CVE-2021-47590
- EPSS 0.01%
- Published 19.06.2024 15:15:53
- Last modified 21.11.2024 06:36:37
In the Linux kernel, the following vulnerability has been resolved: mptcp: fix deadlock in __mptcp_push_pending() __mptcp_push_pending() may call mptcp_flush_join_list() with subflow socket lock held. If such call hits mptcp_sockopt_sync_all() then...
CVE-2021-47591
- EPSS 0.02%
- Published 19.06.2024 15:15:53
- Last modified 21.11.2024 06:36:37
In the Linux kernel, the following vulnerability has been resolved: mptcp: remove tcp ulp setsockopt support TCP_ULP setsockopt cannot be used for mptcp because its already used internally to plumb subflow (tcp) sockets to the mptcp layer. syzbot ...
CVE-2021-47592
- EPSS 0.02%
- Published 19.06.2024 15:15:53
- Last modified 21.11.2024 06:36:37
In the Linux kernel, the following vulnerability has been resolved: net: stmmac: fix tc flower deletion for VLAN priority Rx steering To replicate the issue:- 1) Add 1 flower filter for VLAN Priority based frame steering:- $ IFDEVNAME=eth0 $ tc qd...
CVE-2021-47593
- EPSS 0.02%
- Published 19.06.2024 15:15:53
- Last modified 21.11.2024 06:36:37
In the Linux kernel, the following vulnerability has been resolved: mptcp: clear 'kern' flag from fallback sockets The mptcp ULP extension relies on sk->sk_sock_kern being set correctly: It prevents setsockopt(fd, IPPROTO_TCP, TCP_ULP, "mptcp", 6);...
CVE-2021-47594
- EPSS 0.01%
- Published 19.06.2024 15:15:53
- Last modified 21.11.2024 06:36:37
In the Linux kernel, the following vulnerability has been resolved: mptcp: never allow the PM to close a listener subflow Currently, when deleting an endpoint the netlink PM treverses all the local MPTCP sockets, regardless of their status. If an ...
CVE-2021-47576
- EPSS 0.01%
- Published 19.06.2024 15:15:52
- Last modified 21.11.2024 06:36:35
In the Linux kernel, the following vulnerability has been resolved: scsi: scsi_debug: Sanity check block descriptor length in resp_mode_select() In resp_mode_select() sanity check the block descriptor len to avoid UAF. BUG: KASAN: use-after-free i...
CVE-2021-47577
- EPSS 0.01%
- Published 19.06.2024 15:15:52
- Last modified 29.09.2025 17:17:13
In the Linux kernel, the following vulnerability has been resolved: io-wq: check for wq exit after adding new worker task_work We check IO_WQ_BIT_EXIT before attempting to create a new worker, and wq exit cancels pending work if we have any. But it...
CVE-2021-47578
- EPSS 0.02%
- Published 19.06.2024 15:15:52
- Last modified 21.11.2024 06:36:35
In the Linux kernel, the following vulnerability has been resolved: scsi: scsi_debug: Don't call kcalloc() if size arg is zero If the size arg to kcalloc() is zero, it returns ZERO_SIZE_PTR. Because of that, for a following NULL pointer check to w...
CVE-2021-47579
- EPSS 0.01%
- Published 19.06.2024 15:15:52
- Last modified 29.09.2025 17:15:51
In the Linux kernel, the following vulnerability has been resolved: ovl: fix warning in ovl_create_real() Syzbot triggered the following warning in ovl_workdir_create() -> ovl_create_real(): if (!err && WARN_ON(!newdentry->d_inode)) { The reason...
CVE-2021-47580
- EPSS 0.01%
- Published 19.06.2024 15:15:52
- Last modified 01.04.2025 18:27:26
In the Linux kernel, the following vulnerability has been resolved: scsi: scsi_debug: Fix type in min_t to avoid stack OOB Change min_t() to use type "u32" instead of type "int" to avoid stack out of bounds. With min_t() type "int" the values get s...