Linux kernel is vulnerable to use-after-free attacks. The vulnerability exists through inconsistency of drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c. An attacker could use this flaw to crash the system.
packetstormsecurity.com/files/164950/Kernel-Live-Patch-Security-Notice-LSN-0082-1.html
www.openwall.com/lists/oss-security/2020/12/10/1
access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.5_release_notes/
access.redhat.com/errata/RHSA-2021:4356
access.redhat.com/security/updates/classification/#moderate
bugzilla.redhat.com/show_bug.cgi?id=1906522
git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c8bcd9c5be24fb9e6132e97da5a35e55a83e36b9
lists.debian.org/debian-lts-announce/2021/02/msg00018.html
lists.debian.org/debian-lts-announce/2021/03/msg00010.html
lists.fedoraproject.org/archives/list/[email protected]/message/BOB25SU6XUL4TNP7KB63WNZSYTIYFDPP/
lists.fedoraproject.org/archives/list/[email protected]/message/MZ7OAKAEFAXQRGBZK4LYUWINCD3D2XCL/
security.netapp.com/advisory/ntap-20210122-0001/
www.debian.org/security/2021/dsa-4843