{"id":"CVE-2021-35039","details":"kernel/module.c in the Linux kernel before 5.12.14 mishandles Signature Verification, aka CID-0c18f29aae7c. Without CONFIG_MODULE_SIG, verification that a kernel module is signed, for loading via init_module, does not occur for a module.sig_enforce=1 command-line argument.","modified":"2026-04-16T04:30:39.961967992Z","published":"2021-07-07T01:15:07.517Z","related":["SUSE-SU-2021:2408-1","SUSE-SU-2021:2438-1","SUSE-SU-2021:2599-1","SUSE-SU-2021:2599-2","SUSE-SU-2021:2645-1","SUSE-SU-2021:2687-1","openSUSE-SU-2021:1076-1","openSUSE-SU-2021:2645-1","openSUSE-SU-2021:2687-1"],"references":[{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20210813-0004/"},{"type":"ADVISORY","url":"https://www.openwall.com/lists/oss-security/2021/07/06/3"},{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2021/07/06/3"},{"type":"FIX","url":"https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.12.14"},{"type":"FIX","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0c18f29aae7ce3dadd26d8ee3505d07cc982df75"},{"type":"FIX","url":"https://github.com/torvalds/linux/commit/0c18f29aae7ce3dadd26d8ee3505d07cc982df75"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-35039.json","unresolved_ranges":[{"events":[{"introduced":"4.15"},{"fixed":"4.19.196"}]},{"events":[{"introduced":"4.20"},{"fixed":"5.4.129"}]},{"events":[{"introduced":"5.5"},{"fixed":"5.10.47"}]},{"events":[{"introduced":"5.11"},{"fixed":"5.12.14"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}