kernel is vulnerable to denial of service (DoS). The vulnerability exists through a pivot_root
race condition in fs/namespace.c
by corrupting a mountpoint
reference counter.
lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html
packetstormsecurity.com/files/159565/Kernel-Live-Patch-Security-Notice-LSN-0072-1.html
www.openwall.com/lists/oss-security/2020/05/04/2
access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.4_release_notes/
access.redhat.com/errata/RHSA-2021:1739
access.redhat.com/security/updates/classification/#important
bugzilla.redhat.com/show_bug.cgi?id=1848652
lists.debian.org/debian-lts-announce/2020/06/msg00011.html
lists.debian.org/debian-lts-announce/2020/06/msg00012.html
lists.debian.org/debian-lts-announce/2020/06/msg00013.html
security.netapp.com/advisory/ntap-20200608-0001/
usn.ubuntu.com/4387-1/
usn.ubuntu.com/4388-1/
usn.ubuntu.com/4389-1/
usn.ubuntu.com/4390-1/
usn.ubuntu.com/4391-1/
usn.ubuntu.com/4392-1/
www.debian.org/security/2020/dsa-4698
www.debian.org/security/2020/dsa-4699
www.oracle.com/security-alerts/cpuApr2021.html