- Kernel Update Version:
- Release Date:
- 2021-07-22 11:28:02
size_t-to-int conversion vulnerability in the filesystem layer.It was discovered that the implementation of seq_file files in the Linux kernel contained an error related to integer conversion (size_t to a signed integer). A local unprivileged attacker could use this to cause a denial of service (system crash) or execute arbitrary code.https://www.openwall.com/lists/oss-security/2021/07/20/1
After certain operations with detached mounts, attempts to mount anything could unexpectedly fail with error 'No space left on device'.
ceph: out-of-bounds accesses in dio_get_pagev_size() caused memory corruption.
Network overlay 'weave' failed to create pairs of veth devices.It was discovered that 'weave' network overlay used with Kubernetes tried to create veth devices with MTU 65535 in certain cases. Such operations failed because the maximum allowed MTU was 1500.
PSBM-129500netfilter: potential kernel crash in nft_rbtree_deactivate().
'pcompact' operation could trigger memory leaks when 'io_kaio' I/O engine was used by ploop.
I/O operations could be significantly slower if 'io_kaio' rather than 'io_direct' I/O engine was used by ploop.It was discovered that file preallocation was not requested by ploop with 'io_kaio' I/O engine. As a result, certain write operations to ploop devices could be significantly slower with 'io_kaio' than with 'io_direct' I/O engine.
sch_teql: kernel crash in teql_destroy().
ext4: timestamps could be updated in wrong inodes in certain cases, if the filesystem was mounted with 'lazytime' option.