In the Linux kernel, the following vulnerability has been resolved: dm vdo: don't refer to dedupecontext after releasing it Clear the dedupecontext pointer in a data_vio whenever ownership of the context is lost, so that vdo can't examine it accidentally.