GCVE-VVD-MAGEIA-2021-460
Advisory Published
Vulnetix · Advisory published October 4, 2021
This kernel-linus update is based on upstream 5.10.70 and fixes at least
the following security issues:
Use-after-free vulnerability in the Linux kernel exploitable by a local
attacker due to reuse of a DCCP socket with an attached dccps_hc_tx_ccid
object as a listener after being released (CVE-2020-16119).
A race condition was discovered in ext4_write_inline_data_end in
fs/ext4/inline.c in the ext4 subsystem in the Linux kernel through 5.13.13
(CVE-2021-40490).
oop_rw_iter in fs/io_uring.c in the Linux kernel 5.10 through 5.14.6 allows
local users to gain privileges by using IORING_OP_PROVIDE_BUFFERS to trigger
a free of a kernel buffer, as demonstrated by using /proc/<pid>/maps for
exploitation (CVE-2021-41073).
For other upstream fixes, see the referenced changelogs.