80211: fix management registrations locking The management registrations locking was broken, the list was locked for each wdev, but cfg80211_mgmt_registrations_update() iterated it without holding all the correct spinlocks, causing list corruption. Rather than trying to fix it with fine-grained locking, just move the lock to the wiphy/rdev (still need the list on each wdev), we already need to hold the wdev lock to change it, so there's no contention on the lock in any case. This trivially fixes the bug since we hold one wdev's lock already, and now will hold the lock that protects all lists.
- https://git.kernel.org/stable/c/09b1d5dc6ce1c9151777f6c4e128a59457704c97
- https://git.kernel.org/stable/c/3c897f39b71fe68f90599f6a45b5f7bf5618420e
- https://git.kernel.org/stable/c/4c22227e39c7a0b4dab55617ee8d34d171fab8d4
- https://git.kernel.org/stable/c/09b1d5dc6ce1c9151777f6c4e128a59457704c97
- https://git.kernel.org/stable/c/3c897f39b71fe68f90599f6a45b5f7bf5618420e
- https://git.kernel.org/stable/c/4c22227e39c7a0b4dab55617ee8d34d171fab8d4
Modified: 2025-09-29
CVE-2021-47495
In the Linux kernel, the following vulnerability has been resolved: usbnet: sanity check for maxpacket maxpacket of 0 makes no sense and oopses as we need to divide by it. Give up. V2: fixed typo in log and stylistic issues
- https://git.kernel.org/stable/c/002d82227c0abe29118cf80f7e2f396b22d448ed
- https://git.kernel.org/stable/c/397430b50a363d8b7bdda00522123f82df6adc5e
- https://git.kernel.org/stable/c/492140e45d2bf27c1014243f8616a9b612144e20
- https://git.kernel.org/stable/c/524f333e98138d909a0a0c574a9ff6737dce2767
- https://git.kernel.org/stable/c/693ecbe8f799405f8775719deedb1f76265d375a
- https://git.kernel.org/stable/c/74b3b27cf9fecce00cd8918b7882fd81191d0aa4
- https://git.kernel.org/stable/c/7e8b6a4f18edee070213cb6a77118e8a412253c5
- https://git.kernel.org/stable/c/b9eba0a4a527e04d712f0e0401e5391ef124b33e
- https://git.kernel.org/stable/c/002d82227c0abe29118cf80f7e2f396b22d448ed
- https://git.kernel.org/stable/c/397430b50a363d8b7bdda00522123f82df6adc5e
- https://git.kernel.org/stable/c/492140e45d2bf27c1014243f8616a9b612144e20
- https://git.kernel.org/stable/c/524f333e98138d909a0a0c574a9ff6737dce2767
- https://git.kernel.org/stable/c/693ecbe8f799405f8775719deedb1f76265d375a
- https://git.kernel.org/stable/c/74b3b27cf9fecce00cd8918b7882fd81191d0aa4
- https://git.kernel.org/stable/c/7e8b6a4f18edee070213cb6a77118e8a412253c5
- https://git.kernel.org/stable/c/b9eba0a4a527e04d712f0e0401e5391ef124b33e
Modified: 2025-09-24
CVE-2021-47496
In the Linux kernel, the following vulnerability has been resolved:
net/tls: Fix flipped sign in tls_err_abort() calls
sk->sk_err appears to expect a positive value, a convention that ktls
doesn't always follow and that leads to memory corruption in other code.
For instance,
[kworker]
tls_encrypt_done(..., err=
- https://git.kernel.org/stable/c/da353fac65fede6b8b4cfe207f0d9408e3121105
- https://git.kernel.org/stable/c/e0cfd5159f314d6b304d030363650b06a2299cbb
- https://git.kernel.org/stable/c/e41473543f75f7dbc5d605007e6f883f1bd13b9a
- https://git.kernel.org/stable/c/f3dec7e7ace38224f82cf83f0049159d067c2e19
- https://git.kernel.org/stable/c/da353fac65fede6b8b4cfe207f0d9408e3121105
- https://git.kernel.org/stable/c/e0cfd5159f314d6b304d030363650b06a2299cbb
- https://git.kernel.org/stable/c/e41473543f75f7dbc5d605007e6f883f1bd13b9a
- https://git.kernel.org/stable/c/f3dec7e7ace38224f82cf83f0049159d067c2e19
Modified: 2025-09-24
CVE-2021-47497
In the Linux kernel, the following vulnerability has been resolved: nvmem: Fix shift-out-of-bound (UBSAN) with byte size cells If a cell has 'nbits' equal to a multiple of BITS_PER_BYTE the logic *p &= GENMASK((cell->nbits%BITS_PER_BYTE) - 1, 0); will become undefined behavior because nbits modulo BITS_PER_BYTE is 0, and we subtract one from that making a large number that is then shifted more than the number of bits that fit into an unsigned long. UBSAN reports this problem: UBSAN: shift-out-of-bounds in drivers/nvmem/core.c:1386:8 shift exponent 64 is too large for 64-bit type 'unsigned long' CPU: 6 PID: 7 Comm: kworker/u16:0 Not tainted 5.15.0-rc3+ #9 Hardware name: Google Lazor (rev3+) with KB Backlight (DT) Workqueue: events_unbound deferred_probe_work_func Call trace: dump_backtrace+0x0/0x170 show_stack+0x24/0x30 dump_stack_lvl+0x64/0x7c dump_stack+0x18/0x38 ubsan_epilogue+0x10/0x54 __ubsan_handle_shift_out_of_bounds+0x180/0x194 __nvmem_cell_read+0x1ec/0x21c nvmem_cell_read+0x58/0x94 nvmem_cell_read_variable_common+0x4c/0xb0 nvmem_cell_read_variable_le_u32+0x40/0x100 a6xx_gpu_init+0x170/0x2f4 adreno_bind+0x174/0x284 component_bind_all+0xf0/0x264 msm_drm_bind+0x1d8/0x7a0 try_to_bring_up_master+0x164/0x1ac __component_add+0xbc/0x13c component_add+0x20/0x2c dp_display_probe+0x340/0x384 platform_probe+0xc0/0x100 really_probe+0x110/0x304 __driver_probe_device+0xb8/0x120 driver_probe_device+0x4c/0xfc __device_attach_driver+0xb0/0x128 bus_for_each_drv+0x90/0xdc __device_attach+0xc8/0x174 device_initial_probe+0x20/0x2c bus_probe_device+0x40/0xa4 deferred_probe_work_func+0x7c/0xb8 process_one_work+0x128/0x21c process_scheduled_works+0x40/0x54 worker_thread+0x1ec/0x2a8 kthread+0x138/0x158 ret_from_fork+0x10/0x20 Fix it by making sure there are any bits to mask out.
- https://git.kernel.org/stable/c/0594f1d048d8dc338eb9a240021b1d00ae1eb082
- https://git.kernel.org/stable/c/0e822e5413da1af28cca350cb1cb42b6133bdcae
- https://git.kernel.org/stable/c/2df6c023050205c4d04ffc121bc549f65cb8d1df
- https://git.kernel.org/stable/c/57e48886401b14cd351423fabfec2cfd18df4f66
- https://git.kernel.org/stable/c/5d388fa01fa6eb310ac023a363a6cb216d9d8fe9
- https://git.kernel.org/stable/c/60df06bbdf497e37ed25ad40572c362e5b0998df
- https://git.kernel.org/stable/c/abcb8d33e4d2215ccde5ab5ccf9f730a59d79d97
- https://git.kernel.org/stable/c/eb0fc8e7170e61eaf65d28dee4a8baf4e86b19ca
- https://git.kernel.org/stable/c/0594f1d048d8dc338eb9a240021b1d00ae1eb082
- https://git.kernel.org/stable/c/0e822e5413da1af28cca350cb1cb42b6133bdcae
- https://git.kernel.org/stable/c/2df6c023050205c4d04ffc121bc549f65cb8d1df
- https://git.kernel.org/stable/c/57e48886401b14cd351423fabfec2cfd18df4f66
- https://git.kernel.org/stable/c/5d388fa01fa6eb310ac023a363a6cb216d9d8fe9
- https://git.kernel.org/stable/c/60df06bbdf497e37ed25ad40572c362e5b0998df
- https://git.kernel.org/stable/c/abcb8d33e4d2215ccde5ab5ccf9f730a59d79d97
- https://git.kernel.org/stable/c/eb0fc8e7170e61eaf65d28dee4a8baf4e86b19ca
