In the Linux kernel, the following vulnerability has been resolved: tee:
optee: Fix incorrect page free bug Pointer to the allocated pages (struct
page *page) has already progressed towards the end of allocation. It is
incorrect to perform __free_pages(page, order) using this pointer as we
would free any arbitrary pages. Fix this by stop modifying the page
pointer.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 20.04 | noarch | linux | < 5.4.0-105.119 | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws | < 5.4.0-1069.73 | UNKNOWN |
ubuntu | 18.04 | noarch | linux-aws-5.4 | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-azure | < 5.4.0-1073.76 | UNKNOWN |
ubuntu | 18.04 | noarch | linux-azure-5.4 | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-bluefield | < 5.4.0-1032.35 | UNKNOWN |
ubuntu | 20.04 | noarch | linux-gcp | < 5.4.0-1068.72 | UNKNOWN |
ubuntu | 18.04 | noarch | linux-gcp-5.4 | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-gkeop | < 5.4.0-1037.38 | UNKNOWN |
ubuntu | 18.04 | noarch | linux-hwe-5.4 | < any | UNKNOWN |
git.kernel.org/linus/18549bf4b21c739a9def39f27dcac53e27286ab5 (5.16-rc7)
git.kernel.org/stable/c/18549bf4b21c739a9def39f27dcac53e27286ab5
git.kernel.org/stable/c/806142c805cacd098e61bdc0f72c778a2389fe4a
git.kernel.org/stable/c/91e94e42f6fc49635f1a16d8ae3f79552bcfda29
git.kernel.org/stable/c/ad338d825e3f7b96ee542bf313728af2d19fe9ad
launchpad.net/bugs/cve/CVE-2021-47087
nvd.nist.gov/vuln/detail/CVE-2021-47087
security-tracker.debian.org/tracker/CVE-2021-47087
www.cve.org/CVERecord?id=CVE-2021-47087