First published: Thu Jan 28 2021(Updated: )
A flaw was found in the Linux kernel. A use after free issue in PI futex may lead to code execution. Upstream patch: <a href="https://github.com/torvalds/linux/commit/c64396cc36c6e60704ab06c1fb1c4a46179c9120">https://github.com/torvalds/linux/commit/c64396cc36c6e60704ab06c1fb1c4a46179c9120</a> References: <a href="https://www.openwall.com/lists/oss-security/2021/01/29/1">https://www.openwall.com/lists/oss-security/2021/01/29/1</a>
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <0:2.6.32-754.41.2.el6 | 0:2.6.32-754.41.2.el6 |
redhat/kernel-rt | <0:3.10.0-1160.31.1.rt56.1169.el7 | 0:3.10.0-1160.31.1.rt56.1169.el7 |
redhat/kernel-alt | <0:4.14.0-115.36.1.el7a | 0:4.14.0-115.36.1.el7a |
redhat/kernel | <0:3.10.0-1160.31.1.el7 | 0:3.10.0-1160.31.1.el7 |
redhat/kernel | <0:3.10.0-327.100.1.el7 | 0:3.10.0-327.100.1.el7 |
redhat/kernel | <0:3.10.0-514.90.2.el7 | 0:3.10.0-514.90.2.el7 |
redhat/kernel | <0:3.10.0-693.90.2.el7 | 0:3.10.0-693.90.2.el7 |
redhat/kernel | <0:3.10.0-957.78.2.el7 | 0:3.10.0-957.78.2.el7 |
redhat/kernel | <0:3.10.0-1062.56.1.el7 | 0:3.10.0-1062.56.1.el7 |
redhat/kernel-rt | <0:4.18.0-240.22.1.rt7.77.el8_3 | 0:4.18.0-240.22.1.rt7.77.el8_3 |
redhat/kernel | <0:4.18.0-240.22.1.el8_3 | 0:4.18.0-240.22.1.el8_3 |
redhat/kernel | <0:4.18.0-147.48.1.el8_1 | 0:4.18.0-147.48.1.el8_1 |
redhat/kernel-rt | <0:4.18.0-193.51.1.rt13.101.el8_2 | 0:4.18.0-193.51.1.rt13.101.el8_2 |
redhat/kernel | <0:4.18.0-193.51.1.el8_2 | 0:4.18.0-193.51.1.el8_2 |
Linux Linux kernel | <=5.10.11 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
Fedoraproject Fedora | =32 | |
Fedoraproject Fedora | =33 | |
Google Android | ||
IBM DRM | <=2.0.6 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.115-1 6.1.112-1 6.11.5-1 6.11.7-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)