Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2025:0153-1

Опубликовано: 17 янв. 2025
Источник: suse-cvrf

Описание

Security update for the Linux Kernel

The SUSE Linux Enterprise 15 SP6 RT kernel was updated to receive various security bugfixes.

The following security bugs were fixed:

  • CVE-2024-26924: scsi: lpfc: Release hbalock before calling lpfc_worker_wake_up() (bsc#1225820).
  • CVE-2024-27397: netfilter: nf_tables: use timestamp to check for set element timeout (bsc#1224095).
  • CVE-2024-35839: kABI fix for netfilter: bridge: replace physindev with physinif in nf_bridge_info (bsc#1224726).
  • CVE-2024-41042: Prefer nft_chain_validate (bsc#1228526).
  • CVE-2024-44934: net: bridge: mcast: wait for previous gc cycles when removing port (bsc#1229809).
  • CVE-2024-44996: vsock: fix recursive ->recvmsg calls (bsc#1230205).
  • CVE-2024-47678: icmp: change the order of rate limits (bsc#1231854).
  • CVE-2024-50018: net: napi: Prevent overflow of napi_defer_hard_irqs (bsc#1232419).
  • CVE-2024-50039: kABI: Restore deleted EXPORT_SYMBOL(__qdisc_calculate_pkt_len) (bsc#1231909).
  • CVE-2024-50143: udf: fix uninit-value use in udf_get_fileshortad (bsc#1233038).
  • CVE-2024-50202: nilfs2: propagate directory read errors from nilfs_find_entry() (bsc#1233324).
  • CVE-2024-50256: netfilter: nf_reject_ipv6: fix potential crash in nf_send_reset6() (bsc#1233200).
  • CVE-2024-50262: bpf: Fix out-of-bounds write in trie_get_next_key() (bsc#1233239).
  • CVE-2024-50278, CVE-2024-50280: dm cache: fix flushing uninitialized delayed_work on cache_ctr error (bsc#1233467 bsc#1233469).
  • CVE-2024-50278: dm cache: fix potential out-of-bounds access on the first resume (bsc#1233467).
  • CVE-2024-53050: drm/i915/hdcp: Add encoder check in hdcp2_get_capability (bsc#1233546).
  • CVE-2024-53064: idpf: fix idpf_vc_core_init error path (bsc#1233558 bsc#1234464).
  • CVE-2024-53090: afs: Fix lock recursion (bsc#1233637).
  • CVE-2024-53099: bpf: Check validity of link->type in bpf_link_show_fdinfo() (bsc#1233772).
  • CVE-2024-53105: mm: page_alloc: move mlocked flag clearance into free_pages_prepare() (bsc#1234069).
  • CVE-2024-53111: mm/mremap: fix address wraparound in move_page_tables() (bsc#1234086).
  • CVE-2024-53113: mm: fix NULL pointer dereference in alloc_pages_bulk_noprof (bsc#1234077).
  • CVE-2024-53117: virtio/vsock: Improve MSG_ZEROCOPY error handling (bsc#1234079).
  • CVE-2024-53118: vsock: Fix sk_error_queue memory leak (bsc#1234071).
  • CVE-2024-53119: virtio/vsock: Fix accept_queue memory leak (bsc#1234073).
  • CVE-2024-53122: mptcp: cope racing subflow creation in mptcp_rcv_space_adjust (bsc#1234076).
  • CVE-2024-53125: bpf: sync_linked_regs() must preserve subreg_def (bsc#1234156).
  • CVE-2024-53130: nilfs2: fix null-ptr-deref in block_dirty_buffer tracepoint (bsc#1234219).
  • CVE-2024-53131: nilfs2: fix null-ptr-deref in block_touch_buffer tracepoint (bsc#1234220).
  • CVE-2024-53133: drm/amd/display: Handle dml allocation failure to avoid crash (bsc#1234221)
  • CVE-2024-53134: pmdomain: imx93-blk-ctrl: correct remove path (bsc#1234159).
  • CVE-2024-53141: netfilter: ipset: add missing range check in bitmap_ip_uadt (bsc#1234381).
  • CVE-2024-53160: rcu/kvfree: Fix data-race in __mod_timer / kvfree_call_rcu (bsc#1234810).
  • CVE-2024-53161: EDAC/bluefield: Fix potential integer overflow (bsc#1234856).
  • CVE-2024-53179: smb: client: fix use-after-free of signing key (bsc#1234921).
  • CVE-2024-53214: vfio/pci: Properly hide first-in-list PCIe extended capability (bsc#1235004).
  • CVE-2024-53216: nfsd: fix UAF when access ex_uuid or ex_stats (bsc#1235003).
  • CVE-2024-53222: zram: fix NULL pointer in comp_algorithm_show() (bsc#1234974).
  • CVE-2024-53234: erofs: handle NONHEAD !delta[1] lclusters gracefully (bsc#1235045).
  • CVE-2024-53240: xen/netfront: fix crash when removing device (bsc#1234281).
  • CVE-2024-53241: x86/xen: use new hypercall functions instead of hypercall page (XSA-466 bsc#1234282).
  • CVE-2024-56549: cachefiles: Fix NULL pointer dereference in object->file (bsc#1234912).
  • CVE-2024-56566: mm/slub: Avoid list corruption when removing a slab from the full list (bsc#1235033).
  • CVE-2024-56582: btrfs: fix use-after-free in btrfs_encoded_read_endio() (bsc#1235128).
  • CVE-2024-56599: wifi: ath10k: avoid NULL pointer error during sdio remove (bsc#1235138).
  • CVE-2024-56604: Bluetooth: RFCOMM: avoid leaving dangling sk pointer in rfcomm_sock_alloc() (bsc#1235056).
  • CVE-2024-56755: netfs/fscache: Add a memory barrier for FSCACHE_VOLUME_CREATING (bsc#1234920).

The following non-security bugs were fixed:

  • 9p: v9fs_fid_find: also lookup by inode if not found dentry (git-fixes).
  • ACPI/HMAT: Move HMAT messages to pr_debug() (bsc#1234294)
  • ACPI: PRM: Add PRM handler direct call support (jsc#PED-10467).
  • ACPI: resource: Fix memory resource type union access (git-fixes).
  • ACPI: x86: Add skip i2c clients quirk for Acer Iconia One 8 A1-840 (stable-fixes).
  • ACPI: x86: Clean up Asus entries in acpi_quirk_skip_dmi_ids[] (stable-fixes).
  • ACPI: x86: Make UART skip quirks work on PCI UARTs without an UID (stable-fixes).
  • ACPICA: events/evxfregn: do not release the ContextMutex that was never acquired (git-fixes).
  • ALSA hda/realtek: Add quirk for Framework F111:000C (stable-fixes).
  • ALSA: hda/hdmi: Yet more pin fix for HP EliteDesk 800 G4 (stable-fixes).
  • ALSA: hda/realtek: Add Framework Laptop 13 (Intel Core Ultra) to quirks (stable-fixes).
  • ALSA: hda/realtek: Fix headset mic on Acer Nitro 5 (stable-fixes).
  • ALSA: hda: Add HP MP9 G4 Retail System AMS to force connect list (stable-fixes).
  • ALSA: line6: Fix racy access to midibuf (stable-fixes).
  • ALSA: seq: Check UMP support for midi_version change (git-fixes).
  • ALSA: seq: oss: Fix races at processing SysEx messages (stable-fixes).
  • ALSA: seq: ump: Fix seq port updates per FB info notify (git-fixes).
  • ALSA: seq: ump: Use automatic cleanup of kfree() (stable-fixes).
  • ALSA: seq: ump: Use guard() for locking (stable-fixes).
  • ALSA: usb-audio: Add implicit feedback quirk for Yamaha THR5 (stable-fixes).
  • ALSA: usb-audio: Notify xrun for low-latency mode (git-fixes).
  • ALSA: usb-audio: Re-add ScratchAmp quirk entries (git-fixes).
  • ALSA: usb-audio: US16x08: Initialize array before use (git-fixes).
  • ASoC: Intel: sof_sdw: add quirk for Dell SKU 0B8C (stable-fixes).
  • ASoC: Intel: sof_sdw: fix jack detection on ADL-N variant RVP (stable-fixes).
  • ASoC: SOF: Remove libraries from topology lookups (git-fixes).
  • ASoC: amd: yc: Add a quirk for microfone on Lenovo ThinkPad P14s Gen 5 21MES00B00 (stable-fixes).
  • ASoC: amd: yc: Add quirk for microphone on Lenovo Thinkpad T14s Gen 6 21M1CTO1WW (stable-fixes).
  • ASoC: amd: yc: Fix the wrong return value (git-fixes).
  • ASoC: amd: yc: Support mic on HP 14-em0002la (stable-fixes).
  • ASoC: amd: yc: Support mic on Lenovo Thinkpad E14 Gen 6 (stable-fixes).
  • ASoC: amd: yc: fix internal mic on Redmi G 2022 (stable-fixes).
  • ASoC: codecs: wcd938x-sdw: Correct Soundwire ports mask (git-fixes).
  • ASoC: codecs: wsa881x: Correct Soundwire ports mask (git-fixes).
  • ASoC: codecs: wsa883x: Correct Soundwire ports mask (git-fixes).
  • ASoC: codecs: wsa884x: Correct Soundwire ports mask (git-fixes).
  • ASoC: cs35l56: Handle OTP read latency over SoundWire (stable-fixes).
  • ASoC: cs35l56: Patch CS35L56_IRQ1_MASK_18 to the default value (stable-fixes).
  • ASoC: fsl_micfil: Expand the range of FIFO watermark mask (stable-fixes).
  • ASoC: hdmi-codec: reorder channel allocation list (stable-fixes).
  • ASoC: meson: axg-fifo: fix irq scheduling issue with PREEMPT_RT (git-fixes).
  • ASoC: nau8822: Lower debug print priority (stable-fixes).
  • Bluetooth: Fix type of len in rfcomm_sock_getsockopt{,_old}() (stable-fixes).
  • Bluetooth: ISO: Reassociate a socket with an active BIS (stable-fixes).
  • Bluetooth: L2CAP: do not leave dangling sk pointer on error in l2cap_sock_create() (stable-fixes).
  • Bluetooth: MGMT: Fix possible deadlocks (git-fixes).
  • Bluetooth: SCO: Add support for 16 bits transparent voice setting (git-fixes).
  • Bluetooth: btusb: Add RTL8852BE device 0489:e123 to device tables (stable-fixes).
  • Bluetooth: hci_core: Fix not checking skb length on hci_acldata_packet (stable-fixes).
  • Bluetooth: hci_event: Fix using rcu_read_(un)lock while iterating (git-fixes).
  • Bluetooth: iso: Fix recursive locking warning (git-fixes).
  • Documentation: PM: Clarify pm_runtime_resume_and_get() return value (git-fixes).
  • Drivers: hv: util: Avoid accessing a ringbuffer not initialized yet (git-fixes).
  • HID: magicmouse: Apple Magic Trackpad 2 USB-C driver support (stable-fixes).
  • NFS/pnfs: Fix a live lock between recalled layouts and layoutget (git-fixes).
  • NFSD: Async COPY result needs to return a write verifier (git-fixes).
  • NFSD: Cap the number of bytes copied by nfs4_reset_recoverydir() (git-fixes).
  • NFSD: Fix nfsd4_shutdown_copy() (git-fixes).
  • NFSD: Prevent NULL dereference in nfsd4_process_cb_update() (git-fixes).
  • NFSD: Prevent a potential integer overflow (git-fixes).
  • NFSD: Remove a never-true comparison (git-fixes).
  • NFSD: initialize copy->cp_clp early in nfsd4_copy for use by trace point (git-fixes).
  • NFSv4.0: Fix a use-after-free problem in the asynchronous open() (git-fixes).
  • Octeontx2-pf: Free send queue buffers incase of leaf to inner (git-fixes).
  • PCI/AER: Disable AER service on suspend (stable-fixes).
  • PCI/MSI: Handle lack of irqdomain gracefully (git-fixes).
  • PCI: Add 'reset_subordinate' to reset hierarchy below bridge (stable-fixes).
  • PCI: Add ACS quirk for Broadcom BCM5760X NIC (stable-fixes).
  • PCI: Add ACS quirk for Wangxun FF5xxx NICs (stable-fixes).
  • PCI: Add T_PERST_CLK_US macro (git-fixes).
  • PCI: Detect and trust built-in Thunderbolt chips (stable-fixes).
  • PCI: Fix use-after-free of slot->bus on hot remove (stable-fixes).
  • PCI: Use preserve_config in place of pci_flags (stable-fixes).
  • PCI: cadence: Extract link setup sequence from cdns_pcie_host_setup() (stable-fixes).
  • PCI: cadence: Set cdns_pcie_host_init() global (stable-fixes).
  • PCI: cpqphp: Use PCI_POSSIBLE_ERROR() to check config reads (stable-fixes).
  • PCI: j721e: Add PCIe 4x lane selection support (stable-fixes).
  • PCI: j721e: Add per platform maximum lane settings (stable-fixes).
  • PCI: j721e: Add reset GPIO to struct j721e_pcie (stable-fixes).
  • PCI: j721e: Add suspend and resume support (git-fixes).
  • PCI: j721e: Use T_PERST_CLK_US macro (git-fixes).
  • PCI: qcom: Add support for IPQ9574 (stable-fixes).
  • PCI: vmd: Add DID 8086:B06F and 8086:B60B for Intel client SKUs (stable-fixes).
  • PCI: vmd: Set devices to D0 before enabling PM L1 Substates (stable-fixes).
  • RAS/AMD/ATL: Translate normalized to system physical addresses using PRM (jsc#PED-10467).
  • RDMA/bnxt_re: Add check for path mtu in modify_qp (git-fixes)
  • RDMA/bnxt_re: Avoid initializing the software queue for user queues (git-fixes)
  • RDMA/bnxt_re: Avoid sending the modify QP workaround for latest adapters (git-fixes)
  • RDMA/bnxt_re: Disable use of reserved wqes (git-fixes)
  • RDMA/bnxt_re: Fix max_qp_wrs reported (git-fixes)
  • RDMA/bnxt_re: Fix reporting hw_ver in query_device (git-fixes)
  • RDMA/bnxt_re: Fix the check for 9060 condition (git-fixes)
  • RDMA/bnxt_re: Fix the locking while accessing the QP table (git-fixes)
  • RDMA/bnxt_re: Remove always true dattr validity check (git-fixes)
  • RDMA/core: Fix ENODEV error for iWARP test over vlan (git-fixes)
  • RDMA/hns: Fix accessing invalid dip_ctx during destroying QP (git-fixes)
  • RDMA/hns: Fix mapping error of zero-hop WQE buffer (git-fixes)
  • RDMA/hns: Fix missing flush CQE for DWQE (git-fixes)
  • RDMA/hns: Fix warning storm caused by invalid input in IO path (git-fixes)
  • RDMA/mlx5: Enforce same type port association for multiport RoCE (git-fixes)
  • RDMA/rtrs: Ensure 'ib_sge list' is accessible (git-fixes)
  • RDMA/uverbs: Prevent integer overflow issue (git-fixes)
  • Revert 'block/mq-deadline: use correct way to throttling write requests' (bsc#1234146).
  • Revert 'btrfs: fix use-after-free waiting for encoded read endios (bsc#1235128)'
  • Revert 'igb: Disable threaded IRQ for igb_msix_other' (git-fixes).
  • Revert 'unicode: Do not special case ignorable code points' (stable-fixes).
  • SUNRPC: make sure cache entry active before cache_show (git-fixes).
  • SUNRPC: timeout and cancel TLS handshake with -ETIMEDOUT (git-fixes).
  • USB: serial: option: add MediaTek T7XX compositions (stable-fixes).
  • USB: serial: option: add MeiG Smart SLM770A (stable-fixes).
  • USB: serial: option: add Netprisma LCUK54 modules for WWAN Ready (stable-fixes).
  • USB: serial: option: add TCL IK512 MBIM & ECM (stable-fixes).
  • USB: serial: option: add Telit FE910C04 rmnet compositions (stable-fixes).
  • accel/habanalabs/gaudi2: unsecure tpc count registers (stable-fixes).
  • accel/habanalabs: export dma-buf only if size/offset multiples of PAGE_SIZE (stable-fixes).
  • accel/habanalabs: fix debugfs files permissions (stable-fixes).
  • accel/habanalabs: increase HL_MAX_STR to 64 bytes to avoid warnings (stable-fixes).
  • acpi: nfit: vmalloc-out-of-bounds Read in acpi_nfit_ctl (git-fixes).
  • af_unix: Call manage_oob() for every skb in unix_stream_read_generic() (bsc#1234725).
  • afs: Automatically generate trace tag enums (git-fixes).
  • afs: Fix missing subdir edit when renamed between parent dirs (git-fixes).
  • amdgpu/uvd: get ring reference from rq scheduler (git-fixes).
  • arch: Introduce arch_{,try_}_cmpxchg128{,_local}() (bsc#1220773).
  • arch: Remove cmpxchg_double (bsc#1220773).
  • arch: consolidate arch_irq_work_raise prototypes (git-fixes).
  • arm64: Ensure bits ASID[15:8] are masked out when the kernel uses (bsc#1234605)
  • arm64: Force position-independent veneers (git-fixes).
  • arm64: dts: imx8mp: correct sdhc ipg clk (git-fixes).
  • autofs: fix memory leak of waitqueues in autofs_catatonic_mode (git-fixes).
  • batman-adv: Do not let TT changes list grows indefinitely (git-fixes).
  • batman-adv: Do not send uninitialized TT changes (git-fixes).
  • batman-adv: Remove uninitialized data in full table TT response (git-fixes).
  • blk-cgroup: Fix UAF in blkcg_unpin_online() (bsc#1234726).
  • blk-core: use pr_warn_ratelimited() in bio_check_ro() (bsc#1234139).
  • blk-iocost: Fix an UBSAN shift-out-of-bounds warning (bsc#1234144).
  • blk-iocost: do not WARN if iocg was already offlined (bsc#1234147).
  • blk-throttle: fix lockdep warning of 'cgroup_mutex or RCU read lock required!' (bsc#1234140).
  • block, bfq: choose the last bfqq from merge chain in bfq_setup_cooperator() (bsc#1234149).
  • block, bfq: do not break merge chain in bfq_split_bfqq() (bsc#1234150).
  • block, bfq: fix bfqq uaf in bfq_limit_depth() (bsc#1234160).
  • block, bfq: fix procress reference leakage for bfqq in merge chain (bsc#1234280).
  • block, bfq: fix uaf for accessing waker_bfqq after splitting (bsc#1234279).
  • block/mq-deadline: Fix the tag reservation code (bsc#1234148).
  • block: Call .limit_depth() after .hctx has been set (bsc#1234148).
  • block: Fix where bio IO priority gets set (bsc#1234145).
  • block: prevent an integer overflow in bvec_try_merge_hw_page (bsc#1234142).
  • block: update the stable_writes flag in bdev_add (bsc#1234141).
  • bnxt_en: Fix receive ring space parameters when XDP is active (git-fixes).
  • bnxt_en: Reserve rings after PCIe AER recovery if NIC interface is down (git-fixes).
  • bnxt_en: Set backplane link modes correctly for ethtool (git-fixes).
  • bpf, x86: Fix PROBE_MEM runtime load check (git-fixes).
  • bpf: verifier: prevent userspace memory access (git-fixes).
  • btrfs: fix use-after-free waiting for encoded read endios (bsc#1235128)
  • can: gs_usb: add VID/PID for Xylanta SAINT3 product family (stable-fixes).
  • can: j1939: fix error in J1939 documentation (stable-fixes).
  • clocksource/drivers/timer-ti-dm: Fix child node refcount handling (git-fixes).
  • clocksource/drivers:sp804: Make user selectable (git-fixes).
  • counter: stm32-timer-cnt: Add check for clk_enable() (git-fixes).
  • counter: ti-ecap-capture: Add check for clk_enable() (git-fixes).
  • crypto: qat - disable IOV in adf_dev_stop() (git-fixes).
  • crypto: x86/sha256 - Add parentheses around macros' single arguments (stable-fixes).
  • cyrpto/b128ops: Remove struct u128 (bsc#1220773).
  • devlink: Fix length of eswitch inline-mode (git-fixes).
  • dma-buf: fix dma_fence_array_signaled v4 (stable-fixes).
  • dma-debug: fix a possible deadlock on radix_lock (stable-fixes).
  • dmaengine: apple-admac: Avoid accessing registers in probe (git-fixes).
  • dmaengine: at_xdmac: avoid null_prt_deref in at_xdmac_prep_dma_memset (git-fixes).
  • dmaengine: dw: Select only supported masters for ACPI devices (git-fixes).
  • dmaengine: idxd: Check for driver name match before sva user feature (bsc#1234357).
  • dmaengine: mv_xor: fix child node refcount handling in early exit (git-fixes).
  • dmaengine: tegra: Return correct DMA status when paused (git-fixes).
  • driver core: Add FWLINK_FLAG_IGNORE to completely ignore a fwnode link (stable-fixes).
  • driver core: fw_devlink: Improve logs for cycle detection (stable-fixes).
  • driver core: fw_devlink: Stop trying to optimize cycle detection logic (git-fixes).
  • drivers: net: ionic: add missed debugfs cleanup to ionic_probe() error path (git-fixes).
  • drm/amd/display: Add HDR workaround for specific eDP (stable-fixes).
  • drm/amd/display: Add NULL check for clk_mgr in dcn32_init_hw (stable-fixes).
  • drm/amd/display: Allow backlight to go below AMDGPU_DM_DEFAULT_MIN_BACKLIGHT (stable-fixes).
  • drm/amd/display: Avoid overflow assignment in link_dp_cts (stable-fixes).
  • drm/amd/display: Fix Synaptics Cascaded Panamera DSC Determination (stable-fixes).
  • drm/amd/display: Revert Avoid overflow assignment (stable-fixes).
  • drm/amd/display: Use gpuvm_min_page_size_kbytes for DML2 surfaces (stable-fixes).
  • drm/amd/pm: fix the high voltage issue after unload (stable-fixes).
  • drm/amd/pm: update current_socclk and current_uclk in gpu_metrics on smu v13.0.7 (stable-fixes).
  • drm/amdgpu/gfx10: use rlc safe mode for soft recovery (stable-fixes).
  • drm/amdgpu/gfx11: use rlc safe mode for soft recovery (stable-fixes).
  • drm/amdgpu/gfx9: properly handle error ints on all pipes (stable-fixes).
  • drm/amdgpu/gfx9: use rlc safe mode for soft recovery (stable-fixes).
  • drm/amdgpu/hdp5.2: do a posting read when flushing HDP (stable-fixes).
  • drm/amdgpu/pm: Remove gpu_od if it's an empty directory (stable-fixes).
  • drm/amdgpu/umsch: do not execute umsch test when GPU is in reset/suspend (stable-fixes).
  • drm/amdgpu/umsch: reinitialize write pointer in hw init (stable-fixes).
  • drm/amdgpu/vcn: reset fw_shared when VCPU buffers corrupted on vcn v4.0.3 (stable-fixes).
  • drm/amdgpu: Block MMR_READ IOCTL in reset (stable-fixes).
  • drm/amdgpu: Dereference the ATCS ACPI buffer (stable-fixes).
  • drm/amdgpu: add raven1 gfxoff quirk (stable-fixes).
  • drm/amdgpu: add smu 14.0.1 discovery support (stable-fixes).
  • drm/amdgpu: clear RB_OVERFLOW bit when enabling interrupts for vega20_ih (stable-fixes).
  • drm/amdgpu: differentiate external rev id for gfx 11.5.0 (stable-fixes).
  • drm/amdgpu: disallow multiple BO_HANDLES chunks in one submit (stable-fixes).
  • drm/amdgpu: do not access invalid sched (git-fixes).
  • drm/amdgpu: enable gfxoff quirk on HP 705G4 (stable-fixes).
  • drm/amdgpu: fix unchecked return value warning for amdgpu_gfx (stable-fixes).
  • drm/amdgpu: fix usage slab after free (stable-fixes).
  • drm/amdgpu: prevent BO_HANDLES error from being overwritten (git-fixes).
  • drm/amdgpu: refine error handling in amdgpu_ttm_tt_pin_userptr (stable-fixes).
  • drm/amdgpu: set the right AMDGPU sg segment limitation (stable-fixes).
  • drm/amdgpu: skip amdgpu_device_cache_pci_state under sriov (stable-fixes).
  • drm/amdkfd: Fix resource leak in criu restore queue (stable-fixes).
  • drm/amdkfd: Use device based logging for errors (stable-fixes).
  • drm/amdkfd: Use the correct wptr size (stable-fixes).
  • drm/amdkfd: pause autosuspend when creating pdd (stable-fixes).
  • drm/bridge: adv7511_audio: Update Audio InfoFrame properly (git-fixes).
  • drm/bridge: it6505: Enable module autoloading (stable-fixes).
  • drm/bridge: it6505: Fix inverted reset polarity (git-fixes).
  • drm/bridge: it6505: update usleep_range for RC circuit charge time (stable-fixes).
  • drm/display: Fix building with GCC 15 (stable-fixes).
  • drm/dp_mst: Ensure mst_primary pointer is valid in drm_dp_mst_handle_up_req() (stable-fixes).
  • drm/dp_mst: Fix MST sideband message body length check (stable-fixes).
  • drm/dp_mst: Fix resetting msg rx state after topology removal (git-fixes).
  • drm/dp_mst: Verify request type in the corresponding down message reply (stable-fixes).
  • drm/etnaviv: flush shader L1 cache after user commandstream (stable-fixes).
  • drm/i915/dg1: Fix power gate sequence (git-fixes).
  • drm/i915: Fix NULL pointer dereference in capture_engine (git-fixes).
  • drm/i915: Fix memory leak by correcting cache object name in error handler (git-fixes).
  • drm/mcde: Enable module autoloading (stable-fixes).
  • drm/modes: Avoid divide by zero harder in drm_mode_vrefresh() (stable-fixes).
  • drm/nouveau/gsp: Use the sg allocator for level 2 of radix3 (stable-fixes).
  • drm/panel: novatek-nt35950: fix return value check in nt35950_probe() (git-fixes).
  • drm/panel: simple: Add Microchip AC69T88A LVDS Display panel (stable-fixes).
  • drm/printer: Allow NULL data in devcoredump printer (stable-fixes).
  • drm/radeon/r100: Handle unknown family in r100_cp_init_microcode() (stable-fixes).
  • drm/radeon/r600_cs: Fix possible int overflow in r600_packet3_check() (stable-fixes).
  • drm/radeon: Fix spurious unplug event on radeon HDMI (git-fixes).
  • drm/radeon: add helper rdev_to_drm(rdev) (stable-fixes).
  • drm/radeon: change rdev->ddev to rdev_to_drm(rdev) (stable-fixes).
  • drm/sched: memset() 'job' in drm_sched_job_init() (stable-fixes).
  • drm/vc4: hdmi: Avoid log spam for audio start failure (stable-fixes).
  • drm/vc4: hvs: Set AXI panic modes for the HVS (stable-fixes).
  • drm: adv7511: Drop dsi single lane support (git-fixes).
  • drm: adv7511: Fix use-after-free in adv7533_attach_dsi() (git-fixes).
  • drm: panel-orientation-quirks: Add quirk for AYA NEO 2 model (stable-fixes).
  • drm: panel-orientation-quirks: Add quirk for AYA NEO Founder edition (stable-fixes).
  • drm: panel-orientation-quirks: Add quirk for AYA NEO GEEK (stable-fixes).
  • drm: panel-orientation-quirks: Make Lenovo Yoga Tab 3 X90F DMI match less strict (stable-fixes).
  • erofs: avoid debugging output for (de)compressed data (git-fixes).
  • exfat: fix uninit-value in __exfat_get_dentry_set (git-fixes).
  • ext4: add a new helper to check if es must be kept (bsc#1234170).
  • ext4: add correct group descriptors and reserved GDT blocks to system zone (bsc#1234164).
  • ext4: add missed brelse in update_backups (bsc#1234171).
  • ext4: allow for the last group to be marked as trimmed (bsc#1234278).
  • ext4: avoid buffer_head leak in ext4_mark_inode_used() (bsc#1234191).
  • ext4: avoid excessive credit estimate in ext4_tmpfile() (bsc#1234180).
  • ext4: avoid negative min_clusters in find_group_orlov() (bsc#1234193).
  • ext4: avoid overlapping preallocations due to overflow (bsc#1234162).
  • ext4: avoid potential buffer_head leak in __ext4_new_inode() (bsc#1234192).
  • ext4: avoid writing unitialized memory to disk in EA inodes (bsc#1234187).
  • ext4: check the extent status again before inserting delalloc block (bsc#1234186).
  • ext4: clear EXT4_GROUP_INFO_WAS_TRIMMED_BIT even mount with discard (bsc#1234190).
  • ext4: convert to exclusive lock while inserting delalloc extents (bsc#1234178).
  • ext4: correct best extent lstart adjustment logic (bsc#1234179).
  • ext4: correct grp validation in ext4_mb_good_group (bsc#1234163).
  • ext4: correct return value of ext4_convert_meta_bg (bsc#1234172).
  • ext4: correct the hole length returned by ext4_map_blocks() (bsc#1234178).
  • ext4: correct the start block of counting reserved clusters (bsc#1234169).
  • ext4: do not let fstrim block system suspend (https://bugzilla.kernel.org/show_bug.cgi?id=216322 bsc#1234166).
  • ext4: do not trim the group with corrupted block bitmap (bsc#1234177).
  • ext4: factor out __es_alloc_extent() and __es_free_extent() (bsc#1234170).
  • ext4: factor out a common helper to query extent map (bsc#1234186).
  • ext4: fix inconsistent between segment fstrim and full fstrim (bsc#1234176).
  • ext4: fix incorrect tid assumption in __jbd2_log_wait_for_space() (bsc#1234188).
  • ext4: fix incorrect tid assumption in ext4_wait_for_tail_page_commit() (bsc#1234188).
  • ext4: fix incorrect tid assumption in jbd2_journal_shrink_checkpoint_list() (bsc#1234188).
  • ext4: fix memory leaks in ext4_fname_{setup_filename,prepare_lookup} (bsc#1214954).
  • ext4: fix potential unnitialized variable (bsc#1234183).
  • ext4: fix race between writepages and remount (bsc#1234168).
  • ext4: fix rec_len verify error (bsc#1234167).
  • ext4: fix slab-use-after-free in ext4_es_insert_extent() (bsc#1234170).
  • ext4: fix uninitialized variable in ext4_inlinedir_to_tree (bsc#1234185).
  • ext4: forbid commit inconsistent quota data when errors=remount-ro (bsc#1234178).
  • ext4: make ext4_es_insert_delayed_block() return void (bsc#1234170).
  • ext4: make ext4_es_insert_extent() return void (bsc#1234170).
  • ext4: make ext4_es_remove_extent() return void (bsc#1234170).
  • ext4: make ext4_zeroout_es() return void (bsc#1234170).
  • ext4: make sure allocate pending entry not fail (bsc#1234170).
  • ext4: mark buffer new if it is unwritten to avoid stale data exposure (bsc#1234175).
  • ext4: move 'ix' sanity check to corrent position (bsc#1234174).
  • ext4: move setting of trimmed bit into ext4_try_to_trim_range() (bsc#1234165).
  • ext4: nested locking for xattr inode (bsc#1234189).
  • ext4: propagate errors from ext4_find_extent() in ext4_insert_range() (bsc#1234194).
  • ext4: refactor ext4_da_map_blocks() (bsc#1234178).
  • ext4: remove gdb backup copy for meta bg in setup_new_flex_group_blocks (bsc#1234173).
  • ext4: remove the redundant folio_wait_stable() (bsc#1234184).
  • ext4: set the type of max_zeroout to unsigned int to avoid overflow (bsc#1234182).
  • ext4: set type of ac_groups_linear_remaining to __u32 to avoid overflow (bsc#1234181).
  • ext4: use pre-allocated es in __es_insert_extent() (bsc#1234170).
  • ext4: use pre-allocated es in __es_remove_extent() (bsc#1234170).
  • ext4: using nofail preallocation in ext4_es_insert_delayed_block() (bsc#1234170).
  • ext4: using nofail preallocation in ext4_es_insert_extent() (bsc#1234170).
  • ext4: using nofail preallocation in ext4_es_remove_extent() (bsc#1234170).
  • filemap: Fix bounds checking in filemap_read() (bsc#1234209).
  • filemap: add a per-mapping stable writes flag (bsc#1234141).
  • firmware: arm_scmi: Reject clear channel request on A2P (stable-fixes).
  • fs-writeback: do not requeue a clean inode having skipped pages (bsc#1234200).
  • fs/writeback: bail out if there is no more inodes for IO and queued once (bsc#1234207).
  • fsnotify: fix sending inotify event with unexpected filename (bsc#1234198).
  • genirq/cpuhotplug: Retry with cpu_online_mask when migration fails (git-fixes).
  • genirq/cpuhotplug: Skip suspended interrupts when restoring affinity (git-fixes).
  • genirq/irqdesc: Honor caller provided affinity in alloc_desc() (git-fixes).
  • gpio: grgpio: Add NULL check in grgpio_probe (git-fixes).
  • gpio: grgpio: use a helper variable to store the address of ofdev->dev (stable-fixes).
  • hfsplus: do not query the device logical block size multiple times (git-fixes).
  • hvc/xen: fix console unplug (git-fixes).
  • hvc/xen: fix error path in xen_hvc_init() to always register frontend driver (git-fixes).
  • hvc/xen: fix event channel handling for secondary consoles (git-fixes).
  • hwmon: (nct6775) Add 665-ACE/600M-CL to ASUS WMI monitoring list (stable-fixes).
  • hwmon: (pmbus/core) clear faults after setting smbalert mask (git-fixes).
  • hwmon: (pmbus_core) Allow to hook PMBUS_SMBALERT_MASK (stable-fixes).
  • hwmon: (tmp513) Do not use 'proxy' headers (stable-fixes).
  • hwmon: (tmp513) Fix Current Register value interpretation (git-fixes).
  • hwmon: (tmp513) Fix interpretation of values of Shunt Voltage and Limit Registers (git-fixes).
  • hwmon: (tmp513) Fix interpretation of values of Temperature Result and Limit Registers (git-fixes).
  • hwmon: (tmp513) Simplify with dev_err_probe() (stable-fixes).
  • hwmon: (tmp513) Use SI constants from units.h (stable-fixes).
  • i2c: imx: add imx7d compatible string for applying erratum ERR007805 (git-fixes).
  • i2c: microchip-core: actually use repeated sends (git-fixes).
  • i2c: microchip-core: fix 'ghost' detections (git-fixes).
  • i2c: pnx: Fix timeout in wait functions (git-fixes).
  • i2c: riic: Always round-up when calculating bus period (git-fixes).
  • i40e: Fix handling changed priv flags (git-fixes).
  • i915/guc: Accumulate active runtime on gt reset (git-fixes).
  • i915/guc: Ensure busyness counter increases motonically (git-fixes).
  • i915/guc: Reset engine utilization buffer before registration (git-fixes).
  • ice: Unbind the workqueue (bsc#1234989)
  • ice: change q_index variable type to s16 to store -1 value (git-fixes).
  • ice: consistently use q_idx in ice_vc_cfg_qs_msg() (git-fixes).
  • ice: fix PHY Clock Recovery availability check (git-fixes).
  • idpf: add support for SW triggered interrupts (bsc#1235507).
  • idpf: enable WB_ON_ITR (bsc#1235507).
  • idpf: trigger SW interrupt when exiting wb_on_itr mode (bsc#1235507).
  • igb: Fix potential invalid memory access in igb_init_module() (git-fixes).
  • iio: magnetometer: yas530: use signed integer type for clamp limits (git-fixes).
  • instrumentation: Wire up cmpxchg128() (bsc#1220773).
  • io_uring/rw: avoid punting to io-wq directly (git-fixes).
  • io_uring/tctx: work around xa_store() allocation error issue (git-fixes).
  • io_uring: Fix registered ring file refcount leak (git-fixes).
  • io_uring: always lock __io_cqring_overflow_flush (git-fixes).
  • io_uring: check if iowq is killed before queuing (git-fixes).
  • iommu/io-pgtable-arm: Fix stage-2 map/unmap for concatenated tables (git-fixes).
  • irqflags: Explicitly ignore lockdep_hrtimer_exit() argument (git-fixes).
  • isofs: handle CDs with bad root inode but good Joliet root directory (bsc#1234199).
  • ixgbe: downgrade logging of unsupported VF API version to debug (git-fixes).
  • ixgbevf: stop attempting IPSEC offload on Mailbox API 1.5 (git-fixes).
  • jffs2: Fix rtime decompressor (git-fixes).
  • jffs2: Prevent rtime decompress memory corruption (git-fixes).
  • jffs2: fix use of uninitialized variable (git-fixes).
  • jfs: add a check to prevent array-index-out-of-bounds in dbAdjTree (git-fixes).
  • jfs: array-index-out-of-bounds fix in dtReadFirst (git-fixes).
  • jfs: fix array-index-out-of-bounds in jfs_readdir (git-fixes).
  • jfs: fix shift-out-of-bounds in dbSplit (git-fixes).
  • jfs: xattr: check invalid xattr size more strictly (git-fixes).
  • kABI workaround for struct drm_dp_mst_topology_mgr (git-fixes).
  • kabi/severities: make vcap_find_actionfield PASS (bsc#1220773)
  • kasan: make report_lock a raw spinlock (git-fixes).
  • kdb: Fix buffer overflow during tab-complete (bsc#1234652).
  • kdb: Fix console handling when editing and tab-completing commands (bsc#1234655).
  • kdb: Merge identical case statements in kdb_read() (bsc#1234657).
  • kdb: Use format-specifiers rather than memset() for padding in kdb_read() (bsc#1234658).
  • kdb: Use format-strings rather than '\0' injection in kdb_read() (bsc#1234654).
  • kdb: Use the passed prompt in kdb_position_cursor() (bsc#1234654).
  • kdb: address -Wformat-security warnings (bsc#1234659).
  • kgdb: Flush console before entering kgdb on panic (bsc#1234651).
  • leds: class: Protect brightness_show() with led_cdev->led_access mutex (stable-fixes).
  • linux/dmaengine.h: fix a few kernel-doc warnings (git-fixes).
  • locking/atomic/x86: Correct the definition of __arch_try_cmpxchg128() (bsc#1220773 git-fix).
  • loop: fix the the direct I/O support check when used on top of block devices (bsc#1234143).
  • mac80211: fix user-power when emulating chanctx (stable-fixes).
  • media: cx231xx: Add support for Dexatek USB Video Grabber 1d19:6108 (stable-fixes).
  • media: dvb-frontends: dib3000mb: fix uninit-value in dib3000_write_reg (git-fixes).
  • media: uvcvideo: Add a quirk for the Kaiweets KTI-W02 infrared camera (stable-fixes).
  • media: uvcvideo: RealSense D421 Depth module metadata (stable-fixes).
  • mfd: da9052-spi: Change read-mask to write-mask (git-fixes).
  • mfd: intel_soc_pmic_bxtwc: Use IRQ domain for PMIC devices (git-fixes).
  • mfd: intel_soc_pmic_bxtwc: Use IRQ domain for TMU device (git-fixes).
  • mfd: intel_soc_pmic_bxtwc: Use IRQ domain for USB Type-C device (git-fixes).
  • mm/filemap: avoid buffered read/write race to read inconsistent data (bsc#1234204).
  • mm/readahead: do not allow order-1 folio (bsc#1234205).
  • mm/readahead: limit page cache size in page_cache_ra_order() (bsc#1234208).
  • mmc: core: Add SD card quirk for broken poweroff notification (stable-fixes).
  • mmc: mtk-sd: Fix MMC_CAP2_CRYPTO flag setting (git-fixes).
  • mmc: mtk-sd: fix devm_clk_get_optional usage (stable-fixes).
  • mmc: sdhci-esdhc-imx: enable quirks SDHCI_QUIRK_NO_LED (stable-fixes).
  • mmc: sdhci-pci: Add DMI quirk for missing CD GPIO on Vexia Edu Atla 10 tablet (stable-fixes).
  • mmc: sdhci-tegra: Remove SDHCI_QUIRK_BROKEN_ADMA_ZEROLEN_DESC quirk (git-fixes).
  • mtd: diskonchip: Cast an operand to prevent potential overflow (git-fixes).
  • mtd: hyperbus: rpc-if: Add missing MODULE_DEVICE_TABLE (git-fixes).
  • mtd: hyperbus: rpc-if: Convert to platform remove callback returning void (stable-fixes).
  • mtd: rawnand: arasan: Fix double assertion of chip-select (git-fixes).
  • mtd: rawnand: arasan: Fix missing de-registration of NAND (git-fixes).
  • mtd: rawnand: fix double free in atmel_pmecc_create_user() (git-fixes).
  • net :mana :Request a V2 response version for MANA_QUERY_GF_STAT (git-fixes).
  • net/ipv6: release expired exception dst cached in socket (bsc#1216813).
  • net/mlx5e: CT: Fix null-ptr-deref in add rule err flow (git-fixes).
  • net/mlx5e: Remove workaround to avoid syndrome for internal port (git-fixes).
  • net/mlx5e: clear xdp features on non-uplink representors (git-fixes).
  • net/qed: allow old cards not supporting 'num_images' to work (git-fixes).
  • net: Return error from sk_stream_wait_connect() if sk_wait_event() fails (git-fixes).
  • net: mana: Increase the DEF_RX_BUFFERS_PER_QUEUE to 1024 (bsc#1235246).
  • net: usb: qmi_wwan: add Quectel RG650V (stable-fixes).
  • nfs: ignore SB_RDONLY when mounting nfs (git-fixes).
  • nfsd: fix nfs4_openowner leak when concurrent nfsd4_open occur (git-fixes).
  • nfsd: make sure exp active before svc_export_show (git-fixes).
  • nfsd: release svc_expkey/svc_export with rcu_work (git-fixes).
  • nfsd: restore callback functionality for NFSv4.0 (git-fixes).
  • nilfs2: fix buffer head leaks in calls to truncate_inode_pages() (git-fixes).
  • nilfs2: fix potential out-of-bounds memory access in nilfs_find_entry() (git-fixes).
  • nilfs2: prevent use of deleted inode (git-fixes).
  • nvme-pci: 512 byte aligned dma pool segment quirk (git-fixes).
  • nvme-rdma: unquiesce admin_q before destroy it (git-fixes).
  • nvme-tcp: fix the memleak while create new ctrl failed (git-fixes).
  • nvme/multipath: Fix RCU list traversal to use SRCU primitive (git-fixes).
  • nvme: apple: fix device reference counting (git-fixes).
  • nvme: fix metadata handling in nvme-passthrough (git-fixes).
  • nvmet-loop: avoid using mutex in IO hotpath (git-fixes).
  • ocfs2: fix uninitialized value in ocfs2_file_read_iter() (git-fixes).
  • ocfs2: free inode when ocfs2_get_init_inode() fails (git-fixes).
  • of/irq: Fix using uninitialized variable @addr_len in API of_irq_parse_one() (git-fixes).
  • of: Fix error path in of_parse_phandle_with_args_map() (git-fixes).
  • of: Fix refcount leakage for OF node returned by __of_get_dma_parent() (git-fixes).
  • of: address: Report error on resource bounds overflow (stable-fixes).
  • parisc: Raise minimal GCC version (bsc#1220773).
  • parisc: Raise minimal GCC version to 12.0.0 (bsc#1220773 git-fix).
  • percpu: Add {raw,this}_cpu_try_cmpxchg() (bsc#1220773).
  • percpu: Fix self-assignment of __old in raw_cpu_generic_try_cmpxchg() (bsc#1220773 git-fix).
  • percpu: Wire up cmpxchg128 (bsc#1220773).
  • phy: core: Fix an OF node refcount leakage in _of_phy_get() (git-fixes).
  • phy: core: Fix an OF node refcount leakage in of_phy_provider_lookup() (git-fixes).
  • phy: core: Fix that API devm_of_phy_provider_unregister() fails to unregister the phy provider (git-fixes).
  • phy: core: Fix that API devm_phy_destroy() fails to destroy the phy (git-fixes).
  • phy: core: Fix that API devm_phy_put() fails to release the phy (git-fixes).
  • phy: qcom-qmp: Fix register name in RX Lane config of SC8280XP (git-fixes).
  • phy: rockchip: naneng-combphy: fix phy reset (git-fixes).
  • phy: usb: Toggle the PHY power during init (git-fixes).
  • pinctrl: mcp23s08: Fix sleeping in atomic context due to regmap locking (git-fixes).
  • pinctrl: qcom-pmic-gpio: add support for PM8937 (stable-fixes).
  • pinctrl: qcom: spmi-mpp: Add PM8937 compatible (stable-fixes).
  • pinmux: Use sequential access to access desc->pinmux data (stable-fixes).
  • platform/chrome: cros_ec_proto: Lock device when updating MKBP version (git-fixes).
  • platform/x86: asus-nb-wmi: Ignore unknown event 0xCF (stable-fixes).
  • platform/x86: dell-smbios-base: Extends support to Alienware products (stable-fixes).
  • platform/x86: dell-wmi-base: Handle META key Lock/Unlock events (stable-fixes).
  • platform/x86: thinkpad_acpi: Fix for ThinkPad's with ECFW showing incorrect fan speed (stable-fixes).
  • power: supply: gpio-charger: Fix set charge current limits (git-fixes).
  • powerpc/book3s64/hugetlb: Fix disabling hugetlb when fadump is active (bsc#1235108).
  • proc/softirqs: replace seq_printf with seq_put_decimal_ull_width (git-fixes).
  • quota: Fix rcu annotations of inode dquot pointers (bsc#1234197).
  • quota: explicitly forbid quota files from being encrypted (bsc#1234196).
  • quota: flush quota_release_work upon quota writeback (bsc#1234195).
  • quota: simplify drop_dquot_ref() (bsc#1234197).
  • readahead: use ilog2 instead of a while loop in page_cache_ra_order() (bsc#1234208).
  • regmap: Use correct format specifier for logging range errors (stable-fixes).
  • regulator: rk808: Add apply_bit for BUCK3 on RK809 (stable-fixes).
  • rtc: cmos: avoid taking rtc_lock for extended period of time (stable-fixes).
  • s390/cio: Do not unregister the subchannel based on DNV (git-fixes).
  • s390/cpum_sf: Convert to cmpxchg128() (bsc#1220773).
  • s390/cpum_sf: Handle CPU hotplug remove during sampling (git-fixes).
  • s390/cpum_sf: Remove WARN_ON_ONCE statements (git-fixes).
  • s390/facility: Disable compile time optimization for decompressor code (git-fixes).
  • s390/iucv: MSG_PEEK causes memory leak in iucv_sock_destruct() (git-fixes).
  • s390/pageattr: Implement missing kernel_page_present() (git-fixes).
  • scatterlist: fix incorrect func name in kernel-doc (git-fixes).
  • sched/numa: fix memory leak due to the overwritten vma->numab_state (git fixes (sched/numa)).
  • scsi: lpfc: Add handling for LS_RJT reason explanation authentication required (bsc#1235409).
  • scsi: lpfc: Add support for large fw object application layer reads (bsc#1235409).
  • scsi: lpfc: Change lpfc_nodelist save_flags member into a bitmask (bsc#1235409).
  • scsi: lpfc: Copyright updates for 14.4.0.7 patches (bsc#1235409).
  • scsi: lpfc: Delete NLP_TARGET_REMOVE flag due to obsolete usage (bsc#1235409).
  • scsi: lpfc: Modify handling of ADISC based on ndlp state and RPI registration (bsc#1235409).
  • scsi: lpfc: Redefine incorrect type in lpfc_create_device_data() (bsc#1235409).
  • scsi: lpfc: Restrict the REG_FCFI MAM field to FCoE adapters only (bsc#1235409).
  • scsi: lpfc: Update definition of firmware configuration mbox cmds (bsc#1235409).
  • scsi: lpfc: Update lpfc version to 14.4.0.7 (bsc#1235409).
  • scsi: qla2xxx: Fix NVMe and NPIV connect issue (bsc#1235406).
  • scsi: qla2xxx: Fix abort in bsg timeout (bsc#1235406).
  • scsi: qla2xxx: Fix use after free on unload (bsc#1235406).
  • scsi: qla2xxx: Remove check req_sg_cnt should be equal to rsp_sg_cnt (bsc#1235406).
  • scsi: qla2xxx: Remove the unused 'del_list_entry' field in struct fc_port (bsc#1235406).
  • scsi: qla2xxx: Supported speed displayed incorrectly for VPorts (bsc#1235406).
  • scsi: qla2xxx: Update version to 10.02.09.400-k (bsc#1235406).
  • scsi: storvsc: Do not flag MAINTENANCE_IN return of SRB_STATUS_DATA_OVERRUN as an error (git-fixes).
  • selftests/bpf: Test PROBE_MEM of VSYSCALL_ADDR on x86-64 (git-fixes).
  • serial: 8250_dw: Add Sophgo SG2044 quirk (stable-fixes).
  • serial: 8250_dw: Do not use struct dw8250_data outside of 8250_dw (git-fixes).
  • serial: 8250_dw: Replace ACPI device check by a quirk (git-fixes).
  • serial: 8250_fintek: Add support for F81216E (stable-fixes).
  • serial: Do not hold the port lock when setting rx-during-tx GPIO (git-fixes).
  • serial: amba-pl011: Fix RX stall when DMA is used (git-fixes).
  • serial: amba-pl011: Use port lock wrappers (stable-fixes).
  • serial: amba-pl011: fix build regression (git-fixes).
  • serial: do not use uninitialized value in uart_poll_init() (git-fixes).
  • serial: imx: only set receiver level if it is zero (git-fixes).
  • serial: imx: set receiver level before starting uart (git-fixes).
  • serial: qcom-geni: Do not cancel/abort if we can't get the port lock (git-fixes).
  • serial: qcom-geni: disable interrupts during console writes (git-fixes).
  • serial: qcom-geni: fix arg types for qcom_geni_serial_poll_bit() (git-fixes).
  • serial: qcom-geni: fix console corruption (git-fixes).
  • serial: qcom-geni: fix dma rx cancellation (git-fixes).
  • serial: qcom-geni: fix false console tx restart (git-fixes).
  • serial: qcom-geni: fix fifo polling timeout (git-fixes).
  • serial: qcom-geni: fix hard lockup on buffer flush (git-fixes).
  • serial: qcom-geni: fix polled console corruption (git-fixes).
  • serial: qcom-geni: fix polled console initialisation (git-fixes).
  • serial: qcom-geni: fix receiver enable (git-fixes).
  • serial: qcom-geni: fix shutdown race (git-fixes).
  • serial: qcom-geni: fix soft lockup on sw flow control and suspend (git-fixes).
  • serial: qcom-geni: introduce qcom_geni_serial_poll_bitfield() (git-fixes).
  • serial: qcom-geni: revert broken hibernation support (git-fixes).
  • serial: stm32: Return IRQ_NONE in the ISR if no handling happend (git-fixes).
  • serial: stm32: do not always set SER_RS485_RX_DURING_TX if RS485 is enabled (git-fixes).
  • slub: Replace cmpxchg_double() (bsc#1220773).
  • slub: Replace cmpxchg_double() - KABI fix (bsc#1220773).
  • smb: client: fix TCP timers deadlock after rmmod (git-fixes) [hcarvalho: fix issue described in bsc#1233642]
  • soc/fsl: cpm: qmc: Convert to platform remove callback returning void (stable-fixes).
  • soc: fsl: cpm1: qmc: Fix blank line and spaces (stable-fixes).
  • soc: fsl: cpm1: qmc: Introduce qmc_init_resource() and its CPM1 version (stable-fixes).
  • soc: fsl: cpm1: qmc: Introduce qmc_{init,exit}_xcc() and their CPM1 version (stable-fixes).
  • soc: fsl: cpm1: qmc: Re-order probe() operations (stable-fixes).
  • soc: fsl: cpm1: qmc: Set the ret error code on platform_get_irq() failure (git-fixes).
  • soc: imx8m: Probe the SoC driver as platform driver (stable-fixes).
  • soc: qcom: Add check devm_kasprintf() returned value (stable-fixes).
  • soc: qcom: geni-se: Add M_TX_FIFO_NOT_EMPTY bit definition (git-fixes).
  • soc: qcom: geni-se: add GP_LENGTH/IRQ_EN_SET/IRQ_EN_CLEAR registers (git-fixes).
  • soc: qcom: socinfo: fix revision check in qcom_socinfo_probe() (git-fixes).
  • spi: aspeed: Fix an error handling path in aspeed_spi_[read|write]_user() (git-fixes).
  • sunrpc: clear XPRT_SOCK_UPD_TIMEOUT when reset transport (git-fixes).
  • sunrpc: fix one UAF issue caused by sunrpc kernel tcp socket (git-fixes).
  • sunrpc: handle -ENOTCONN in xs_tcp_setup_socket() (git-fixes).
  • svcrdma: Address an integer overflow (git-fixes).
  • svcrdma: fix miss destroy percpu_counter in svc_rdma_proc_init() (git-fixes).
  • swiotlb: Enforce page alignment in swiotlb_alloc() (git-fixes).
  • swiotlb: Reinstate page-alignment for mappings >= PAGE_SIZE (git-fixes).
  • thermal/drivers/qcom/tsens-v1: Add support for MSM8937 tsens (stable-fixes).
  • tools: hv: change permissions of NetworkManager configuration file (git-fixes).
  • tpm/eventlog: Limit memory allocations for event logs with excessive size (bsc#1233260 bsc#1233259 bsc#1232421).
  • tpm_tis_spi: Release chip select when flow control fails (bsc#1234338)
  • tty: serial: kgdboc: Fix 8250_* kgdb over serial (git-fixes).
  • types: Introduce [us]128 (bsc#1220773).
  • ubifs: Correct the total block count by deducting journal reservation (git-fixes).
  • ubifs: authentication: Fix use-after-free in ubifs_tnc_end_commit (git-fixes).
  • udf: Fix lock ordering in udf_evict_inode() (bsc#1234238).
  • udf: fix uninit-value use in udf_get_fileshortad (bsc#1234243).
  • udf: prevent integer overflow in udf_bitmap_free_blocks() (bsc#1234239).
  • udf: refactor inode_bmap() to handle error (bsc#1234242).
  • udf: refactor udf_current_aext() to handle error (bsc#1234240).
  • udf: refactor udf_next_aext() to handle error (bsc#1234241).
  • udf: udftime: prevent overflow in udf_disk_stamp_to_time() (bsc#1234237).
  • usb: add support for new USB device ID 0x17EF:0x3098 for the r8152 driver (stable-fixes).
  • usb: cdns3-ti: Add workaround for Errata i2409 (stable-fixes).
  • usb: cdns3: Add quirk flag to enable suspend residency (stable-fixes).
  • usb: chipidea: udc: handle USB Error Interrupt if IOC not set (stable-fixes).
  • usb: dwc2: Fix HCD port connection race (git-fixes).
  • usb: dwc2: Fix HCD resume (git-fixes).
  • usb: dwc2: gadget: Do not write invalid mapped sg entries into dma_desc with iommu enabled (stable-fixes).
  • usb: dwc2: hcd: Fix GetPortStatus & SetPortFeature (git-fixes).
  • usb: dwc3: ep0: Do not clear ep0 DWC3_EP_TRANSFER_STARTED (git-fixes).
  • usb: dwc3: ep0: Do not reset resource alloc flag (git-fixes).
  • usb: dwc3: ep0: Do not reset resource alloc flag (including ep0) (git-fixes).
  • usb: dwc3: gadget: Rewrite endpoint allocation flow (stable-fixes).
  • usb: dwc3: xilinx: make sure pipe clock is deselected in usb2 only mode (git-fixes).
  • usb: ehci-hcd: fix call balance of clocks handling routines (git-fixes).
  • usb: gadget: u_serial: Fix the issue that gs_start_io crashed due to accessing null pointer (git-fixes).
  • usb: host: max3421-hcd: Correctly abort a USB request (git-fixes).
  • usb: typec: anx7411: fix OF node reference leaks in anx7411_typec_switch_probe() (git-fixes).
  • usb: typec: anx7411: fix fwnode_handle reference leak (git-fixes).
  • usb: typec: use cleanup facility for 'altmodes_node' (stable-fixes).
  • vDPA/ifcvf: Fix pci_read_config_byte() return code handling (git-fixes).
  • vdpa/mlx5: Fix PA offset with unaligned starting iotlb map (git-fixes).
  • vdpa/mlx5: Fix suboptimal range on iotlb iteration (git-fixes).
  • vdpa: solidrun: Fix UB bug with devres (git-fixes).
  • vfs: fix readahead(2) on block devices (bsc#1234201).
  • wifi: ath5k: add PCI ID for Arcadyan devices (git-fixes).
  • wifi: ath5k: add PCI ID for SX76X (git-fixes).
  • wifi: brcmfmac: Fix oops due to NULL pointer dereference in brcmf_sdiod_sglist_rw() (stable-fixes).
  • wifi: cfg80211: sme: init n_channels before channels[] access (git-fixes).
  • wifi: cw1200: Fix potential NULL dereference (git-fixes).
  • wifi: ipw2x00: libipw_rx_any(): fix bad alignment (stable-fixes).
  • wifi: iwlwifi: mvm: Use the sync timepoint API in suspend (stable-fixes).
  • wifi: mac80211: clean up 'ret' in sta_link_apply_parameters() (stable-fixes).
  • wifi: mac80211: fix station NSS capability initialization order (git-fixes).
  • wifi: mac80211: init cnt before accessing elem in ieee80211_copy_mbssid_beacon (git-fixes).
  • wifi: nl80211: fix NL80211_ATTR_MLO_LINK_ID off-by-one (git-fixes).
  • wifi: rtlwifi: Drastically reduce the attempts to read efuse in case of failures (stable-fixes).
  • wifi: rtw89: check return value of ieee80211_probereq_get() for RNR (stable-fixes).
  • workqueue: Do not warn when cancelling WQ_MEM_RECLAIM work from !WQ_MEM_RECLAIM worker (bsc#1235416).
  • writeback, cgroup: switch inodes with dirty timestamps to release dying cgwbs (bsc#1234203).
  • x86,amd_iommu: Replace cmpxchg_double() (bsc#1220773).
  • x86,intel_iommu: Replace cmpxchg_double() (bsc#1220773).
  • x86/hyperv: Fix hv tsc page based sched_clock for hibernation (git-fixes).
  • xfs: do not allocate COW extents when unsharing a hole (git-fixes).
  • xfs: fix sb_spino_align checks for large fsblock sizes (git-fixes).
  • xfs: remove unknown compat feature check in superblock write validation (git-fixes).
  • xfs: return from xfs_symlink_verify early on V4 filesystems (git-fixes).
  • xfs: sb_spino_align is not verified (git-fixes).
  • xhci: Add usb cold attach (CAS) as a reason to resume root hub (git-fixes).
  • xhci: Allow RPM on the USB controller (1022:43f7) by default (stable-fixes).
  • xhci: fix possible null pointer deref during xhci urb enqueue (git-fixes).

Список пакетов

SUSE Linux Enterprise Live Patching 15 SP6
kernel-livepatch-6_4_0-150600_10_23-rt-1-150600.1.3.1
SUSE Real Time Module 15 SP6
cluster-md-kmp-rt-6.4.0-150600.10.23.1
dlm-kmp-rt-6.4.0-150600.10.23.1
gfs2-kmp-rt-6.4.0-150600.10.23.1
kernel-devel-rt-6.4.0-150600.10.23.1
kernel-rt-6.4.0-150600.10.23.1
kernel-rt-devel-6.4.0-150600.10.23.1
kernel-rt_debug-6.4.0-150600.10.23.1
kernel-rt_debug-devel-6.4.0-150600.10.23.1
kernel-source-rt-6.4.0-150600.10.23.1
kernel-syms-rt-6.4.0-150600.10.23.1
ocfs2-kmp-rt-6.4.0-150600.10.23.1
openSUSE Leap 15.6
cluster-md-kmp-rt-6.4.0-150600.10.23.1
dlm-kmp-rt-6.4.0-150600.10.23.1
gfs2-kmp-rt-6.4.0-150600.10.23.1
kernel-devel-rt-6.4.0-150600.10.23.1
kernel-rt-6.4.0-150600.10.23.1
kernel-rt-devel-6.4.0-150600.10.23.1
kernel-rt-extra-6.4.0-150600.10.23.1
kernel-rt-livepatch-devel-6.4.0-150600.10.23.1
kernel-rt-optional-6.4.0-150600.10.23.1
kernel-rt-vdso-6.4.0-150600.10.23.1
kernel-rt_debug-6.4.0-150600.10.23.1
kernel-rt_debug-devel-6.4.0-150600.10.23.1
kernel-rt_debug-vdso-6.4.0-150600.10.23.1
kernel-source-rt-6.4.0-150600.10.23.1
kernel-syms-rt-6.4.0-150600.10.23.1
kselftests-kmp-rt-6.4.0-150600.10.23.1
ocfs2-kmp-rt-6.4.0-150600.10.23.1
reiserfs-kmp-rt-6.4.0-150600.10.23.1

Описание

In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_set_pipapo: do not free live element Pablo reports a crash with large batches of elements with a back-to-back add/remove pattern. Quoting Pablo: add_elem("00000000") timeout 100 ms ... add_elem("0000000X") timeout 100 ms del_elem("0000000X") <---------------- delete one that was just added ... add_elem("00005000") timeout 100 ms 1) nft_pipapo_remove() removes element 0000000X Then, KASAN shows a splat. Looking at the remove function there is a chance that we will drop a rule that maps to a non-deactivated element. Removal happens in two steps, first we do a lookup for key k and return the to-be-removed element and mark it as inactive in the next generation. Then, in a second step, the element gets removed from the set/map. The _remove function does not work correctly if we have more than one element that share the same key. This can happen if we insert an element into a set when the set already holds an element with same key, but the element mapping to the existing key has timed out or is not active in the next generation. In such case its possible that removal will unmap the wrong element. If this happens, we will leak the non-deactivated element, it becomes unreachable. The element that got deactivated (and will be freed later) will remain reachable in the set data structure, this can result in a crash when such an element is retrieved during lookup (stale pointer). Add a check that the fully matching key does in fact map to the element that we have marked as inactive in the deactivation step. If not, we need to continue searching. Add a bug/warn trap at the end of the function as well, the remove function must not ever be called with an invisible/unreachable/non-existent element. v2: avoid uneeded temporary variable (Stefano)


Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_23-rt-1-150600.1.3.1
SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.23.1

Ссылки

Описание

In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: use timestamp to check for set element timeout Add a timestamp field at the beginning of the transaction, store it in the nftables per-netns area. Update set backend .insert, .deactivate and sync gc path to use the timestamp, this avoids that an element expires while control plane transaction is still unfinished. .lookup and .update, which are used from packet path, still use the current time to check if the element has expired. And .get path and dump also since this runs lockless under rcu read size lock. Then, there is async gc which also needs to check the current time since it runs asynchronously from a workqueue.


Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_23-rt-1-150600.1.3.1
SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.23.1

Ссылки

Описание

In the Linux kernel, the following vulnerability has been resolved: netfilter: bridge: replace physindev with physinif in nf_bridge_info An skb can be added to a neigh->arp_queue while waiting for an arp reply. Where original skb's skb->dev can be different to neigh's neigh->dev. For instance in case of bridging dnated skb from one veth to another, the skb would be added to a neigh->arp_queue of the bridge. As skb->dev can be reset back to nf_bridge->physindev and used, and as there is no explicit mechanism that prevents this physindev from been freed under us (for instance neigh_flush_dev doesn't cleanup skbs from different device's neigh queue) we can crash on e.g. this stack: arp_process neigh_update skb = __skb_dequeue(&neigh->arp_queue) neigh_resolve_output(..., skb) ... br_nf_dev_xmit br_nf_pre_routing_finish_bridge_slow skb->dev = nf_bridge->physindev br_handle_frame_finish Let's use plain ifindex instead of net_device link. To peek into the original net_device we will use dev_get_by_index_rcu(). Thus either we get device and are safe to use it or we don't get it and drop skb.


Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_23-rt-1-150600.1.3.1
SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.23.1

Ссылки

Описание

In the Linux kernel, the following vulnerability has been resolved: blk-iocost: do not WARN if iocg was already offlined In iocg_pay_debt(), warn is triggered if 'active_list' is empty, which is intended to confirm iocg is active when it has debt. However, warn can be triggered during a blkcg or disk removal, if iocg_waitq_timer_fn() is run at that time: WARNING: CPU: 0 PID: 2344971 at block/blk-iocost.c:1402 iocg_pay_debt+0x14c/0x190 Call trace: iocg_pay_debt+0x14c/0x190 iocg_kick_waitq+0x438/0x4c0 iocg_waitq_timer_fn+0xd8/0x130 __run_hrtimer+0x144/0x45c __hrtimer_run_queues+0x16c/0x244 hrtimer_interrupt+0x2cc/0x7b0 The warn in this situation is meaningless. Since this iocg is being removed, the state of the 'active_list' is irrelevant, and 'waitq_timer' is canceled after removing 'active_list' in ioc_pd_free(), which ensures iocg is freed after iocg_waitq_timer_fn() returns. Therefore, add the check if iocg was already offlined to avoid warn when removing a blkcg or disk.


Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_23-rt-1-150600.1.3.1
SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.23.1

Ссылки

Описание

In the Linux kernel, the following vulnerability has been resolved: kdb: Fix buffer overflow during tab-complete Currently, when the user attempts symbol completion with the Tab key, kdb will use strncpy() to insert the completed symbol into the command buffer. Unfortunately it passes the size of the source buffer rather than the destination to strncpy() with predictably horrible results. Most obviously if the command buffer is already full but cp, the cursor position, is in the middle of the buffer, then we will write past the end of the supplied buffer. Fix this by replacing the dubious strncpy() calls with memmove()/memcpy() calls plus explicit boundary checks to make sure we have enough space before we start moving characters around.


Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_23-rt-1-150600.1.3.1
SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.23.1

Ссылки

Описание

In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: prefer nft_chain_validate nft_chain_validate already performs loop detection because a cycle will result in a call stack overflow (ctx->level >= NFT_JUMP_STACK_SIZE). It also follows maps via ->validate callback in nft_lookup, so there appears no reason to iterate the maps again. nf_tables_check_loops() and all its helper functions can be removed. This improves ruleset load time significantly, from 23s down to 12s. This also fixes a crash bug. Old loop detection code can result in unbounded recursion: BUG: TASK stack guard page was hit at .... Oops: stack guard page: 0000 [#1] PREEMPT SMP KASAN CPU: 4 PID: 1539 Comm: nft Not tainted 6.10.0-rc5+ #1 [..] with a suitable ruleset during validation of register stores. I can't see any actual reason to attempt to check for this from nft_validate_register_store(), at this point the transaction is still in progress, so we don't have a full picture of the rule graph. For nf-next it might make sense to either remove it or make this depend on table->validate_state in case we could catch an error earlier (for improved error reporting to userspace).


Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_23-rt-1-150600.1.3.1
SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.23.1

Ссылки

Описание

In the Linux kernel, the following vulnerability has been resolved: net: bridge: mcast: wait for previous gc cycles when removing port syzbot hit a use-after-free[1] which is caused because the bridge doesn't make sure that all previous garbage has been collected when removing a port. What happens is: CPU 1 CPU 2 start gc cycle remove port acquire gc lock first wait for lock call br_multicasg_gc() directly acquire lock now but free port the port can be freed while grp timers still running Make sure all previous gc cycles have finished by using flush_work before freeing the port. [1] BUG: KASAN: slab-use-after-free in br_multicast_port_group_expired+0x4c0/0x550 net/bridge/br_multicast.c:861 Read of size 8 at addr ffff888071d6d000 by task syz.5.1232/9699 CPU: 1 PID: 9699 Comm: syz.5.1232 Not tainted 6.10.0-rc5-syzkaller-00021-g24ca36a562d6 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 Call Trace: <IRQ> __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0x116/0x1f0 lib/dump_stack.c:114 print_address_description mm/kasan/report.c:377 [inline] print_report+0xc3/0x620 mm/kasan/report.c:488 kasan_report+0xd9/0x110 mm/kasan/report.c:601 br_multicast_port_group_expired+0x4c0/0x550 net/bridge/br_multicast.c:861 call_timer_fn+0x1a3/0x610 kernel/time/timer.c:1792 expire_timers kernel/time/timer.c:1843 [inline] __run_timers+0x74b/0xaf0 kernel/time/timer.c:2417 __run_timer_base kernel/time/timer.c:2428 [inline] __run_timer_base kernel/time/timer.c:2421 [inline] run_timer_base+0x111/0x190 kernel/time/timer.c:2437


Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_23-rt-1-150600.1.3.1
SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.23.1

Ссылки

Описание

In the Linux kernel, the following vulnerability has been resolved: vsock: fix recursive ->recvmsg calls After a vsock socket has been added to a BPF sockmap, its prot->recvmsg has been replaced with vsock_bpf_recvmsg(). Thus the following recursiion could happen: vsock_bpf_recvmsg() -> __vsock_recvmsg() -> vsock_connectible_recvmsg() -> prot->recvmsg() -> vsock_bpf_recvmsg() again We need to fix it by calling the original ->recvmsg() without any BPF sockmap logic in __vsock_recvmsg().


Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_23-rt-1-150600.1.3.1
SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.23.1

Ссылки

Описание

In the Linux kernel, the following vulnerability has been resolved: icmp: change the order of rate limits ICMP messages are ratelimited : After the blamed commits, the two rate limiters are applied in this order: 1) host wide ratelimit (icmp_global_allow()) 2) Per destination ratelimit (inetpeer based) In order to avoid side-channels attacks, we need to apply the per destination check first. This patch makes the following change : 1) icmp_global_allow() checks if the host wide limit is reached. But credits are not yet consumed. This is deferred to 3) 2) The per destination limit is checked/updated. This might add a new node in inetpeer tree. 3) icmp_global_consume() consumes tokens if prior operations succeeded. This means that host wide ratelimit is still effective in keeping inetpeer tree small even under DDOS. As a bonus, I removed icmp_global.lock as the fast path can use a lock-free operation.


Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_23-rt-1-150600.1.3.1
SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.23.1

Ссылки

Описание

** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.


Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_23-rt-1-150600.1.3.1
SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.23.1

Ссылки

Описание

In the Linux kernel, the following vulnerability has been resolved: ext4: fix slab-use-after-free in ext4_split_extent_at() We hit the following use-after-free: ================================================================== BUG: KASAN: slab-use-after-free in ext4_split_extent_at+0xba8/0xcc0 Read of size 2 at addr ffff88810548ed08 by task kworker/u20:0/40 CPU: 0 PID: 40 Comm: kworker/u20:0 Not tainted 6.9.0-dirty #724 Call Trace: <TASK> kasan_report+0x93/0xc0 ext4_split_extent_at+0xba8/0xcc0 ext4_split_extent.isra.0+0x18f/0x500 ext4_split_convert_extents+0x275/0x750 ext4_ext_handle_unwritten_extents+0x73e/0x1580 ext4_ext_map_blocks+0xe20/0x2dc0 ext4_map_blocks+0x724/0x1700 ext4_do_writepages+0x12d6/0x2a70 [...] Allocated by task 40: __kmalloc_noprof+0x1ac/0x480 ext4_find_extent+0xf3b/0x1e70 ext4_ext_map_blocks+0x188/0x2dc0 ext4_map_blocks+0x724/0x1700 ext4_do_writepages+0x12d6/0x2a70 [...] Freed by task 40: kfree+0xf1/0x2b0 ext4_find_extent+0xa71/0x1e70 ext4_ext_insert_extent+0xa22/0x3260 ext4_split_extent_at+0x3ef/0xcc0 ext4_split_extent.isra.0+0x18f/0x500 ext4_split_convert_extents+0x275/0x750 ext4_ext_handle_unwritten_extents+0x73e/0x1580 ext4_ext_map_blocks+0xe20/0x2dc0 ext4_map_blocks+0x724/0x1700 ext4_do_writepages+0x12d6/0x2a70 [...] ================================================================== The flow of issue triggering is as follows: ext4_split_extent_at path = *ppath ext4_ext_insert_extent(ppath) ext4_ext_create_new_leaf(ppath) ext4_find_extent(orig_path) path = *orig_path read_extent_tree_block // return -ENOMEM or -EIO ext4_free_ext_path(path) kfree(path) *orig_path = NULL a. If err is -ENOMEM: ext4_ext_dirty(path + path->p_depth) // path use-after-free !!! b. If err is -EIO and we have EXT_DEBUG defined: ext4_ext_show_leaf(path) eh = path[depth].p_hdr // path also use-after-free !!! So when trying to zeroout or fix the extent length, call ext4_find_extent() to update the path. In addition we use *ppath directly as an ext4_ext_show_leaf() input to avoid possible use-after-free when EXT_DEBUG is defined, and to avoid unnecessary path updates.


Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_23-rt-1-150600.1.3.1
SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.23.1

Ссылки

Описание

In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Add NULL check for clk_mgr in dcn32_init_hw This commit addresses a potential null pointer dereference issue in the `dcn32_init_hw` function. The issue could occur when `dc->clk_mgr` is null. The fix adds a check to ensure `dc->clk_mgr` is not null before accessing its functions. This prevents a potential null pointer dereference. Reported by smatch: drivers/gpu/drm/amd/amdgpu/../display/dc/hwss/dcn32/dcn32_hwseq.c:961 dcn32_init_hw() error: we previously assumed 'dc->clk_mgr' could be null (see line 782)


Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_23-rt-1-150600.1.3.1
SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.23.1

Ссылки

Описание

In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Avoid overflow assignment in link_dp_cts sampling_rate is an uint8_t but is assigned an unsigned int, and thus it can overflow. As a result, sampling_rate is changed to uint32_t. Similarly, LINK_QUAL_PATTERN_SET has a size of 2 bits, and it should only be assigned to a value less or equal than 4. This fixes 2 INTEGER_OVERFLOW issues reported by Coverity.


Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_23-rt-1-150600.1.3.1
SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.23.1

Ссылки

Описание

** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.


Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_23-rt-1-150600.1.3.1
SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.23.1

Ссылки

Описание

In the Linux kernel, the following vulnerability has been resolved: net/sched: accept TCA_STAB only for root qdisc Most qdiscs maintain their backlog using qdisc_pkt_len(skb) on the assumption it is invariant between the enqueue() and dequeue() handlers. Unfortunately syzbot can crash a host rather easily using a TBF + SFQ combination, with an STAB on SFQ [1] We can't support TCA_STAB on arbitrary level, this would require to maintain per-qdisc storage. [1] [ 88.796496] BUG: kernel NULL pointer dereference, address: 0000000000000000 [ 88.798611] #PF: supervisor read access in kernel mode [ 88.799014] #PF: error_code(0x0000) - not-present page [ 88.799506] PGD 0 P4D 0 [ 88.799829] Oops: Oops: 0000 [#1] SMP NOPTI [ 88.800569] CPU: 14 UID: 0 PID: 2053 Comm: b371744477 Not tainted 6.12.0-rc1-virtme #1117 [ 88.801107] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 88.801779] RIP: 0010:sfq_dequeue (net/sched/sch_sfq.c:272 net/sched/sch_sfq.c:499) sch_sfq [ 88.802544] Code: 0f b7 50 12 48 8d 04 d5 00 00 00 00 48 89 d6 48 29 d0 48 8b 91 c0 01 00 00 48 c1 e0 03 48 01 c2 66 83 7a 1a 00 7e c0 48 8b 3a <4c> 8b 07 4c 89 02 49 89 50 08 48 c7 47 08 00 00 00 00 48 c7 07 00 All code ======== 0: 0f b7 50 12 movzwl 0x12(%rax),%edx 4: 48 8d 04 d5 00 00 00 lea 0x0(,%rdx,8),%rax b: 00 c: 48 89 d6 mov %rdx,%rsi f: 48 29 d0 sub %rdx,%rax 12: 48 8b 91 c0 01 00 00 mov 0x1c0(%rcx),%rdx 19: 48 c1 e0 03 shl $0x3,%rax 1d: 48 01 c2 add %rax,%rdx 20: 66 83 7a 1a 00 cmpw $0x0,0x1a(%rdx) 25: 7e c0 jle 0xffffffffffffffe7 27: 48 8b 3a mov (%rdx),%rdi 2a:* 4c 8b 07 mov (%rdi),%r8 <-- trapping instruction 2d: 4c 89 02 mov %r8,(%rdx) 30: 49 89 50 08 mov %rdx,0x8(%r8) 34: 48 c7 47 08 00 00 00 movq $0x0,0x8(%rdi) 3b: 00 3c: 48 rex.W 3d: c7 .byte 0xc7 3e: 07 (bad) ... Code starting with the faulting instruction =========================================== 0: 4c 8b 07 mov (%rdi),%r8 3: 4c 89 02 mov %r8,(%rdx) 6: 49 89 50 08 mov %rdx,0x8(%r8) a: 48 c7 47 08 00 00 00 movq $0x0,0x8(%rdi) 11: 00 12: 48 rex.W 13: c7 .byte 0xc7 14: 07 (bad) ... [ 88.803721] RSP: 0018:ffff9a1f892b7d58 EFLAGS: 00000206 [ 88.804032] RAX: 0000000000000000 RBX: ffff9a1f8420c800 RCX: ffff9a1f8420c800 [ 88.804560] RDX: ffff9a1f81bc1440 RSI: 0000000000000000 RDI: 0000000000000000 [ 88.805056] RBP: ffffffffc04bb0e0 R08: 0000000000000001 R09: 00000000ff7f9a1f [ 88.805473] R10: 000000000001001b R11: 0000000000009a1f R12: 0000000000000140 [ 88.806194] R13: 0000000000000001 R14: ffff9a1f886df400 R15: ffff9a1f886df4ac [ 88.806734] FS: 00007f445601a740(0000) GS:ffff9a2e7fd80000(0000) knlGS:0000000000000000 [ 88.807225] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 88.807672] CR2: 0000000000000000 CR3: 000000050cc46000 CR4: 00000000000006f0 [ 88.808165] Call Trace: [ 88.808459] <TASK> [ 88.808710] ? __die (arch/x86/kernel/dumpstack.c:421 arch/x86/kernel/dumpstack.c:434) [ 88.809261] ? page_fault_oops (arch/x86/mm/fault.c:715) [ 88.809561] ? exc_page_fault (./arch/x86/include/asm/irqflags.h:26 ./arch/x86/include/asm/irqflags.h:87 ./arch/x86/include/asm/irqflags.h:147 arch/x86/mm/fault.c:1489 arch/x86/mm/fault.c:1539) [ 88.809806] ? asm_exc_page_fault (./arch/x86/include/asm/idtentry.h:623) [ 88.810074] ? sfq_dequeue (net/sched/sch_sfq.c:272 net/sched/sch_sfq.c:499) sch_sfq [ 88.810411] sfq_reset (net/sched/sch_sfq.c:525) sch_sfq [ 88.810671] qdisc_reset (./include/linux/skbuff.h:2135 ./include/linux/skbuff.h:2441 ./include/linux/skbuff.h:3304 ./include/linux/skbuff.h:3310 net/sched/sch_g ---truncated---


Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_23-rt-1-150600.1.3.1
SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.23.1

Ссылки

Описание

In the Linux kernel, the following vulnerability has been resolved: smb: client: fix UAF in async decryption Doing an async decryption (large read) crashes with a slab-use-after-free way down in the crypto API. Reproducer: # mount.cifs -o ...,seal,esize=1 //srv/share /mnt # dd if=/mnt/largefile of=/dev/null ... [ 194.196391] ================================================================== [ 194.196844] BUG: KASAN: slab-use-after-free in gf128mul_4k_lle+0xc1/0x110 [ 194.197269] Read of size 8 at addr ffff888112bd0448 by task kworker/u77:2/899 [ 194.197707] [ 194.197818] CPU: 12 UID: 0 PID: 899 Comm: kworker/u77:2 Not tainted 6.11.0-lku-00028-gfca3ca14a17a-dirty #43 [ 194.198400] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.16.2-3-gd478f380-prebuilt.qemu.org 04/01/2014 [ 194.199046] Workqueue: smb3decryptd smb2_decrypt_offload [cifs] [ 194.200032] Call Trace: [ 194.200191] <TASK> [ 194.200327] dump_stack_lvl+0x4e/0x70 [ 194.200558] ? gf128mul_4k_lle+0xc1/0x110 [ 194.200809] print_report+0x174/0x505 [ 194.201040] ? __pfx__raw_spin_lock_irqsave+0x10/0x10 [ 194.201352] ? srso_return_thunk+0x5/0x5f [ 194.201604] ? __virt_addr_valid+0xdf/0x1c0 [ 194.201868] ? gf128mul_4k_lle+0xc1/0x110 [ 194.202128] kasan_report+0xc8/0x150 [ 194.202361] ? gf128mul_4k_lle+0xc1/0x110 [ 194.202616] gf128mul_4k_lle+0xc1/0x110 [ 194.202863] ghash_update+0x184/0x210 [ 194.203103] shash_ahash_update+0x184/0x2a0 [ 194.203377] ? __pfx_shash_ahash_update+0x10/0x10 [ 194.203651] ? srso_return_thunk+0x5/0x5f [ 194.203877] ? crypto_gcm_init_common+0x1ba/0x340 [ 194.204142] gcm_hash_assoc_remain_continue+0x10a/0x140 [ 194.204434] crypt_message+0xec1/0x10a0 [cifs] [ 194.206489] ? __pfx_crypt_message+0x10/0x10 [cifs] [ 194.208507] ? srso_return_thunk+0x5/0x5f [ 194.209205] ? srso_return_thunk+0x5/0x5f [ 194.209925] ? srso_return_thunk+0x5/0x5f [ 194.210443] ? srso_return_thunk+0x5/0x5f [ 194.211037] decrypt_raw_data+0x15f/0x250 [cifs] [ 194.212906] ? __pfx_decrypt_raw_data+0x10/0x10 [cifs] [ 194.214670] ? srso_return_thunk+0x5/0x5f [ 194.215193] smb2_decrypt_offload+0x12a/0x6c0 [cifs] This is because TFM is being used in parallel. Fix this by allocating a new AEAD TFM for async decryption, but keep the existing one for synchronous READ cases (similar to what is done in smb3_calc_signature()). Also remove the calls to aead_request_set_callback() and crypto_wait_req() since it's always going to be a synchronous operation.


Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_23-rt-1-150600.1.3.1
SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.23.1

Ссылки

Описание

In the Linux kernel, the following vulnerability has been resolved: udf: fix uninit-value use in udf_get_fileshortad Check for overflow when computing alen in udf_current_aext to mitigate later uninit-value use in udf_get_fileshortad KMSAN bug[1]. After applying the patch reproducer did not trigger any issue[2]. [1] https://syzkaller.appspot.com/bug?extid=8901c4560b7ab5c2f9df [2] https://syzkaller.appspot.com/x/log.txt?x=10242227980000


Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_23-rt-1-150600.1.3.1
SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.23.1

Ссылки

Описание

In the Linux kernel, the following vulnerability has been resolved: tcp/dccp: Don't use timer_pending() in reqsk_queue_unlink(). Martin KaFai Lau reported use-after-free [0] in reqsk_timer_handler(). """ We are seeing a use-after-free from a bpf prog attached to trace_tcp_retransmit_synack. The program passes the req->sk to the bpf_sk_storage_get_tracing kernel helper which does check for null before using it. """ The commit 83fccfc3940c ("inet: fix potential deadlock in reqsk_queue_unlink()") added timer_pending() in reqsk_queue_unlink() not to call del_timer_sync() from reqsk_timer_handler(), but it introduced a small race window. Before the timer is called, expire_timers() calls detach_timer(timer, true) to clear timer->entry.pprev and marks it as not pending. If reqsk_queue_unlink() checks timer_pending() just after expire_timers() calls detach_timer(), TCP will miss del_timer_sync(); the reqsk timer will continue running and send multiple SYN+ACKs until it expires. The reported UAF could happen if req->sk is close()d earlier than the timer expiration, which is 63s by default. The scenario would be 1. inet_csk_complete_hashdance() calls inet_csk_reqsk_queue_drop(), but del_timer_sync() is missed 2. reqsk timer is executed and scheduled again 3. req->sk is accept()ed and reqsk_put() decrements rsk_refcnt, but reqsk timer still has another one, and inet_csk_accept() does not clear req->sk for non-TFO sockets 4. sk is close()d 5. reqsk timer is executed again, and BPF touches req->sk Let's not use timer_pending() by passing the caller context to __inet_csk_reqsk_queue_drop(). Note that reqsk timer is pinned, so the issue does not happen in most use cases. [1] [0] BUG: KFENCE: use-after-free read in bpf_sk_storage_get_tracing+0x2e/0x1b0 Use-after-free read at 0x00000000a891fb3a (in kfence-#1): bpf_sk_storage_get_tracing+0x2e/0x1b0 bpf_prog_5ea3e95db6da0438_tcp_retransmit_synack+0x1d20/0x1dda bpf_trace_run2+0x4c/0xc0 tcp_rtx_synack+0xf9/0x100 reqsk_timer_handler+0xda/0x3d0 run_timer_softirq+0x292/0x8a0 irq_exit_rcu+0xf5/0x320 sysvec_apic_timer_interrupt+0x6d/0x80 asm_sysvec_apic_timer_interrupt+0x16/0x20 intel_idle_irq+0x5a/0xa0 cpuidle_enter_state+0x94/0x273 cpu_startup_entry+0x15e/0x260 start_secondary+0x8a/0x90 secondary_startup_64_no_verify+0xfa/0xfb kfence-#1: 0x00000000a72cc7b6-0x00000000d97616d9, size=2376, cache=TCPv6 allocated by task 0 on cpu 9 at 260507.901592s: sk_prot_alloc+0x35/0x140 sk_clone_lock+0x1f/0x3f0 inet_csk_clone_lock+0x15/0x160 tcp_create_openreq_child+0x1f/0x410 tcp_v6_syn_recv_sock+0x1da/0x700 tcp_check_req+0x1fb/0x510 tcp_v6_rcv+0x98b/0x1420 ipv6_list_rcv+0x2258/0x26e0 napi_complete_done+0x5b1/0x2990 mlx5e_napi_poll+0x2ae/0x8d0 net_rx_action+0x13e/0x590 irq_exit_rcu+0xf5/0x320 common_interrupt+0x80/0x90 asm_common_interrupt+0x22/0x40 cpuidle_enter_state+0xfb/0x273 cpu_startup_entry+0x15e/0x260 start_secondary+0x8a/0x90 secondary_startup_64_no_verify+0xfa/0xfb freed by task 0 on cpu 9 at 260507.927527s: rcu_core_si+0x4ff/0xf10 irq_exit_rcu+0xf5/0x320 sysvec_apic_timer_interrupt+0x6d/0x80 asm_sysvec_apic_timer_interrupt+0x16/0x20 cpuidle_enter_state+0xfb/0x273 cpu_startup_entry+0x15e/0x260 start_secondary+0x8a/0x90 secondary_startup_64_no_verify+0xfa/0xfb


Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_23-rt-1-150600.1.3.1
SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.23.1

Ссылки

Описание

In the Linux kernel, the following vulnerability has been resolved: nilfs2: propagate directory read errors from nilfs_find_entry() Syzbot reported that a task hang occurs in vcs_open() during a fuzzing test for nilfs2. The root cause of this problem is that in nilfs_find_entry(), which searches for directory entries, ignores errors when loading a directory page/folio via nilfs_get_folio() fails. If the filesystem images is corrupted, and the i_size of the directory inode is large, and the directory page/folio is successfully read but fails the sanity check, for example when it is zero-filled, nilfs_check_folio() may continue to spit out error messages in bursts. Fix this issue by propagating the error to the callers when loading a page/folio fails in nilfs_find_entry(). The current interface of nilfs_find_entry() and its callers is outdated and cannot propagate error codes such as -EIO and -ENOMEM returned via nilfs_find_entry(), so fix it together.


Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_23-rt-1-150600.1.3.1
SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.23.1

Ссылки

Описание

In the Linux kernel, the following vulnerability has been resolved: bpf, arm64: Fix address emission with tag-based KASAN enabled When BPF_TRAMP_F_CALL_ORIG is enabled, the address of a bpf_tramp_image struct on the stack is passed during the size calculation pass and an address on the heap is passed during code generation. This may cause a heap buffer overflow if the heap address is tagged because emit_a64_mov_i64() will emit longer code than it did during the size calculation pass. The same problem could occur without tag-based KASAN if one of the 16-bit words of the stack address happened to be all-ones during the size calculation pass. Fix the problem by assuming the worst case (4 instructions) when calculating the size of the bpf_tramp_image address emission.


Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_23-rt-1-150600.1.3.1
SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.23.1

Ссылки

Описание

In the Linux kernel, the following vulnerability has been resolved: udf: refactor inode_bmap() to handle error Refactor inode_bmap() to handle error since udf_next_aext() can return error now. On situations like ftruncate, udf_extend_file() can now detect errors and bail out early without resorting to checking for particular offsets and assuming internal behavior of these functions.


Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_23-rt-1-150600.1.3.1
SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.23.1

Ссылки

Описание

** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.


Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_23-rt-1-150600.1.3.1
SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.23.1

Ссылки

Описание

In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_reject_ipv6: fix potential crash in nf_send_reset6() I got a syzbot report without a repro [1] crashing in nf_send_reset6() I think the issue is that dev->hard_header_len is zero, and we attempt later to push an Ethernet header. Use LL_MAX_HEADER, as other functions in net/ipv6/netfilter/nf_reject_ipv6.c. [1] skbuff: skb_under_panic: text:ffffffff89b1d008 len:74 put:14 head:ffff88803123aa00 data:ffff88803123a9f2 tail:0x3c end:0x140 dev:syz_tun kernel BUG at net/core/skbuff.c:206 ! Oops: invalid opcode: 0000 [#1] PREEMPT SMP KASAN PTI CPU: 0 UID: 0 PID: 7373 Comm: syz.1.568 Not tainted 6.12.0-rc2-syzkaller-00631-g6d858708d465 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 RIP: 0010:skb_panic net/core/skbuff.c:206 [inline] RIP: 0010:skb_under_panic+0x14b/0x150 net/core/skbuff.c:216 Code: 0d 8d 48 c7 c6 60 a6 29 8e 48 8b 54 24 08 8b 0c 24 44 8b 44 24 04 4d 89 e9 50 41 54 41 57 41 56 e8 ba 30 38 02 48 83 c4 20 90 <0f> 0b 0f 1f 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 RSP: 0018:ffffc900045269b0 EFLAGS: 00010282 RAX: 0000000000000088 RBX: dffffc0000000000 RCX: cd66dacdc5d8e800 RDX: 0000000000000000 RSI: 0000000000000200 RDI: 0000000000000000 RBP: ffff88802d39a3d0 R08: ffffffff8174afec R09: 1ffff920008a4ccc R10: dffffc0000000000 R11: fffff520008a4ccd R12: 0000000000000140 R13: ffff88803123aa00 R14: ffff88803123a9f2 R15: 000000000000003c FS: 00007fdbee5ff6c0(0000) GS:ffff8880b8600000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000000000 CR3: 000000005d322000 CR4: 00000000003526f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: <TASK> skb_push+0xe5/0x100 net/core/skbuff.c:2636 eth_header+0x38/0x1f0 net/ethernet/eth.c:83 dev_hard_header include/linux/netdevice.h:3208 [inline] nf_send_reset6+0xce6/0x1270 net/ipv6/netfilter/nf_reject_ipv6.c:358 nft_reject_inet_eval+0x3b9/0x690 net/netfilter/nft_reject_inet.c:48 expr_call_ops_eval net/netfilter/nf_tables_core.c:240 [inline] nft_do_chain+0x4ad/0x1da0 net/netfilter/nf_tables_core.c:288 nft_do_chain_inet+0x418/0x6b0 net/netfilter/nft_chain_filter.c:161 nf_hook_entry_hookfn include/linux/netfilter.h:154 [inline] nf_hook_slow+0xc3/0x220 net/netfilter/core.c:626 nf_hook include/linux/netfilter.h:269 [inline] NF_HOOK include/linux/netfilter.h:312 [inline] br_nf_pre_routing_ipv6+0x63e/0x770 net/bridge/br_netfilter_ipv6.c:184 nf_hook_entry_hookfn include/linux/netfilter.h:154 [inline] nf_hook_bridge_pre net/bridge/br_input.c:277 [inline] br_handle_frame+0x9fd/0x1530 net/bridge/br_input.c:424 __netif_receive_skb_core+0x13e8/0x4570 net/core/dev.c:5562 __netif_receive_skb_one_core net/core/dev.c:5666 [inline] __netif_receive_skb+0x12f/0x650 net/core/dev.c:5781 netif_receive_skb_internal net/core/dev.c:5867 [inline] netif_receive_skb+0x1e8/0x890 net/core/dev.c:5926 tun_rx_batched+0x1b7/0x8f0 drivers/net/tun.c:1550 tun_get_user+0x3056/0x47e0 drivers/net/tun.c:2007 tun_chr_write_iter+0x10d/0x1f0 drivers/net/tun.c:2053 new_sync_write fs/read_write.c:590 [inline] vfs_write+0xa6d/0xc90 fs/read_write.c:683 ksys_write+0x183/0x2b0 fs/read_write.c:736 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7fdbeeb7d1ff Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 c9 8d 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 1c 8e 02 00 48 RSP: 002b:00007fdbee5ff000 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 RAX: ffffffffffffffda RBX: 00007fdbeed36058 RCX: 00007fdbeeb7d1ff RDX: 000000000000008e RSI: 0000000020000040 RDI: 00000000000000c8 RBP: 00007fdbeebf12be R08: 0000000 ---truncated---


Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_23-rt-1-150600.1.3.1
SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.23.1

Ссылки

Описание

In the Linux kernel, the following vulnerability has been resolved: bpf: Fix out-of-bounds write in trie_get_next_key() trie_get_next_key() allocates a node stack with size trie->max_prefixlen, while it writes (trie->max_prefixlen + 1) nodes to the stack when it has full paths from the root to leaves. For example, consider a trie with max_prefixlen is 8, and the nodes with key 0x00/0, 0x00/1, 0x00/2, ... 0x00/8 inserted. Subsequent calls to trie_get_next_key with _key with .prefixlen = 8 make 9 nodes be written on the node stack with size 8.


Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_23-rt-1-150600.1.3.1
SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.23.1

Ссылки

Описание

In the Linux kernel, the following vulnerability has been resolved: filemap: Fix bounds checking in filemap_read() If the caller supplies an iocb->ki_pos value that is close to the filesystem upper limit, and an iterator with a count that causes us to overflow that limit, then filemap_read() enters an infinite loop. This behaviour was discovered when testing xfstests generic/525 with the "localio" optimisation for loopback NFS mounts.


Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_23-rt-1-150600.1.3.1
SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.23.1

Ссылки

Описание

In the Linux kernel, the following vulnerability has been resolved: dm cache: fix potential out-of-bounds access on the first resume Out-of-bounds access occurs if the fast device is expanded unexpectedly before the first-time resume of the cache table. This happens because expanding the fast device requires reloading the cache table for cache_create to allocate new in-core data structures that fit the new size, and the check in cache_preresume is not performed during the first resume, leading to the issue. Reproduce steps: 1. prepare component devices: dmsetup create cmeta --table "0 8192 linear /dev/sdc 0" dmsetup create cdata --table "0 65536 linear /dev/sdc 8192" dmsetup create corig --table "0 524288 linear /dev/sdc 262144" dd if=/dev/zero of=/dev/mapper/cmeta bs=4k count=1 oflag=direct 2. load a cache table of 512 cache blocks, and deliberately expand the fast device before resuming the cache, making the in-core data structures inadequate. dmsetup create cache --notable dmsetup reload cache --table "0 524288 cache /dev/mapper/cmeta \ /dev/mapper/cdata /dev/mapper/corig 128 2 metadata2 writethrough smq 0" dmsetup reload cdata --table "0 131072 linear /dev/sdc 8192" dmsetup resume cdata dmsetup resume cache 3. suspend the cache to write out the in-core dirty bitset and hint array, leading to out-of-bounds access to the dirty bitset at offset 0x40: dmsetup suspend cache KASAN reports: BUG: KASAN: vmalloc-out-of-bounds in is_dirty_callback+0x2b/0x80 Read of size 8 at addr ffffc90000085040 by task dmsetup/90 (...snip...) The buggy address belongs to the virtual mapping at [ffffc90000085000, ffffc90000087000) created by: cache_ctr+0x176a/0x35f0 (...snip...) Memory state around the buggy address: ffffc90000084f00: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 ffffc90000084f80: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 >ffffc90000085000: 00 00 00 00 00 00 00 00 f8 f8 f8 f8 f8 f8 f8 f8 ^ ffffc90000085080: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 ffffc90000085100: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 Fix by checking the size change on the first resume.


Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_23-rt-1-150600.1.3.1
SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.23.1

Ссылки

Описание

In the Linux kernel, the following vulnerability has been resolved: dm cache: fix flushing uninitialized delayed_work on cache_ctr error An unexpected WARN_ON from flush_work() may occur when cache creation fails, caused by destroying the uninitialized delayed_work waker in the error path of cache_create(). For example, the warning appears on the superblock checksum error. Reproduce steps: dmsetup create cmeta --table "0 8192 linear /dev/sdc 0" dmsetup create cdata --table "0 65536 linear /dev/sdc 8192" dmsetup create corig --table "0 524288 linear /dev/sdc 262144" dd if=/dev/urandom of=/dev/mapper/cmeta bs=4k count=1 oflag=direct dmsetup create cache --table "0 524288 cache /dev/mapper/cmeta \ /dev/mapper/cdata /dev/mapper/corig 128 2 metadata2 writethrough smq 0" Kernel logs: (snip) WARNING: CPU: 0 PID: 84 at kernel/workqueue.c:4178 __flush_work+0x5d4/0x890 Fix by pulling out the cancel_delayed_work_sync() from the constructor's error path. This patch doesn't affect the use-after-free fix for concurrent dm_resume and dm_destroy (commit 6a459d8edbdb ("dm cache: Fix UAF in destroy()")) as cache_dtr is not changed.


Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_23-rt-1-150600.1.3.1
SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.23.1

Ссылки

Описание

** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.


Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_23-rt-1-150600.1.3.1
SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.23.1

Ссылки

Описание

** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.


Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_23-rt-1-150600.1.3.1
SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.23.1

Ссылки

Описание

In the Linux kernel, the following vulnerability has been resolved: afs: Fix lock recursion afs_wake_up_async_call() can incur lock recursion. The problem is that it is called from AF_RXRPC whilst holding the ->notify_lock, but it tries to take a ref on the afs_call struct in order to pass it to a work queue - but if the afs_call is already queued, we then have an extraneous ref that must be put... calling afs_put_call() may call back down into AF_RXRPC through rxrpc_kernel_shutdown_call(), however, which might try taking the ->notify_lock again. This case isn't very common, however, so defer it to a workqueue. The oops looks something like: BUG: spinlock recursion on CPU#0, krxrpcio/7001/1646 lock: 0xffff888141399b30, .magic: dead4ead, .owner: krxrpcio/7001/1646, .owner_cpu: 0 CPU: 0 UID: 0 PID: 1646 Comm: krxrpcio/7001 Not tainted 6.12.0-rc2-build3+ #4351 Hardware name: ASUS All Series/H97-PLUS, BIOS 2306 10/09/2014 Call Trace: <TASK> dump_stack_lvl+0x47/0x70 do_raw_spin_lock+0x3c/0x90 rxrpc_kernel_shutdown_call+0x83/0xb0 afs_put_call+0xd7/0x180 rxrpc_notify_socket+0xa0/0x190 rxrpc_input_split_jumbo+0x198/0x1d0 rxrpc_input_data+0x14b/0x1e0 ? rxrpc_input_call_packet+0xc2/0x1f0 rxrpc_input_call_event+0xad/0x6b0 rxrpc_input_packet_on_conn+0x1e1/0x210 rxrpc_input_packet+0x3f2/0x4d0 rxrpc_io_thread+0x243/0x410 ? __pfx_rxrpc_io_thread+0x10/0x10 kthread+0xcf/0xe0 ? __pfx_kthread+0x10/0x10 ret_from_fork+0x24/0x40 ? __pfx_kthread+0x10/0x10 ret_from_fork_asm+0x1a/0x30 </TASK>


Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_23-rt-1-150600.1.3.1
SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.23.1

Ссылки

Описание

In the Linux kernel, the following vulnerability has been resolved: bpf: Check validity of link->type in bpf_link_show_fdinfo() If a newly-added link type doesn't invoke BPF_LINK_TYPE(), accessing bpf_link_type_strs[link->type] may result in an out-of-bounds access. To spot such missed invocations early in the future, checking the validity of link->type in bpf_link_show_fdinfo() and emitting a warning when such invocations are missed.


Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_23-rt-1-150600.1.3.1
SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.23.1

Ссылки

Описание

In the Linux kernel, the following vulnerability has been resolved: hv_sock: Initializing vsk->trans to NULL to prevent a dangling pointer When hvs is released, there is a possibility that vsk->trans may not be initialized to NULL, which could lead to a dangling pointer. This issue is resolved by initializing vsk->trans to NULL.


Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_23-rt-1-150600.1.3.1
SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.23.1

Ссылки

Описание

In the Linux kernel, the following vulnerability has been resolved: mm: page_alloc: move mlocked flag clearance into free_pages_prepare() Syzbot reported a bad page state problem caused by a page being freed using free_page() still having a mlocked flag at free_pages_prepare() stage: BUG: Bad page state in process syz.5.504 pfn:61f45 page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x61f45 flags: 0xfff00000080204(referenced|workingset|mlocked|node=0|zone=1|lastcpupid=0x7ff) raw: 00fff00000080204 0000000000000000 dead000000000122 0000000000000000 raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 page dumped because: PAGE_FLAGS_CHECK_AT_FREE flag(s) set page_owner tracks the page as allocated page last allocated via order 0, migratetype Unmovable, gfp_mask 0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), pid 8443, tgid 8442 (syz.5.504), ts 201884660643, free_ts 201499827394 set_page_owner include/linux/page_owner.h:32 [inline] post_alloc_hook+0x1f3/0x230 mm/page_alloc.c:1537 prep_new_page mm/page_alloc.c:1545 [inline] get_page_from_freelist+0x303f/0x3190 mm/page_alloc.c:3457 __alloc_pages_noprof+0x292/0x710 mm/page_alloc.c:4733 alloc_pages_mpol_noprof+0x3e8/0x680 mm/mempolicy.c:2265 kvm_coalesced_mmio_init+0x1f/0xf0 virt/kvm/coalesced_mmio.c:99 kvm_create_vm virt/kvm/kvm_main.c:1235 [inline] kvm_dev_ioctl_create_vm virt/kvm/kvm_main.c:5488 [inline] kvm_dev_ioctl+0x12dc/0x2240 virt/kvm/kvm_main.c:5530 __do_compat_sys_ioctl fs/ioctl.c:1007 [inline] __se_compat_sys_ioctl+0x510/0xc90 fs/ioctl.c:950 do_syscall_32_irqs_on arch/x86/entry/common.c:165 [inline] __do_fast_syscall_32+0xb4/0x110 arch/x86/entry/common.c:386 do_fast_syscall_32+0x34/0x80 arch/x86/entry/common.c:411 entry_SYSENTER_compat_after_hwframe+0x84/0x8e page last free pid 8399 tgid 8399 stack trace: reset_page_owner include/linux/page_owner.h:25 [inline] free_pages_prepare mm/page_alloc.c:1108 [inline] free_unref_folios+0xf12/0x18d0 mm/page_alloc.c:2686 folios_put_refs+0x76c/0x860 mm/swap.c:1007 free_pages_and_swap_cache+0x5c8/0x690 mm/swap_state.c:335 __tlb_batch_free_encoded_pages mm/mmu_gather.c:136 [inline] tlb_batch_pages_flush mm/mmu_gather.c:149 [inline] tlb_flush_mmu_free mm/mmu_gather.c:366 [inline] tlb_flush_mmu+0x3a3/0x680 mm/mmu_gather.c:373 tlb_finish_mmu+0xd4/0x200 mm/mmu_gather.c:465 exit_mmap+0x496/0xc40 mm/mmap.c:1926 __mmput+0x115/0x390 kernel/fork.c:1348 exit_mm+0x220/0x310 kernel/exit.c:571 do_exit+0x9b2/0x28e0 kernel/exit.c:926 do_group_exit+0x207/0x2c0 kernel/exit.c:1088 __do_sys_exit_group kernel/exit.c:1099 [inline] __se_sys_exit_group kernel/exit.c:1097 [inline] __x64_sys_exit_group+0x3f/0x40 kernel/exit.c:1097 x64_sys_call+0x2634/0x2640 arch/x86/include/generated/asm/syscalls_64.h:232 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f Modules linked in: CPU: 0 UID: 0 PID: 8442 Comm: syz.5.504 Not tainted 6.12.0-rc6-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 Call Trace: <TASK> __dump_stack lib/dump_stack.c:94 [inline] dump_stack_lvl+0x241/0x360 lib/dump_stack.c:120 bad_page+0x176/0x1d0 mm/page_alloc.c:501 free_page_is_bad mm/page_alloc.c:918 [inline] free_pages_prepare mm/page_alloc.c:1100 [inline] free_unref_page+0xed0/0xf20 mm/page_alloc.c:2638 kvm_destroy_vm virt/kvm/kvm_main.c:1327 [inline] kvm_put_kvm+0xc75/0x1350 virt/kvm/kvm_main.c:1386 kvm_vcpu_release+0x54/0x60 virt/kvm/kvm_main.c:4143 __fput+0x23f/0x880 fs/file_table.c:431 task_work_run+0x24f/0x310 kernel/task_work.c:239 exit_task_work include/linux/task_work.h:43 [inline] do_exit+0xa2f/0x28e0 kernel/exit.c:939 do_group_exit+0x207/0x2c0 kernel/exit.c:1088 __do_sys_exit_group kernel/exit.c:1099 [in ---truncated---


Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_23-rt-1-150600.1.3.1
SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.23.1

Ссылки

Описание

In the Linux kernel, the following vulnerability has been resolved: mm/mremap: fix address wraparound in move_page_tables() On 32-bit platforms, it is possible for the expression `len + old_addr < old_end` to be false-positive if `len + old_addr` wraps around. `old_addr` is the cursor in the old range up to which page table entries have been moved; so if the operation succeeded, `old_addr` is the *end* of the old region, and adding `len` to it can wrap. The overflow causes mremap() to mistakenly believe that PTEs have been copied; the consequence is that mremap() bails out, but doesn't move the PTEs back before the new VMA is unmapped, causing anonymous pages in the region to be lost. So basically if userspace tries to mremap() a private-anon region and hits this bug, mremap() will return an error and the private-anon region's contents appear to have been zeroed. The idea of this check is that `old_end - len` is the original start address, and writing the check that way also makes it easier to read; so fix the check by rearranging the comparison accordingly. (An alternate fix would be to refactor this function by introducing an "orig_old_start" variable or such.) Tested in a VM with a 32-bit X86 kernel; without the patch: ``` user@horn:~/big_mremap$ cat test.c #define _GNU_SOURCE #include <stdlib.h> #include <stdio.h> #include <err.h> #include <sys/mman.h> #define ADDR1 ((void*)0x60000000) #define ADDR2 ((void*)0x10000000) #define SIZE 0x50000000uL int main(void) { unsigned char *p1 = mmap(ADDR1, SIZE, PROT_READ|PROT_WRITE, MAP_ANONYMOUS|MAP_PRIVATE|MAP_FIXED_NOREPLACE, -1, 0); if (p1 == MAP_FAILED) err(1, "mmap 1"); unsigned char *p2 = mmap(ADDR2, SIZE, PROT_NONE, MAP_ANONYMOUS|MAP_PRIVATE|MAP_FIXED_NOREPLACE, -1, 0); if (p2 == MAP_FAILED) err(1, "mmap 2"); *p1 = 0x41; printf("first char is 0x%02hhx\n", *p1); unsigned char *p3 = mremap(p1, SIZE, SIZE, MREMAP_MAYMOVE|MREMAP_FIXED, p2); if (p3 == MAP_FAILED) { printf("mremap() failed; first char is 0x%02hhx\n", *p1); } else { printf("mremap() succeeded; first char is 0x%02hhx\n", *p3); } } user@horn:~/big_mremap$ gcc -static -o test test.c user@horn:~/big_mremap$ setarch -R ./test first char is 0x41 mremap() failed; first char is 0x00 ``` With the patch: ``` user@horn:~/big_mremap$ setarch -R ./test first char is 0x41 mremap() succeeded; first char is 0x41 ```


Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_23-rt-1-150600.1.3.1
SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.23.1

Ссылки

Описание

In the Linux kernel, the following vulnerability has been resolved: mm: fix NULL pointer dereference in alloc_pages_bulk_noprof We triggered a NULL pointer dereference for ac.preferred_zoneref->zone in alloc_pages_bulk_noprof() when the task is migrated between cpusets. When cpuset is enabled, in prepare_alloc_pages(), ac->nodemask may be &current->mems_allowed. when first_zones_zonelist() is called to find preferred_zoneref, the ac->nodemask may be modified concurrently if the task is migrated between different cpusets. Assuming we have 2 NUMA Node, when traversing Node1 in ac->zonelist, the nodemask is 2, and when traversing Node2 in ac->zonelist, the nodemask is 1. As a result, the ac->preferred_zoneref points to NULL zone. In alloc_pages_bulk_noprof(), for_each_zone_zonelist_nodemask() finds a allowable zone and calls zonelist_node_idx(ac.preferred_zoneref), leading to NULL pointer dereference. __alloc_pages_noprof() fixes this issue by checking NULL pointer in commit ea57485af8f4 ("mm, page_alloc: fix check for NULL preferred_zone") and commit df76cee6bbeb ("mm, page_alloc: remove redundant checks from alloc fastpath"). To fix it, check NULL pointer for preferred_zoneref->zone.


Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_23-rt-1-150600.1.3.1
SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.23.1

Ссылки

Описание

In the Linux kernel, the following vulnerability has been resolved: virtio/vsock: Improve MSG_ZEROCOPY error handling Add a missing kfree_skb() to prevent memory leaks.


Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_23-rt-1-150600.1.3.1
SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.23.1

Ссылки

Описание

In the Linux kernel, the following vulnerability has been resolved: vsock: Fix sk_error_queue memory leak Kernel queues MSG_ZEROCOPY completion notifications on the error queue. Where they remain, until explicitly recv()ed. To prevent memory leaks, clean up the queue when the socket is destroyed. unreferenced object 0xffff8881028beb00 (size 224): comm "vsock_test", pid 1218, jiffies 4294694897 hex dump (first 32 bytes): 90 b0 21 17 81 88 ff ff 90 b0 21 17 81 88 ff ff ..!.......!..... 00 00 00 00 00 00 00 00 00 b0 21 17 81 88 ff ff ..........!..... backtrace (crc 6c7031ca): [<ffffffff81418ef7>] kmem_cache_alloc_node_noprof+0x2f7/0x370 [<ffffffff81d35882>] __alloc_skb+0x132/0x180 [<ffffffff81d2d32b>] sock_omalloc+0x4b/0x80 [<ffffffff81d3a8ae>] msg_zerocopy_realloc+0x9e/0x240 [<ffffffff81fe5cb2>] virtio_transport_send_pkt_info+0x412/0x4c0 [<ffffffff81fe6183>] virtio_transport_stream_enqueue+0x43/0x50 [<ffffffff81fe0813>] vsock_connectible_sendmsg+0x373/0x450 [<ffffffff81d233d5>] ____sys_sendmsg+0x365/0x3a0 [<ffffffff81d246f4>] ___sys_sendmsg+0x84/0xd0 [<ffffffff81d26f47>] __sys_sendmsg+0x47/0x80 [<ffffffff820d3df3>] do_syscall_64+0x93/0x180 [<ffffffff8220012b>] entry_SYSCALL_64_after_hwframe+0x76/0x7e


Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_23-rt-1-150600.1.3.1
SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.23.1

Ссылки

Описание

In the Linux kernel, the following vulnerability has been resolved: virtio/vsock: Fix accept_queue memory leak As the final stages of socket destruction may be delayed, it is possible that virtio_transport_recv_listen() will be called after the accept_queue has been flushed, but before the SOCK_DONE flag has been set. As a result, sockets enqueued after the flush would remain unremoved, leading to a memory leak. vsock_release __vsock_release lock virtio_transport_release virtio_transport_close schedule_delayed_work(close_work) sk_shutdown = SHUTDOWN_MASK (!) flush accept_queue release virtio_transport_recv_pkt vsock_find_bound_socket lock if flag(SOCK_DONE) return virtio_transport_recv_listen child = vsock_create_connected (!) vsock_enqueue_accept(child) release close_work lock virtio_transport_do_close set_flag(SOCK_DONE) virtio_transport_remove_sock vsock_remove_sock vsock_remove_bound release Introduce a sk_shutdown check to disallow vsock_enqueue_accept() during socket destruction. unreferenced object 0xffff888109e3f800 (size 2040): comm "kworker/5:2", pid 371, jiffies 4294940105 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 28 00 0b 40 00 00 00 00 00 00 00 00 00 00 00 00 (..@............ backtrace (crc 9e5f4e84): [<ffffffff81418ff1>] kmem_cache_alloc_noprof+0x2c1/0x360 [<ffffffff81d27aa0>] sk_prot_alloc+0x30/0x120 [<ffffffff81d2b54c>] sk_alloc+0x2c/0x4b0 [<ffffffff81fe049a>] __vsock_create.constprop.0+0x2a/0x310 [<ffffffff81fe6d6c>] virtio_transport_recv_pkt+0x4dc/0x9a0 [<ffffffff81fe745d>] vsock_loopback_work+0xfd/0x140 [<ffffffff810fc6ac>] process_one_work+0x20c/0x570 [<ffffffff810fce3f>] worker_thread+0x1bf/0x3a0 [<ffffffff811070dd>] kthread+0xdd/0x110 [<ffffffff81044fdd>] ret_from_fork+0x2d/0x50 [<ffffffff8100785a>] ret_from_fork_asm+0x1a/0x30


Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_23-rt-1-150600.1.3.1
SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.23.1

Ссылки

Описание

In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: CT: Fix null-ptr-deref in add rule err flow In error flow of mlx5_tc_ct_entry_add_rule(), in case ct_rule_add() callback returns error, zone_rule->attr is used uninitiated. Fix it to use attr which has the needed pointer value. Kernel log: BUG: kernel NULL pointer dereference, address: 0000000000000110 RIP: 0010:mlx5_tc_ct_entry_add_rule+0x2b1/0x2f0 [mlx5_core] … Call Trace: <TASK> ? __die+0x20/0x70 ? page_fault_oops+0x150/0x3e0 ? exc_page_fault+0x74/0x140 ? asm_exc_page_fault+0x22/0x30 ? mlx5_tc_ct_entry_add_rule+0x2b1/0x2f0 [mlx5_core] ? mlx5_tc_ct_entry_add_rule+0x1d5/0x2f0 [mlx5_core] mlx5_tc_ct_block_flow_offload+0xc6a/0xf90 [mlx5_core] ? nf_flow_offload_tuple+0xd8/0x190 [nf_flow_table] nf_flow_offload_tuple+0xd8/0x190 [nf_flow_table] flow_offload_work_handler+0x142/0x320 [nf_flow_table] ? finish_task_switch.isra.0+0x15b/0x2b0 process_one_work+0x16c/0x320 worker_thread+0x28c/0x3a0 ? __pfx_worker_thread+0x10/0x10 kthread+0xb8/0xf0 ? __pfx_kthread+0x10/0x10 ret_from_fork+0x2d/0x50 ? __pfx_kthread+0x10/0x10 ret_from_fork_asm+0x1a/0x30 </TASK>


Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_23-rt-1-150600.1.3.1
SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.23.1

Ссылки

Описание

In the Linux kernel, the following vulnerability has been resolved: mptcp: cope racing subflow creation in mptcp_rcv_space_adjust Additional active subflows - i.e. created by the in kernel path manager - are included into the subflow list before starting the 3whs. A racing recvmsg() spooling data received on an already established subflow would unconditionally call tcp_cleanup_rbuf() on all the current subflows, potentially hitting a divide by zero error on the newly created ones. Explicitly check that the subflow is in a suitable state before invoking tcp_cleanup_rbuf().


Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_23-rt-1-150600.1.3.1
SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.23.1

Ссылки

Описание

In the Linux kernel, the following vulnerability has been resolved: bpf: sync_linked_regs() must preserve subreg_def Range propagation must not affect subreg_def marks, otherwise the following example is rewritten by verifier incorrectly when BPF_F_TEST_RND_HI32 flag is set: 0: call bpf_ktime_get_ns call bpf_ktime_get_ns 1: r0 &= 0x7fffffff after verifier r0 &= 0x7fffffff 2: w1 = w0 rewrites w1 = w0 3: if w0 < 10 goto +0 --------------> r11 = 0x2f5674a6 (r) 4: r1 >>= 32 r11 <<= 32 (r) 5: r0 = r1 r1 |= r11 (r) 6: exit; if w0 < 0xa goto pc+0 r1 >>= 32 r0 = r1 exit (or zero extension of w1 at (2) is missing for architectures that require zero extension for upper register half). The following happens w/o this patch: - r0 is marked as not a subreg at (0); - w1 is marked as subreg at (2); - w1 subreg_def is overridden at (3) by copy_register_state(); - w1 is read at (5) but mark_insn_zext() does not mark (2) for zero extension, because w1 subreg_def is not set; - because of BPF_F_TEST_RND_HI32 flag verifier inserts random value for hi32 bits of (2) (marked (r)); - this random value is read at (5).


Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_23-rt-1-150600.1.3.1
SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.23.1

Ссылки

Описание

In the Linux kernel, the following vulnerability has been resolved: vdpa: solidrun: Fix UB bug with devres In psnet_open_pf_bar() and snet_open_vf_bar() a string later passed to pcim_iomap_regions() is placed on the stack. Neither pcim_iomap_regions() nor the functions it calls copy that string. Should the string later ever be used, this, consequently, causes undefined behavior since the stack frame will by then have disappeared. Fix the bug by allocating the strings on the heap through devm_kasprintf().


Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_23-rt-1-150600.1.3.1
SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.23.1

Ссылки

Описание

In the Linux kernel, the following vulnerability has been resolved: Revert "mmc: dw_mmc: Fix IDMAC operation with pages bigger than 4K" The commit 8396c793ffdf ("mmc: dw_mmc: Fix IDMAC operation with pages bigger than 4K") increased the max_req_size, even for 4K pages, causing various issues: - Panic booting the kernel/rootfs from an SD card on Rockchip RK3566 - Panic booting the kernel/rootfs from an SD card on StarFive JH7100 - "swiotlb buffer is full" and data corruption on StarFive JH7110 At this stage no fix have been found, so it's probably better to just revert the change. This reverts commit 8396c793ffdf28bb8aee7cfe0891080f8cab7890.


Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_23-rt-1-150600.1.3.1
SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.23.1

Ссылки

Описание

In the Linux kernel, the following vulnerability has been resolved: drm/rockchip: vop: Fix a dereferenced before check warning The 'state' can't be NULL, we should check crtc_state. Fix warning: drivers/gpu/drm/rockchip/rockchip_drm_vop.c:1096 vop_plane_atomic_async_check() warn: variable dereferenced before check 'state' (see line 1077)


Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_23-rt-1-150600.1.3.1
SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.23.1

Ссылки

Описание

In the Linux kernel, the following vulnerability has been resolved: nilfs2: fix null-ptr-deref in block_dirty_buffer tracepoint When using the "block:block_dirty_buffer" tracepoint, mark_buffer_dirty() may cause a NULL pointer dereference, or a general protection fault when KASAN is enabled. This happens because, since the tracepoint was added in mark_buffer_dirty(), it references the dev_t member bh->b_bdev->bd_dev regardless of whether the buffer head has a pointer to a block_device structure. In the current implementation, nilfs_grab_buffer(), which grabs a buffer to read (or create) a block of metadata, including b-tree node blocks, does not set the block device, but instead does so only if the buffer is not in the "uptodate" state for each of its caller block reading functions. However, if the uptodate flag is set on a folio/page, and the buffer heads are detached from it by try_to_free_buffers(), and new buffer heads are then attached by create_empty_buffers(), the uptodate flag may be restored to each buffer without the block device being set to bh->b_bdev, and mark_buffer_dirty() may be called later in that state, resulting in the bug mentioned above. Fix this issue by making nilfs_grab_buffer() always set the block device of the super block structure to the buffer head, regardless of the state of the buffer's uptodate flag.


Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_23-rt-1-150600.1.3.1
SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.23.1

Ссылки

Описание

In the Linux kernel, the following vulnerability has been resolved: nilfs2: fix null-ptr-deref in block_touch_buffer tracepoint Patch series "nilfs2: fix null-ptr-deref bugs on block tracepoints". This series fixes null pointer dereference bugs that occur when using nilfs2 and two block-related tracepoints. This patch (of 2): It has been reported that when using "block:block_touch_buffer" tracepoint, touch_buffer() called from __nilfs_get_folio_block() causes a NULL pointer dereference, or a general protection fault when KASAN is enabled. This happens because since the tracepoint was added in touch_buffer(), it references the dev_t member bh->b_bdev->bd_dev regardless of whether the buffer head has a pointer to a block_device structure. In the current implementation, the block_device structure is set after the function returns to the caller. Here, touch_buffer() is used to mark the folio/page that owns the buffer head as accessed, but the common search helper for folio/page used by the caller function was optimized to mark the folio/page as accessed when it was reimplemented a long time ago, eliminating the need to call touch_buffer() here in the first place. So this solves the issue by eliminating the touch_buffer() call itself.


Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_23-rt-1-150600.1.3.1
SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.23.1

Ссылки

Описание

In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Handle dml allocation failure to avoid crash [Why] In the case where a dml allocation fails for any reason, the current state's dml contexts would no longer be valid. Then subsequent calls dc_state_copy_internal would shallow copy invalid memory and if the new state was released, a double free would occur. [How] Reset dml pointers in new_state to NULL and avoid invalid pointer (cherry picked from commit bcafdc61529a48f6f06355d78eb41b3aeda5296c)


Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_23-rt-1-150600.1.3.1
SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.23.1

Ссылки

Описание

In the Linux kernel, the following vulnerability has been resolved: pmdomain: imx93-blk-ctrl: correct remove path The check condition should be 'i < bc->onecell_data.num_domains', not 'bc->onecell_data.num_domains' which will make the look never finish and cause kernel panic. Also disable runtime to address "imx93-blk-ctrl 4ac10000.system-controller: Unbalanced pm_runtime_enable!"


Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_23-rt-1-150600.1.3.1
SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.23.1

Ссылки

Описание

In the Linux kernel, the following vulnerability has been resolved: mm: revert "mm: shmem: fix data-race in shmem_getattr()" Revert d949d1d14fa2 ("mm: shmem: fix data-race in shmem_getattr()") as suggested by Chuck [1]. It is causing deadlocks when accessing tmpfs over NFS. As Hugh commented, "added just to silence a syzbot sanitizer splat: added where there has never been any practical problem".


Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_23-rt-1-150600.1.3.1
SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.23.1

Ссылки

Описание

In the Linux kernel, the following vulnerability has been resolved: netfilter: ipset: add missing range check in bitmap_ip_uadt When tb[IPSET_ATTR_IP_TO] is not present but tb[IPSET_ATTR_CIDR] exists, the values of ip and ip_to are slightly swapped. Therefore, the range check for ip should be done later, but this part is missing and it seems that the vulnerability occurs. So we should add missing range checks and remove unnecessary range checks.


Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_23-rt-1-150600.1.3.1
SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.23.1

Ссылки

Описание

In the Linux kernel, the following vulnerability has been resolved: initramfs: avoid filename buffer overrun The initramfs filename field is defined in Documentation/driver-api/early-userspace/buffer-format.rst as: 37 cpio_file := ALGN(4) + cpio_header + filename + "\0" + ALGN(4) + data ... 55 ============= ================== ========================= 56 Field name Field size Meaning 57 ============= ================== ========================= ... 70 c_namesize 8 bytes Length of filename, including final \0 When extracting an initramfs cpio archive, the kernel's do_name() path handler assumes a zero-terminated path at @collected, passing it directly to filp_open() / init_mkdir() / init_mknod(). If a specially crafted cpio entry carries a non-zero-terminated filename and is followed by uninitialized memory, then a file may be created with trailing characters that represent the uninitialized memory. The ability to create an initramfs entry would imply already having full control of the system, so the buffer overrun shouldn't be considered a security vulnerability. Append the output of the following bash script to an existing initramfs and observe any created /initramfs_test_fname_overrunAA* path. E.g. ./reproducer.sh | gzip >> /myinitramfs It's easiest to observe non-zero uninitialized memory when the output is gzipped, as it'll overflow the heap allocated @out_buf in __gunzip(), rather than the initrd_start+initrd_size block. ---- reproducer.sh ---- nilchar="A" # change to "\0" to properly zero terminate / pad magic="070701" ino=1 mode=$(( 0100777 )) uid=0 gid=0 nlink=1 mtime=1 filesize=0 devmajor=0 devminor=1 rdevmajor=0 rdevminor=0 csum=0 fname="initramfs_test_fname_overrun" namelen=$(( ${#fname} + 1 )) # plus one to account for terminator printf "%s%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%s" \ $magic $ino $mode $uid $gid $nlink $mtime $filesize \ $devmajor $devminor $rdevmajor $rdevminor $namelen $csum $fname termpadlen=$(( 1 + ((4 - ((110 + $namelen) & 3)) % 4) )) printf "%.s${nilchar}" $(seq 1 $termpadlen) ---- reproducer.sh ---- Symlink filename fields handled in do_symlink() won't overrun past the data segment, due to the explicit zero-termination of the symlink target. Fix filename buffer overrun by aborting the initramfs FSM if any cpio entry doesn't carry a zero-terminator at the expected (name_len - 1) offset.


Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_23-rt-1-150600.1.3.1
SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.23.1

Ссылки

Описание

In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_event: Align BR/EDR JUST_WORKS paring with LE This aligned BR/EDR JUST_WORKS method with LE which since 92516cd97fd4 ("Bluetooth: Always request for user confirmation for Just Works") always request user confirmation with confirm_hint set since the likes of bluetoothd have dedicated policy around JUST_WORKS method (e.g. main.conf:JustWorksRepairing). CVE: CVE-2024-8805


Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_23-rt-1-150600.1.3.1
SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.23.1

Ссылки

Описание

In the Linux kernel, the following vulnerability has been resolved: NFSD: Prevent a potential integer overflow If the tag length is >= U32_MAX - 3 then the "length + 4" addition can result in an integer overflow. Address this by splitting the decoding into several steps so that decode_cb_compound4res() does not have to perform arithmetic on the unsafe length value.


Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_23-rt-1-150600.1.3.1
SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.23.1

Ссылки

Описание

In the Linux kernel, the following vulnerability has been resolved: comedi: Flush partial mappings in error case If some remap_pfn_range() calls succeeded before one failed, we still have buffer pages mapped into the userspace page tables when we drop the buffer reference with comedi_buf_map_put(bm). The userspace mappings are only cleaned up later in the mmap error path. Fix it by explicitly flushing all mappings in our VMA on the error path. See commit 79a61cc3fc04 ("mm: avoid leaving partial pfn mappings around in error case").


Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_23-rt-1-150600.1.3.1
SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.23.1

Ссылки

Описание

In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-audio: Fix out of bounds reads when finding clock sources The current USB-audio driver code doesn't check bLength of each descriptor at traversing for clock descriptors. That is, when a device provides a bogus descriptor with a shorter bLength, the driver might hit out-of-bounds reads. For addressing it, this patch adds sanity checks to the validator functions for the clock descriptor traversal. When the descriptor length is shorter than expected, it's skipped in the loop. For the clock source and clock multiplier descriptors, we can just check bLength against the sizeof() of each descriptor type. OTOH, the clock selector descriptor of UAC2 and UAC3 has an array of bNrInPins elements and two more fields at its tail, hence those have to be checked in addition to the sizeof() check.


Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_23-rt-1-150600.1.3.1
SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.23.1

Ссылки

Описание

In the Linux kernel, the following vulnerability has been resolved: svcrdma: Address an integer overflow Dan Carpenter reports: > Commit 78147ca8b4a9 ("svcrdma: Add a "parsed chunk list" data > structure") from Jun 22, 2020 (linux-next), leads to the following > Smatch static checker warning: > > net/sunrpc/xprtrdma/svc_rdma_recvfrom.c:498 xdr_check_write_chunk() > warn: potential user controlled sizeof overflow 'segcount * 4 * 4' > > net/sunrpc/xprtrdma/svc_rdma_recvfrom.c > 488 static bool xdr_check_write_chunk(struct svc_rdma_recv_ctxt *rctxt) > 489 { > 490 u32 segcount; > 491 __be32 *p; > 492 > 493 if (xdr_stream_decode_u32(&rctxt->rc_stream, &segcount)) > ^^^^^^^^ > > 494 return false; > 495 > 496 /* A bogus segcount causes this buffer overflow check to fail. */ > 497 p = xdr_inline_decode(&rctxt->rc_stream, > --> 498 segcount * rpcrdma_segment_maxsz * sizeof(*p)); > > > segcount is an untrusted u32. On 32bit systems anything >= SIZE_MAX / 16 will > have an integer overflow and some those values will be accepted by > xdr_inline_decode().


Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_23-rt-1-150600.1.3.1
SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.23.1

Ссылки

Описание

In the Linux kernel, the following vulnerability has been resolved: clk: clk-apple-nco: Add NULL check in applnco_probe Add NULL check in applnco_probe, to handle kernel NULL pointer dereference error.


Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_23-rt-1-150600.1.3.1
SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.23.1

Ссылки

Описание

In the Linux kernel, the following vulnerability has been resolved: ocfs2: fix uninitialized value in ocfs2_file_read_iter() Syzbot has reported the following KMSAN splat: BUG: KMSAN: uninit-value in ocfs2_file_read_iter+0x9a4/0xf80 ocfs2_file_read_iter+0x9a4/0xf80 __io_read+0x8d4/0x20f0 io_read+0x3e/0xf0 io_issue_sqe+0x42b/0x22c0 io_wq_submit_work+0xaf9/0xdc0 io_worker_handle_work+0xd13/0x2110 io_wq_worker+0x447/0x1410 ret_from_fork+0x6f/0x90 ret_from_fork_asm+0x1a/0x30 Uninit was created at: __alloc_pages_noprof+0x9a7/0xe00 alloc_pages_mpol_noprof+0x299/0x990 alloc_pages_noprof+0x1bf/0x1e0 allocate_slab+0x33a/0x1250 ___slab_alloc+0x12ef/0x35e0 kmem_cache_alloc_bulk_noprof+0x486/0x1330 __io_alloc_req_refill+0x84/0x560 io_submit_sqes+0x172f/0x2f30 __se_sys_io_uring_enter+0x406/0x41c0 __x64_sys_io_uring_enter+0x11f/0x1a0 x64_sys_call+0x2b54/0x3ba0 do_syscall_64+0xcd/0x1e0 entry_SYSCALL_64_after_hwframe+0x77/0x7f Since an instance of 'struct kiocb' may be passed from the block layer with 'private' field uninitialized, introduce 'ocfs2_iocb_init_rw_locked()' and use it from where 'ocfs2_dio_end_io()' might take care, i.e. in 'ocfs2_file_read_iter()' and 'ocfs2_file_write_iter()'.


Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_23-rt-1-150600.1.3.1
SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.23.1

Ссылки

Описание

In the Linux kernel, the following vulnerability has been resolved: wifi: ath9k: add range check for conn_rsp_epid in htc_connect_service() I found the following bug in my fuzzer: UBSAN: array-index-out-of-bounds in drivers/net/wireless/ath/ath9k/htc_hst.c:26:51 index 255 is out of range for type 'htc_endpoint [22]' CPU: 0 UID: 0 PID: 8 Comm: kworker/0:0 Not tainted 6.11.0-rc6-dirty #14 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014 Workqueue: events request_firmware_work_func Call Trace: <TASK> dump_stack_lvl+0x180/0x1b0 __ubsan_handle_out_of_bounds+0xd4/0x130 htc_issue_send.constprop.0+0x20c/0x230 ? _raw_spin_unlock_irqrestore+0x3c/0x70 ath9k_wmi_cmd+0x41d/0x610 ? mark_held_locks+0x9f/0xe0 ... Since this bug has been confirmed to be caused by insufficient verification of conn_rsp_epid, I think it would be appropriate to add a range check for conn_rsp_epid to htc_connect_service() to prevent the bug from occurring.


Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_23-rt-1-150600.1.3.1
SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.23.1

Ссылки

Описание

In the Linux kernel, the following vulnerability has been resolved: firmware: arm_scpi: Check the DVFS OPP count returned by the firmware Fix a kernel crash with the below call trace when the SCPI firmware returns OPP count of zero. dvfs_info.opp_count may be zero on some platforms during the reboot test, and the kernel will crash after dereferencing the pointer to kcalloc(info->count, sizeof(*opp), GFP_KERNEL). | Unable to handle kernel NULL pointer dereference at virtual address 0000000000000028 | Mem abort info: | ESR = 0x96000004 | Exception class = DABT (current EL), IL = 32 bits | SET = 0, FnV = 0 | EA = 0, S1PTW = 0 | Data abort info: | ISV = 0, ISS = 0x00000004 | CM = 0, WnR = 0 | user pgtable: 4k pages, 48-bit VAs, pgdp = 00000000faefa08c | [0000000000000028] pgd=0000000000000000 | Internal error: Oops: 96000004 [#1] SMP | scpi-hwmon: probe of PHYT000D:00 failed with error -110 | Process systemd-udevd (pid: 1701, stack limit = 0x00000000aaede86c) | CPU: 2 PID: 1701 Comm: systemd-udevd Not tainted 4.19.90+ #1 | Hardware name: PHYTIUM LTD Phytium FT2000/4/Phytium FT2000/4, BIOS | pstate: 60000005 (nZCv daif -PAN -UAO) | pc : scpi_dvfs_recalc_rate+0x40/0x58 [clk_scpi] | lr : clk_register+0x438/0x720 | Call trace: | scpi_dvfs_recalc_rate+0x40/0x58 [clk_scpi] | devm_clk_hw_register+0x50/0xa0 | scpi_clk_ops_init.isra.2+0xa0/0x138 [clk_scpi] | scpi_clocks_probe+0x528/0x70c [clk_scpi] | platform_drv_probe+0x58/0xa8 | really_probe+0x260/0x3d0 | driver_probe_device+0x12c/0x148 | device_driver_attach+0x74/0x98 | __driver_attach+0xb4/0xe8 | bus_for_each_dev+0x88/0xe0 | driver_attach+0x30/0x40 | bus_add_driver+0x178/0x2b0 | driver_register+0x64/0x118 | __platform_driver_register+0x54/0x60 | scpi_clocks_driver_init+0x24/0x1000 [clk_scpi] | do_one_initcall+0x54/0x220 | do_init_module+0x54/0x1c8 | load_module+0x14a4/0x1668 | __se_sys_finit_module+0xf8/0x110 | __arm64_sys_finit_module+0x24/0x30 | el0_svc_common+0x78/0x170 | el0_svc_handler+0x38/0x78 | el0_svc+0x8/0x340 | Code: 937d7c00 a94153f3 a8c27bfd f9400421 (b8606820) | ---[ end trace 06feb22469d89fa8 ]--- | Kernel panic - not syncing: Fatal exception | SMP: stopping secondary CPUs | Kernel Offset: disabled | CPU features: 0x10,a0002008 | Memory Limit: none


Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_23-rt-1-150600.1.3.1
SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.23.1

Ссылки

Описание

In the Linux kernel, the following vulnerability has been resolved: soc: qcom: geni-se: fix array underflow in geni_se_clk_tbl_get() This loop is supposed to break if the frequency returned from clk_round_rate() is the same as on the previous iteration. However, that check doesn't make sense on the first iteration through the loop. It leads to reading before the start of these->clk_perf_tbl[] array.


Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_23-rt-1-150600.1.3.1
SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.23.1

Ссылки

Описание

** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.


Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_23-rt-1-150600.1.3.1
SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.23.1

Ссылки

Описание

In the Linux kernel, the following vulnerability has been resolved: rcu/kvfree: Fix data-race in __mod_timer / kvfree_call_rcu KCSAN reports a data race when access the krcp->monitor_work.timer.expires variable in the schedule_delayed_monitor_work() function: <snip> BUG: KCSAN: data-race in __mod_timer / kvfree_call_rcu read to 0xffff888237d1cce8 of 8 bytes by task 10149 on cpu 1: schedule_delayed_monitor_work kernel/rcu/tree.c:3520 [inline] kvfree_call_rcu+0x3b8/0x510 kernel/rcu/tree.c:3839 trie_update_elem+0x47c/0x620 kernel/bpf/lpm_trie.c:441 bpf_map_update_value+0x324/0x350 kernel/bpf/syscall.c:203 generic_map_update_batch+0x401/0x520 kernel/bpf/syscall.c:1849 bpf_map_do_batch+0x28c/0x3f0 kernel/bpf/syscall.c:5143 __sys_bpf+0x2e5/0x7a0 __do_sys_bpf kernel/bpf/syscall.c:5741 [inline] __se_sys_bpf kernel/bpf/syscall.c:5739 [inline] __x64_sys_bpf+0x43/0x50 kernel/bpf/syscall.c:5739 x64_sys_call+0x2625/0x2d60 arch/x86/include/generated/asm/syscalls_64.h:322 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xc9/0x1c0 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f write to 0xffff888237d1cce8 of 8 bytes by task 56 on cpu 0: __mod_timer+0x578/0x7f0 kernel/time/timer.c:1173 add_timer_global+0x51/0x70 kernel/time/timer.c:1330 __queue_delayed_work+0x127/0x1a0 kernel/workqueue.c:2523 queue_delayed_work_on+0xdf/0x190 kernel/workqueue.c:2552 queue_delayed_work include/linux/workqueue.h:677 [inline] schedule_delayed_monitor_work kernel/rcu/tree.c:3525 [inline] kfree_rcu_monitor+0x5e8/0x660 kernel/rcu/tree.c:3643 process_one_work kernel/workqueue.c:3229 [inline] process_scheduled_works+0x483/0x9a0 kernel/workqueue.c:3310 worker_thread+0x51d/0x6f0 kernel/workqueue.c:3391 kthread+0x1d1/0x210 kernel/kthread.c:389 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 Reported by Kernel Concurrency Sanitizer on: CPU: 0 UID: 0 PID: 56 Comm: kworker/u8:4 Not tainted 6.12.0-rc2-syzkaller-00050-g5b7c893ed5ed #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 Workqueue: events_unbound kfree_rcu_monitor <snip> kfree_rcu_monitor() rearms the work if a "krcp" has to be still offloaded and this is done without holding krcp->lock, whereas the kvfree_call_rcu() holds it. Fix it by acquiring the "krcp->lock" for kfree_rcu_monitor() so both functions do not race anymore.


Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_23-rt-1-150600.1.3.1
SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.23.1

Ссылки

Описание

In the Linux kernel, the following vulnerability has been resolved: EDAC/bluefield: Fix potential integer overflow The 64-bit argument for the "get DIMM info" SMC call consists of mem_ctrl_idx left-shifted 16 bits and OR-ed with DIMM index. With mem_ctrl_idx defined as 32-bits wide the left-shift operation truncates the upper 16 bits of information during the calculation of the SMC argument. The mem_ctrl_idx stack variable must be defined as 64-bits wide to prevent any potential integer overflow, i.e. loss of data from upper 16 bits.


Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_23-rt-1-150600.1.3.1
SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.23.1

Ссылки

Описание

In the Linux kernel, the following vulnerability has been resolved: crypto: qat/qat_4xxx - fix off by one in uof_get_name() The fw_objs[] array has "num_objs" elements so the > needs to be >= to prevent an out of bounds read.


Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_23-rt-1-150600.1.3.1
SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.23.1

Ссылки

Описание

In the Linux kernel, the following vulnerability has been resolved: block, bfq: fix bfqq uaf in bfq_limit_depth() Set new allocated bfqq to bic or remove freed bfqq from bic are both protected by bfqd->lock, however bfq_limit_depth() is deferencing bfqq from bic without the lock, this can lead to UAF if the io_context is shared by multiple tasks. For example, test bfq with io_uring can trigger following UAF in v6.6: ================================================================== BUG: KASAN: slab-use-after-free in bfqq_group+0x15/0x50 Call Trace: <TASK> dump_stack_lvl+0x47/0x80 print_address_description.constprop.0+0x66/0x300 print_report+0x3e/0x70 kasan_report+0xb4/0xf0 bfqq_group+0x15/0x50 bfqq_request_over_limit+0x130/0x9a0 bfq_limit_depth+0x1b5/0x480 __blk_mq_alloc_requests+0x2b5/0xa00 blk_mq_get_new_requests+0x11d/0x1d0 blk_mq_submit_bio+0x286/0xb00 submit_bio_noacct_nocheck+0x331/0x400 __block_write_full_folio+0x3d0/0x640 writepage_cb+0x3b/0xc0 write_cache_pages+0x254/0x6c0 write_cache_pages+0x254/0x6c0 do_writepages+0x192/0x310 filemap_fdatawrite_wbc+0x95/0xc0 __filemap_fdatawrite_range+0x99/0xd0 filemap_write_and_wait_range.part.0+0x4d/0xa0 blkdev_read_iter+0xef/0x1e0 io_read+0x1b6/0x8a0 io_issue_sqe+0x87/0x300 io_wq_submit_work+0xeb/0x390 io_worker_handle_work+0x24d/0x550 io_wq_worker+0x27f/0x6c0 ret_from_fork_asm+0x1b/0x30 </TASK> Allocated by task 808602: kasan_save_stack+0x1e/0x40 kasan_set_track+0x21/0x30 __kasan_slab_alloc+0x83/0x90 kmem_cache_alloc_node+0x1b1/0x6d0 bfq_get_queue+0x138/0xfa0 bfq_get_bfqq_handle_split+0xe3/0x2c0 bfq_init_rq+0x196/0xbb0 bfq_insert_request.isra.0+0xb5/0x480 bfq_insert_requests+0x156/0x180 blk_mq_insert_request+0x15d/0x440 blk_mq_submit_bio+0x8a4/0xb00 submit_bio_noacct_nocheck+0x331/0x400 __blkdev_direct_IO_async+0x2dd/0x330 blkdev_write_iter+0x39a/0x450 io_write+0x22a/0x840 io_issue_sqe+0x87/0x300 io_wq_submit_work+0xeb/0x390 io_worker_handle_work+0x24d/0x550 io_wq_worker+0x27f/0x6c0 ret_from_fork+0x2d/0x50 ret_from_fork_asm+0x1b/0x30 Freed by task 808589: kasan_save_stack+0x1e/0x40 kasan_set_track+0x21/0x30 kasan_save_free_info+0x27/0x40 __kasan_slab_free+0x126/0x1b0 kmem_cache_free+0x10c/0x750 bfq_put_queue+0x2dd/0x770 __bfq_insert_request.isra.0+0x155/0x7a0 bfq_insert_request.isra.0+0x122/0x480 bfq_insert_requests+0x156/0x180 blk_mq_dispatch_plug_list+0x528/0x7e0 blk_mq_flush_plug_list.part.0+0xe5/0x590 __blk_flush_plug+0x3b/0x90 blk_finish_plug+0x40/0x60 do_writepages+0x19d/0x310 filemap_fdatawrite_wbc+0x95/0xc0 __filemap_fdatawrite_range+0x99/0xd0 filemap_write_and_wait_range.part.0+0x4d/0xa0 blkdev_read_iter+0xef/0x1e0 io_read+0x1b6/0x8a0 io_issue_sqe+0x87/0x300 io_wq_submit_work+0xeb/0x390 io_worker_handle_work+0x24d/0x550 io_wq_worker+0x27f/0x6c0 ret_from_fork+0x2d/0x50 ret_from_fork_asm+0x1b/0x30 Fix the problem by protecting bic_to_bfqq() with bfqd->lock.


Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_23-rt-1-150600.1.3.1
SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.23.1

Ссылки

Описание

In the Linux kernel, the following vulnerability has been resolved: nvme-fabrics: fix kernel crash while shutting down controller The nvme keep-alive operation, which executes at a periodic interval, could potentially sneak in while shutting down a fabric controller. This may lead to a race between the fabric controller admin queue destroy code path (invoked while shutting down controller) and hw/hctx queue dispatcher called from the nvme keep-alive async request queuing operation. This race could lead to the kernel crash shown below: Call Trace: autoremove_wake_function+0x0/0xbc (unreliable) __blk_mq_sched_dispatch_requests+0x114/0x24c blk_mq_sched_dispatch_requests+0x44/0x84 blk_mq_run_hw_queue+0x140/0x220 nvme_keep_alive_work+0xc8/0x19c [nvme_core] process_one_work+0x200/0x4e0 worker_thread+0x340/0x504 kthread+0x138/0x140 start_kernel_thread+0x14/0x18 While shutting down fabric controller, if nvme keep-alive request sneaks in then it would be flushed off. The nvme_keep_alive_end_io function is then invoked to handle the end of the keep-alive operation which decrements the admin->q_usage_counter and assuming this is the last/only request in the admin queue then the admin->q_usage_counter becomes zero. If that happens then blk-mq destroy queue operation (blk_mq_destroy_ queue()) which could be potentially running simultaneously on another cpu (as this is the controller shutdown code path) would forward progress and deletes the admin queue. So, now from this point onward we are not supposed to access the admin queue resources. However the issue here's that the nvme keep-alive thread running hw/hctx queue dispatch operation hasn't yet finished its work and so it could still potentially access the admin queue resource while the admin queue had been already deleted and that causes the above crash. The above kernel crash is regression caused due to changes implemented in commit a54a93d0e359 ("nvme: move stopping keep-alive into nvme_uninit_ctrl()"). Ideally we should stop keep-alive before destroyin g the admin queue and freeing the admin tagset so that it wouldn't sneak in during the shutdown operation. However we removed the keep alive stop operation from the beginning of the controller shutdown code path in commit a54a93d0e359 ("nvme: move stopping keep-alive into nvme_uninit_ctrl()") and added it under nvme_uninit_ctrl() which executes very late in the shutdown code path after the admin queue is destroyed and its tagset is removed. So this change created the possibility of keep-alive sneaking in and interfering with the shutdown operation and causing observed kernel crash. To fix the observed crash, we decided to move nvme_stop_keep_alive() from nvme_uninit_ctrl() to nvme_remove_admin_tag_set(). This change would ensure that we don't forward progress and delete the admin queue until the keep- alive operation is finished (if it's in-flight) or cancelled and that would help contain the race condition explained above and hence avoid the crash. Moving nvme_stop_keep_alive() to nvme_remove_admin_tag_set() instead of adding nvme_stop_keep_alive() to the beginning of the controller shutdown code path in nvme_stop_ctrl(), as was the case earlier before commit a54a93d0e359 ("nvme: move stopping keep-alive into nvme_uninit_ctrl()"), would help save one callsite of nvme_stop_keep_alive().


Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_23-rt-1-150600.1.3.1
SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.23.1

Ссылки

Описание

In the Linux kernel, the following vulnerability has been resolved: ubifs: authentication: Fix use-after-free in ubifs_tnc_end_commit After an insertion in TNC, the tree might split and cause a node to change its `znode->parent`. A further deletion of other nodes in the tree (which also could free the nodes), the aforementioned node's `znode->cparent` could still point to a freed node. This `znode->cparent` may not be updated when getting nodes to commit in `ubifs_tnc_start_commit()`. This could then trigger a use-after-free when accessing the `znode->cparent` in `write_index()` in `ubifs_tnc_end_commit()`. This can be triggered by running rm -f /etc/test-file.bin dd if=/dev/urandom of=/etc/test-file.bin bs=1M count=60 conv=fsync in a loop, and with `CONFIG_UBIFS_FS_AUTHENTICATION`. KASAN then reports: BUG: KASAN: use-after-free in ubifs_tnc_end_commit+0xa5c/0x1950 Write of size 32 at addr ffffff800a3af86c by task ubifs_bgt0_20/153 Call trace: dump_backtrace+0x0/0x340 show_stack+0x18/0x24 dump_stack_lvl+0x9c/0xbc print_address_description.constprop.0+0x74/0x2b0 kasan_report+0x1d8/0x1f0 kasan_check_range+0xf8/0x1a0 memcpy+0x84/0xf4 ubifs_tnc_end_commit+0xa5c/0x1950 do_commit+0x4e0/0x1340 ubifs_bg_thread+0x234/0x2e0 kthread+0x36c/0x410 ret_from_fork+0x10/0x20 Allocated by task 401: kasan_save_stack+0x38/0x70 __kasan_kmalloc+0x8c/0xd0 __kmalloc+0x34c/0x5bc tnc_insert+0x140/0x16a4 ubifs_tnc_add+0x370/0x52c ubifs_jnl_write_data+0x5d8/0x870 do_writepage+0x36c/0x510 ubifs_writepage+0x190/0x4dc __writepage+0x58/0x154 write_cache_pages+0x394/0x830 do_writepages+0x1f0/0x5b0 filemap_fdatawrite_wbc+0x170/0x25c file_write_and_wait_range+0x140/0x190 ubifs_fsync+0xe8/0x290 vfs_fsync_range+0xc0/0x1e4 do_fsync+0x40/0x90 __arm64_sys_fsync+0x34/0x50 invoke_syscall.constprop.0+0xa8/0x260 do_el0_svc+0xc8/0x1f0 el0_svc+0x34/0x70 el0t_64_sync_handler+0x108/0x114 el0t_64_sync+0x1a4/0x1a8 Freed by task 403: kasan_save_stack+0x38/0x70 kasan_set_track+0x28/0x40 kasan_set_free_info+0x28/0x4c __kasan_slab_free+0xd4/0x13c kfree+0xc4/0x3a0 tnc_delete+0x3f4/0xe40 ubifs_tnc_remove_range+0x368/0x73c ubifs_tnc_remove_ino+0x29c/0x2e0 ubifs_jnl_delete_inode+0x150/0x260 ubifs_evict_inode+0x1d4/0x2e4 evict+0x1c8/0x450 iput+0x2a0/0x3c4 do_unlinkat+0x2cc/0x490 __arm64_sys_unlinkat+0x90/0x100 invoke_syscall.constprop.0+0xa8/0x260 do_el0_svc+0xc8/0x1f0 el0_svc+0x34/0x70 el0t_64_sync_handler+0x108/0x114 el0t_64_sync+0x1a4/0x1a8 The offending `memcpy()` in `ubifs_copy_hash()` has a use-after-free when a node becomes root in TNC but still has a `cparent` to an already freed node. More specifically, consider the following TNC: zroot / / zp1 / / zn Inserting a new node `zn_new` with a key smaller then `zn` will trigger a split in `tnc_insert()` if `zp1` is full: zroot / \ / \ zp1 zp2 / \ / \ zn_new zn `zn->parent` has now been moved to `zp2`, *but* `zn->cparent` still points to `zp1`. Now, consider a removal of all the nodes _except_ `zn`. Just when `tnc_delete()` is about to delete `zroot` and `zp2`: zroot \ \ zp2 \ \ zn `zroot` and `zp2` get freed and the tree collapses: zn `zn` now becomes the new `zroot`. `get_znodes_to_commit()` will now only find `zn`, the new `zroot`, and `write_index()` will check its `znode->cparent` that wrongly points to the already freed `zp1`. `ubifs_copy_hash()` thus gets wrongly called with `znode->cparent->zbranch[znode->iip].hash` that triggers the use-after-free! Fix this by explicitly setting `znode->cparent` to `NULL` in `get_znodes_to_commit()` for the root node. The search for the dirty nodes ---truncated---


Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_23-rt-1-150600.1.3.1
SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.23.1

Ссылки

Описание

In the Linux kernel, the following vulnerability has been resolved: NFSv4.0: Fix a use-after-free problem in the asynchronous open() Yang Erkun reports that when two threads are opening files at the same time, and are forced to abort before a reply is seen, then the call to nfs_release_seqid() in nfs4_opendata_free() can result in a use-after-free of the pointer to the defunct rpc task of the other thread. The fix is to ensure that if the RPC call is aborted before the call to nfs_wait_on_sequence() is complete, then we must call nfs_release_seqid() in nfs4_open_release() before the rpc_task is freed.


Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_23-rt-1-150600.1.3.1
SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.23.1

Ссылки

Описание

In the Linux kernel, the following vulnerability has been resolved: SUNRPC: make sure cache entry active before cache_show The function `c_show` was called with protection from RCU. This only ensures that `cp` will not be freed. Therefore, the reference count for `cp` can drop to zero, which will trigger a refcount use-after-free warning when `cache_get` is called. To resolve this issue, use `cache_get_rcu` to ensure that `cp` remains active. ------------[ cut here ]------------ refcount_t: addition on 0; use-after-free. WARNING: CPU: 7 PID: 822 at lib/refcount.c:25 refcount_warn_saturate+0xb1/0x120 CPU: 7 UID: 0 PID: 822 Comm: cat Not tainted 6.12.0-rc3+ #1 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.1-2.fc37 04/01/2014 RIP: 0010:refcount_warn_saturate+0xb1/0x120 Call Trace: <TASK> c_show+0x2fc/0x380 [sunrpc] seq_read_iter+0x589/0x770 seq_read+0x1e5/0x270 proc_reg_read+0xe1/0x140 vfs_read+0x125/0x530 ksys_read+0xc1/0x160 do_syscall_64+0x5f/0x170 entry_SYSCALL_64_after_hwframe+0x76/0x7e


Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_23-rt-1-150600.1.3.1
SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.23.1

Ссылки

Описание

In the Linux kernel, the following vulnerability has been resolved: smb: client: fix use-after-free of signing key Customers have reported use-after-free in @ses->auth_key.response with SMB2.1 + sign mounts which occurs due to following race: task A task B cifs_mount() dfs_mount_share() get_session() cifs_mount_get_session() cifs_send_recv() cifs_get_smb_ses() compound_send_recv() cifs_setup_session() smb2_setup_request() kfree_sensitive() smb2_calc_signature() crypto_shash_setkey() *UAF* Fix this by ensuring that we have a valid @ses->auth_key.response by checking whether @ses->ses_status is SES_GOOD or SES_EXITING with @ses->ses_lock held. After commit 24a9799aa8ef ("smb: client: fix UAF in smb2_reconnect_server()"), we made sure to call ->logoff() only when @ses was known to be good (e.g. valid ->auth_key.response), so it's safe to access signing key when @ses->ses_status == SES_EXITING.


Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_23-rt-1-150600.1.3.1
SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.23.1

Ссылки

Описание

In the Linux kernel, the following vulnerability has been resolved: ALSA: pcm: Add sanity NULL check for the default mmap fault handler A driver might allow the mmap access before initializing its runtime->dma_area properly. Add a proper NULL check before passing to virt_to_page() for avoiding a panic.


Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_23-rt-1-150600.1.3.1
SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.23.1

Ссылки

Описание

In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: fix crash when unbinding If there is an error during some initialization related to firmware, the function ath12k_dp_cc_cleanup is called to release resources. However this is released again when the device is unbinded (ath12k_pci), and we get: BUG: kernel NULL pointer dereference, address: 0000000000000020 at RIP: 0010:ath12k_dp_cc_cleanup.part.0+0xb6/0x500 [ath12k] Call Trace: ath12k_dp_cc_cleanup ath12k_dp_free ath12k_core_deinit ath12k_pci_remove ... The issue is always reproducible from a VM because the MSI addressing initialization is failing. In order to fix the issue, just set to NULL the released structure in ath12k_dp_cc_cleanup at the end.


Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_23-rt-1-150600.1.3.1
SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.23.1

Ссылки

Описание

In the Linux kernel, the following vulnerability has been resolved: wifi: rtlwifi: Drastically reduce the attempts to read efuse in case of failures Syzkaller reported a hung task with uevent_show() on stack trace. That specific issue was addressed by another commit [0], but even with that fix applied (for example, running v6.12-rc5) we face another type of hung task that comes from the same reproducer [1]. By investigating that, we could narrow it to the following path: (a) Syzkaller emulates a Realtek USB WiFi adapter using raw-gadget and dummy_hcd infrastructure. (b) During the probe of rtl8192cu, the driver ends-up performing an efuse read procedure (which is related to EEPROM load IIUC), and here lies the issue: the function read_efuse() calls read_efuse_byte() many times, as loop iterations depending on the efuse size (in our example, 512 in total). This procedure for reading efuse bytes relies in a loop that performs an I/O read up to *10k* times in case of failures. We measured the time of the loop inside read_efuse_byte() alone, and in this reproducer (which involves the dummy_hcd emulation layer), it takes 15 seconds each. As a consequence, we have the driver stuck in its probe routine for big time, exposing a stack trace like below if we attempt to reboot the system, for example: task:kworker/0:3 state:D stack:0 pid:662 tgid:662 ppid:2 flags:0x00004000 Workqueue: usb_hub_wq hub_event Call Trace: __schedule+0xe22/0xeb6 schedule_timeout+0xe7/0x132 __wait_for_common+0xb5/0x12e usb_start_wait_urb+0xc5/0x1ef ? usb_alloc_urb+0x95/0xa4 usb_control_msg+0xff/0x184 _usbctrl_vendorreq_sync+0xa0/0x161 _usb_read_sync+0xb3/0xc5 read_efuse_byte+0x13c/0x146 read_efuse+0x351/0x5f0 efuse_read_all_map+0x42/0x52 rtl_efuse_shadow_map_update+0x60/0xef rtl_get_hwinfo+0x5d/0x1c2 rtl92cu_read_eeprom_info+0x10a/0x8d5 ? rtl92c_read_chip_version+0x14f/0x17e rtl_usb_probe+0x323/0x851 usb_probe_interface+0x278/0x34b really_probe+0x202/0x4a4 __driver_probe_device+0x166/0x1b2 driver_probe_device+0x2f/0xd8 [...] We propose hereby to drastically reduce the attempts of doing the I/O reads in case of failures, restricted to USB devices (given that they're inherently slower than PCIe ones). By retrying up to 10 times (instead of 10000), we got reponsiveness in the reproducer, while seems reasonable to believe that there's no sane USB device implementation in the field requiring this amount of retries at every I/O read in order to properly work. Based on that assumption, it'd be good to have it backported to stable but maybe not since driver implementation (the 10k number comes from day 0), perhaps up to 6.x series makes sense. [0] Commit 15fffc6a5624 ("driver core: Fix uevent_show() vs driver detach race") [1] A note about that: this syzkaller report presents multiple reproducers that differs by the type of emulated USB device. For this specific case, check the entry from 2024/08/08 06:23 in the list of crashes; the C repro is available at https://syzkaller.appspot.com/text?tag=ReproC&x=1521fc83980000.


Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_23-rt-1-150600.1.3.1
SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.23.1

Ссылки

Описание

In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: fix warning when unbinding If there is an error during some initialization related to firmware, the buffers dp->tx_ring[i].tx_status are released. However this is released again when the device is unbinded (ath12k_pci), and we get: WARNING: CPU: 0 PID: 2098 at mm/slub.c:4689 free_large_kmalloc+0x4d/0x80 Call Trace: free_large_kmalloc ath12k_dp_free ath12k_core_deinit ath12k_pci_remove ... The issue is always reproducible from a VM because the MSI addressing initialization is failing. In order to fix the issue, just set the buffers to NULL after releasing in order to avoid the double free.


Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_23-rt-1-150600.1.3.1
SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.23.1

Ссылки

Описание

In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Fix null check for pipe_ctx->plane_state in hwss_setup_dpp This commit addresses a null pointer dereference issue in hwss_setup_dpp(). The issue could occur when pipe_ctx->plane_state is null. The fix adds a check to ensure `pipe_ctx->plane_state` is not null before accessing. This prevents a null pointer dereference.


Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_23-rt-1-150600.1.3.1
SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.23.1

Ссылки

Описание

In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Fix null check for pipe_ctx->plane_state in dcn20_program_pipe This commit addresses a null pointer dereference issue in dcn20_program_pipe(). Previously, commit 8e4ed3cf1642 ("drm/amd/display: Add null check for pipe_ctx->plane_state in dcn20_program_pipe") partially fixed the null pointer dereference issue. However, in dcn20_update_dchubp_dpp(), the variable pipe_ctx is passed in, and plane_state is accessed again through pipe_ctx. Multiple if statements directly call attributes of plane_state, leading to potential null pointer dereference issues. This patch adds necessary null checks to ensure stability.


Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_23-rt-1-150600.1.3.1
SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.23.1

Ссылки

Описание

In the Linux kernel, the following vulnerability has been resolved: firmware_loader: Fix possible resource leak in fw_log_firmware_info() The alg instance should be released under the exception path, otherwise there may be resource leak here. To mitigate this, free the alg instance with crypto_free_shash when kmalloc fails.


Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_23-rt-1-150600.1.3.1
SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.23.1

Ссылки

Описание

In the Linux kernel, the following vulnerability has been resolved: tcp: Fix use-after-free of nreq in reqsk_timer_handler(). The cited commit replaced inet_csk_reqsk_queue_drop_and_put() with __inet_csk_reqsk_queue_drop() and reqsk_put() in reqsk_timer_handler(). Then, oreq should be passed to reqsk_put() instead of req; otherwise use-after-free of nreq could happen when reqsk is migrated but the retry attempt failed (e.g. due to timeout). Let's pass oreq to reqsk_put().


Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_23-rt-1-150600.1.3.1
SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.23.1

Ссылки

Описание

In the Linux kernel, the following vulnerability has been resolved: Bluetooth: MGMT: Fix possible deadlocks This fixes possible deadlocks like the following caused by hci_cmd_sync_dequeue causing the destroy function to run: INFO: task kworker/u19:0:143 blocked for more than 120 seconds. Tainted: G W O 6.8.0-2024-03-19-intel-next-iLS-24ww14 #1 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/u19:0 state:D stack:0 pid:143 tgid:143 ppid:2 flags:0x00004000 Workqueue: hci0 hci_cmd_sync_work [bluetooth] Call Trace: <TASK> __schedule+0x374/0xaf0 schedule+0x3c/0xf0 schedule_preempt_disabled+0x1c/0x30 __mutex_lock.constprop.0+0x3ef/0x7a0 __mutex_lock_slowpath+0x13/0x20 mutex_lock+0x3c/0x50 mgmt_set_connectable_complete+0xa4/0x150 [bluetooth] ? kfree+0x211/0x2a0 hci_cmd_sync_dequeue+0xae/0x130 [bluetooth] ? __pfx_cmd_complete_rsp+0x10/0x10 [bluetooth] cmd_complete_rsp+0x26/0x80 [bluetooth] mgmt_pending_foreach+0x4d/0x70 [bluetooth] __mgmt_power_off+0x8d/0x180 [bluetooth] ? _raw_spin_unlock_irq+0x23/0x40 hci_dev_close_sync+0x445/0x5b0 [bluetooth] hci_set_powered_sync+0x149/0x250 [bluetooth] set_powered_sync+0x24/0x60 [bluetooth] hci_cmd_sync_work+0x90/0x150 [bluetooth] process_one_work+0x13e/0x300 worker_thread+0x2f7/0x420 ? __pfx_worker_thread+0x10/0x10 kthread+0x107/0x140 ? __pfx_kthread+0x10/0x10 ret_from_fork+0x3d/0x60 ? __pfx_kthread+0x10/0x10 ret_from_fork_asm+0x1b/0x30 </TASK>


Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_23-rt-1-150600.1.3.1
SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.23.1

Ссылки

Описание

In the Linux kernel, the following vulnerability has been resolved: Bluetooth: MGMT: Fix slab-use-after-free Read in set_powered_sync This fixes the following crash: ================================================================== BUG: KASAN: slab-use-after-free in set_powered_sync+0x3a/0xc0 net/bluetooth/mgmt.c:1353 Read of size 8 at addr ffff888029b4dd18 by task kworker/u9:0/54 CPU: 1 UID: 0 PID: 54 Comm: kworker/u9:0 Not tainted 6.11.0-rc6-syzkaller-01155-gf723224742fc #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 Workqueue: hci0 hci_cmd_sync_work Call Trace: <TASK> __dump_stack lib/dump_stack.c:93 [inline] dump_stack_lvl+0x241/0x360 lib/dump_stack.c:119 print_address_description mm/kasan/report.c:377 [inline] print_report+0x169/0x550 mm/kasan/report.c:488 q kasan_report+0x143/0x180 mm/kasan/report.c:601 set_powered_sync+0x3a/0xc0 net/bluetooth/mgmt.c:1353 hci_cmd_sync_work+0x22b/0x400 net/bluetooth/hci_sync.c:328 process_one_work kernel/workqueue.c:3231 [inline] process_scheduled_works+0xa2c/0x1830 kernel/workqueue.c:3312 worker_thread+0x86d/0xd10 kernel/workqueue.c:3389 kthread+0x2f0/0x390 kernel/kthread.c:389 ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 </TASK> Allocated by task 5247: kasan_save_stack mm/kasan/common.c:47 [inline] kasan_save_track+0x3f/0x80 mm/kasan/common.c:68 poison_kmalloc_redzone mm/kasan/common.c:370 [inline] __kasan_kmalloc+0x98/0xb0 mm/kasan/common.c:387 kasan_kmalloc include/linux/kasan.h:211 [inline] __kmalloc_cache_noprof+0x19c/0x2c0 mm/slub.c:4193 kmalloc_noprof include/linux/slab.h:681 [inline] kzalloc_noprof include/linux/slab.h:807 [inline] mgmt_pending_new+0x65/0x250 net/bluetooth/mgmt_util.c:269 mgmt_pending_add+0x36/0x120 net/bluetooth/mgmt_util.c:296 set_powered+0x3cd/0x5e0 net/bluetooth/mgmt.c:1394 hci_mgmt_cmd+0xc47/0x11d0 net/bluetooth/hci_sock.c:1712 hci_sock_sendmsg+0x7b8/0x11c0 net/bluetooth/hci_sock.c:1832 sock_sendmsg_nosec net/socket.c:730 [inline] __sock_sendmsg+0x221/0x270 net/socket.c:745 sock_write_iter+0x2dd/0x400 net/socket.c:1160 new_sync_write fs/read_write.c:497 [inline] vfs_write+0xa72/0xc90 fs/read_write.c:590 ksys_write+0x1a0/0x2c0 fs/read_write.c:643 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f Freed by task 5246: kasan_save_stack mm/kasan/common.c:47 [inline] kasan_save_track+0x3f/0x80 mm/kasan/common.c:68 kasan_save_free_info+0x40/0x50 mm/kasan/generic.c:579 poison_slab_object+0xe0/0x150 mm/kasan/common.c:240 __kasan_slab_free+0x37/0x60 mm/kasan/common.c:256 kasan_slab_free include/linux/kasan.h:184 [inline] slab_free_hook mm/slub.c:2256 [inline] slab_free mm/slub.c:4477 [inline] kfree+0x149/0x360 mm/slub.c:4598 settings_rsp+0x2bc/0x390 net/bluetooth/mgmt.c:1443 mgmt_pending_foreach+0xd1/0x130 net/bluetooth/mgmt_util.c:259 __mgmt_power_off+0x112/0x420 net/bluetooth/mgmt.c:9455 hci_dev_close_sync+0x665/0x11a0 net/bluetooth/hci_sync.c:5191 hci_dev_do_close net/bluetooth/hci_core.c:483 [inline] hci_dev_close+0x112/0x210 net/bluetooth/hci_core.c:508 sock_do_ioctl+0x158/0x460 net/socket.c:1222 sock_ioctl+0x629/0x8e0 net/socket.c:1341 vfs_ioctl fs/ioctl.c:51 [inline] __do_sys_ioctl fs/ioctl.c:907 [inline] __se_sys_ioctl+0xfc/0x170 fs/ioctl.c:893 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83gv entry_SYSCALL_64_after_hwframe+0x77/0x7f


Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_23-rt-1-150600.1.3.1
SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.23.1

Ссылки

Описание

In the Linux kernel, the following vulnerability has been resolved: bnxt_en: Fix receive ring space parameters when XDP is active The MTU setting at the time an XDP multi-buffer is attached determines whether the aggregation ring will be used and the rx_skb_func handler. This is done in bnxt_set_rx_skb_mode(). If the MTU is later changed, the aggregation ring setting may need to be changed and it may become out-of-sync with the settings initially done in bnxt_set_rx_skb_mode(). This may result in random memory corruption and crashes as the HW may DMA data larger than the allocated buffer size, such as: BUG: kernel NULL pointer dereference, address: 00000000000003c0 PGD 0 P4D 0 Oops: 0000 [#1] PREEMPT SMP NOPTI CPU: 17 PID: 0 Comm: swapper/17 Kdump: loaded Tainted: G S OE 6.1.0-226bf9805506 #1 Hardware name: Wiwynn Delta Lake PVT BZA.02601.0150/Delta Lake-Class1, BIOS F0E_3A12 08/26/2021 RIP: 0010:bnxt_rx_pkt+0xe97/0x1ae0 [bnxt_en] Code: 8b 95 70 ff ff ff 4c 8b 9d 48 ff ff ff 66 41 89 87 b4 00 00 00 e9 0b f7 ff ff 0f b7 43 0a 49 8b 95 a8 04 00 00 25 ff 0f 00 00 <0f> b7 14 42 48 c1 e2 06 49 03 95 a0 04 00 00 0f b6 42 33f RSP: 0018:ffffa19f40cc0d18 EFLAGS: 00010202 RAX: 00000000000001e0 RBX: ffff8e2c805c6100 RCX: 00000000000007ff RDX: 0000000000000000 RSI: ffff8e2c271ab990 RDI: ffff8e2c84f12380 RBP: ffffa19f40cc0e48 R08: 000000000001000d R09: 974ea2fcddfa4cbf R10: 0000000000000000 R11: ffffa19f40cc0ff8 R12: ffff8e2c94b58980 R13: ffff8e2c952d6600 R14: 0000000000000016 R15: ffff8e2c271ab990 FS: 0000000000000000(0000) GS:ffff8e3b3f840000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00000000000003c0 CR3: 0000000e8580a004 CR4: 00000000007706e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 PKRU: 55555554 Call Trace: <IRQ> __bnxt_poll_work+0x1c2/0x3e0 [bnxt_en] To address the issue, we now call bnxt_set_rx_skb_mode() within bnxt_change_mtu() to properly set the AGG rings configuration and update rx_skb_func based on the new MTU value. Additionally, BNXT_FLAG_NO_AGG_RINGS is cleared at the beginning of bnxt_set_rx_skb_mode() to make sure it gets set or cleared based on the current MTU.


Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_23-rt-1-150600.1.3.1
SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.23.1

Ссылки

Описание

In the Linux kernel, the following vulnerability has been resolved: s390/iucv: MSG_PEEK causes memory leak in iucv_sock_destruct() Passing MSG_PEEK flag to skb_recv_datagram() increments skb refcount (skb->users) and iucv_sock_recvmsg() does not decrement skb refcount at exit. This results in skb memory leak in skb_queue_purge() and WARN_ON in iucv_sock_destruct() during socket close. To fix this decrease skb refcount by one if MSG_PEEK is set in order to prevent memory leak and WARN_ON. WARNING: CPU: 2 PID: 6292 at net/iucv/af_iucv.c:286 iucv_sock_destruct+0x144/0x1a0 [af_iucv] CPU: 2 PID: 6292 Comm: afiucv_test_msg Kdump: loaded Tainted: G W 6.10.0-rc7 #1 Hardware name: IBM 3931 A01 704 (z/VM 7.3.0) Call Trace: [<001587c682c4aa98>] iucv_sock_destruct+0x148/0x1a0 [af_iucv] [<001587c682c4a9d0>] iucv_sock_destruct+0x80/0x1a0 [af_iucv] [<001587c704117a32>] __sk_destruct+0x52/0x550 [<001587c704104a54>] __sock_release+0xa4/0x230 [<001587c704104c0c>] sock_close+0x2c/0x40 [<001587c702c5f5a8>] __fput+0x2e8/0x970 [<001587c7024148c4>] task_work_run+0x1c4/0x2c0 [<001587c7023b0716>] do_exit+0x996/0x1050 [<001587c7023b13aa>] do_group_exit+0x13a/0x360 [<001587c7023b1626>] __s390x_sys_exit_group+0x56/0x60 [<001587c7022bccca>] do_syscall+0x27a/0x380 [<001587c7049a6a0c>] __do_syscall+0x9c/0x160 [<001587c7049ce8a8>] system_call+0x70/0x98 Last Breaking-Event-Address: [<001587c682c4a9d4>] iucv_sock_destruct+0x84/0x1a0 [af_iucv]


Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_23-rt-1-150600.1.3.1
SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.23.1

Ссылки

Описание

In the Linux kernel, the following vulnerability has been resolved: net: usb: lan78xx: Fix double free issue with interrupt buffer allocation In lan78xx_probe(), the buffer `buf` was being freed twice: once implicitly through `usb_free_urb(dev->urb_intr)` with the `URB_FREE_BUFFER` flag and again explicitly by `kfree(buf)`. This caused a double free issue. To resolve this, reordered `kmalloc()` and `usb_alloc_urb()` calls to simplify the initialization sequence and removed the redundant `kfree(buf)`. Now, `buf` is allocated after `usb_alloc_urb()`, ensuring it is correctly managed by `usb_fill_int_urb()` and freed by `usb_free_urb()` as intended.


Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_23-rt-1-150600.1.3.1
SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.23.1

Ссылки

Описание

In the Linux kernel, the following vulnerability has been resolved: vfio/pci: Properly hide first-in-list PCIe extended capability There are cases where a PCIe extended capability should be hidden from the user. For example, an unknown capability (i.e., capability with ID greater than PCI_EXT_CAP_ID_MAX) or a capability that is intentionally chosen to be hidden from the user. Hiding a capability is done by virtualizing and modifying the 'Next Capability Offset' field of the previous capability so it points to the capability after the one that should be hidden. The special case where the first capability in the list should be hidden is handled differently because there is no previous capability that can be modified. In this case, the capability ID and version are zeroed while leaving the next pointer intact. This hides the capability and leaves an anchor for the rest of the capability list. However, today, hiding the first capability in the list is not done properly if the capability is unknown, as struct vfio_pci_core_device->pci_config_map is set to the capability ID during initialization but the capability ID is not properly checked later when used in vfio_config_do_rw(). This leads to the following warning [1] and to an out-of-bounds access to ecap_perms array. Fix it by checking cap_id in vfio_config_do_rw(), and if it is greater than PCI_EXT_CAP_ID_MAX, use an alternative struct perm_bits for direct read only access instead of the ecap_perms array. Note that this is safe since the above is the only case where cap_id can exceed PCI_EXT_CAP_ID_MAX (except for the special capabilities, which are already checked before). [1] WARNING: CPU: 118 PID: 5329 at drivers/vfio/pci/vfio_pci_config.c:1900 vfio_pci_config_rw+0x395/0x430 [vfio_pci_core] CPU: 118 UID: 0 PID: 5329 Comm: simx-qemu-syste Not tainted 6.12.0+ #1 (snip) Call Trace: <TASK> ? show_regs+0x69/0x80 ? __warn+0x8d/0x140 ? vfio_pci_config_rw+0x395/0x430 [vfio_pci_core] ? report_bug+0x18f/0x1a0 ? handle_bug+0x63/0xa0 ? exc_invalid_op+0x19/0x70 ? asm_exc_invalid_op+0x1b/0x20 ? vfio_pci_config_rw+0x395/0x430 [vfio_pci_core] ? vfio_pci_config_rw+0x244/0x430 [vfio_pci_core] vfio_pci_rw+0x101/0x1b0 [vfio_pci_core] vfio_pci_core_read+0x1d/0x30 [vfio_pci_core] vfio_device_fops_read+0x27/0x40 [vfio] vfs_read+0xbd/0x340 ? vfio_device_fops_unl_ioctl+0xbb/0x740 [vfio] ? __rseq_handle_notify_resume+0xa4/0x4b0 __x64_sys_pread64+0x96/0xc0 x64_sys_call+0x1c3d/0x20d0 do_syscall_64+0x4d/0x120 entry_SYSCALL_64_after_hwframe+0x76/0x7e


Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_23-rt-1-150600.1.3.1
SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.23.1

Ссылки

Описание

In the Linux kernel, the following vulnerability has been resolved: svcrdma: fix miss destroy percpu_counter in svc_rdma_proc_init() There's issue as follows: RPC: Registered rdma transport module. RPC: Registered rdma backchannel transport module. RPC: Unregistered rdma transport module. RPC: Unregistered rdma backchannel transport module. BUG: unable to handle page fault for address: fffffbfff80c609a PGD 123fee067 P4D 123fee067 PUD 123fea067 PMD 10c624067 PTE 0 Oops: Oops: 0000 [#1] PREEMPT SMP KASAN NOPTI RIP: 0010:percpu_counter_destroy_many+0xf7/0x2a0 Call Trace: <TASK> __die+0x1f/0x70 page_fault_oops+0x2cd/0x860 spurious_kernel_fault+0x36/0x450 do_kern_addr_fault+0xca/0x100 exc_page_fault+0x128/0x150 asm_exc_page_fault+0x26/0x30 percpu_counter_destroy_many+0xf7/0x2a0 mmdrop+0x209/0x350 finish_task_switch.isra.0+0x481/0x840 schedule_tail+0xe/0xd0 ret_from_fork+0x23/0x80 ret_from_fork_asm+0x1a/0x30 </TASK> If register_sysctl() return NULL, then svc_rdma_proc_cleanup() will not destroy the percpu counters which init in svc_rdma_proc_init(). If CONFIG_HOTPLUG_CPU is enabled, residual nodes may be in the 'percpu_counters' list. The above issue may occur once the module is removed. If the CONFIG_HOTPLUG_CPU configuration is not enabled, memory leakage occurs. To solve above issue just destroy all percpu counters when register_sysctl() return NULL.


Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_23-rt-1-150600.1.3.1
SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.23.1

Ссылки

Описание

In the Linux kernel, the following vulnerability has been resolved: nfsd: release svc_expkey/svc_export with rcu_work The last reference for `cache_head` can be reduced to zero in `c_show` and `e_show`(using `rcu_read_lock` and `rcu_read_unlock`). Consequently, `svc_export_put` and `expkey_put` will be invoked, leading to two issues: 1. The `svc_export_put` will directly free ex_uuid. However, `e_show`/`c_show` will access `ex_uuid` after `cache_put`, which can trigger a use-after-free issue, shown below. ================================================================== BUG: KASAN: slab-use-after-free in svc_export_show+0x362/0x430 [nfsd] Read of size 1 at addr ff11000010fdc120 by task cat/870 CPU: 1 UID: 0 PID: 870 Comm: cat Not tainted 6.12.0-rc3+ #1 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.1-2.fc37 04/01/2014 Call Trace: <TASK> dump_stack_lvl+0x53/0x70 print_address_description.constprop.0+0x2c/0x3a0 print_report+0xb9/0x280 kasan_report+0xae/0xe0 svc_export_show+0x362/0x430 [nfsd] c_show+0x161/0x390 [sunrpc] seq_read_iter+0x589/0x770 seq_read+0x1e5/0x270 proc_reg_read+0xe1/0x140 vfs_read+0x125/0x530 ksys_read+0xc1/0x160 do_syscall_64+0x5f/0x170 entry_SYSCALL_64_after_hwframe+0x76/0x7e Allocated by task 830: kasan_save_stack+0x20/0x40 kasan_save_track+0x14/0x30 __kasan_kmalloc+0x8f/0xa0 __kmalloc_node_track_caller_noprof+0x1bc/0x400 kmemdup_noprof+0x22/0x50 svc_export_parse+0x8a9/0xb80 [nfsd] cache_do_downcall+0x71/0xa0 [sunrpc] cache_write_procfs+0x8e/0xd0 [sunrpc] proc_reg_write+0xe1/0x140 vfs_write+0x1a5/0x6d0 ksys_write+0xc1/0x160 do_syscall_64+0x5f/0x170 entry_SYSCALL_64_after_hwframe+0x76/0x7e Freed by task 868: kasan_save_stack+0x20/0x40 kasan_save_track+0x14/0x30 kasan_save_free_info+0x3b/0x60 __kasan_slab_free+0x37/0x50 kfree+0xf3/0x3e0 svc_export_put+0x87/0xb0 [nfsd] cache_purge+0x17f/0x1f0 [sunrpc] nfsd_destroy_serv+0x226/0x2d0 [nfsd] nfsd_svc+0x125/0x1e0 [nfsd] write_threads+0x16a/0x2a0 [nfsd] nfsctl_transaction_write+0x74/0xa0 [nfsd] vfs_write+0x1a5/0x6d0 ksys_write+0xc1/0x160 do_syscall_64+0x5f/0x170 entry_SYSCALL_64_after_hwframe+0x76/0x7e 2. We cannot sleep while using `rcu_read_lock`/`rcu_read_unlock`. However, `svc_export_put`/`expkey_put` will call path_put, which subsequently triggers a sleeping operation due to the following `dput`. ============================= WARNING: suspicious RCU usage 5.10.0-dirty #141 Not tainted ----------------------------- ... Call Trace: dump_stack+0x9a/0xd0 ___might_sleep+0x231/0x240 dput+0x39/0x600 path_put+0x1b/0x30 svc_export_put+0x17/0x80 e_show+0x1c9/0x200 seq_read_iter+0x63f/0x7c0 seq_read+0x226/0x2d0 vfs_read+0x113/0x2c0 ksys_read+0xc9/0x170 do_syscall_64+0x33/0x40 entry_SYSCALL_64_after_hwframe+0x67/0xd1 Fix these issues by using `rcu_work` to help release `svc_expkey`/`svc_export`. This approach allows for an asynchronous context to invoke `path_put` and also facilitates the freeing of `uuid/exp/key` after an RCU grace period.


Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_23-rt-1-150600.1.3.1
SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.23.1

Ссылки

Описание

In the Linux kernel, the following vulnerability has been resolved: NFSD: Prevent NULL dereference in nfsd4_process_cb_update() @ses is initialized to NULL. If __nfsd4_find_backchannel() finds no available backchannel session, setup_callback_client() will try to dereference @ses and segfault.


Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_23-rt-1-150600.1.3.1
SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.23.1

Ссылки

Описание

In the Linux kernel, the following vulnerability has been resolved: zram: fix NULL pointer in comp_algorithm_show() LTP reported a NULL pointer dereference as followed: CPU: 7 UID: 0 PID: 5995 Comm: cat Kdump: loaded Not tainted 6.12.0-rc6+ #3 Hardware name: QEMU KVM Virtual Machine, BIOS 0.0.0 02/06/2015 pstate: 40400005 (nZcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : __pi_strcmp+0x24/0x140 lr : zcomp_available_show+0x60/0x100 [zram] sp : ffff800088b93b90 x29: ffff800088b93b90 x28: 0000000000000001 x27: 0000000000400cc0 x26: 0000000000000ffe x25: ffff80007b3e2388 x24: 0000000000000000 x23: ffff80007b3e2390 x22: ffff0004041a9000 x21: ffff80007b3e2900 x20: 0000000000000000 x19: 0000000000000000 x18: 0000000000000000 x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000 x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000 x11: 0000000000000000 x10: ffff80007b3e2900 x9 : ffff80007b3cb280 x8 : 0101010101010101 x7 : 0000000000000000 x6 : 0000000000000000 x5 : 0000000000000040 x4 : 0000000000000000 x3 : 00656c722d6f7a6c x2 : 0000000000000000 x1 : ffff80007b3e2900 x0 : 0000000000000000 Call trace: __pi_strcmp+0x24/0x140 comp_algorithm_show+0x40/0x70 [zram] dev_attr_show+0x28/0x80 sysfs_kf_seq_show+0x90/0x140 kernfs_seq_show+0x34/0x48 seq_read_iter+0x1d4/0x4e8 kernfs_fop_read_iter+0x40/0x58 new_sync_read+0x9c/0x168 vfs_read+0x1a8/0x1f8 ksys_read+0x74/0x108 __arm64_sys_read+0x24/0x38 invoke_syscall+0x50/0x120 el0_svc_common.constprop.0+0xc8/0xf0 do_el0_svc+0x24/0x38 el0_svc+0x38/0x138 el0t_64_sync_handler+0xc0/0xc8 el0t_64_sync+0x188/0x190 The zram->comp_algs[ZRAM_PRIMARY_COMP] can be NULL in zram_add() if comp_algorithm_set() has not been called. User can access the zram device by sysfs after device_add_disk(), so there is a time window to trigger the NULL pointer dereference. Move it ahead device_add_disk() to make sure when user can access the zram device, it is ready. comp_algorithm_set() is protected by zram->init_lock in other places and no such problem.


Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_23-rt-1-150600.1.3.1
SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.23.1

Ссылки

Описание

In the Linux kernel, the following vulnerability has been resolved: RDMA/mlx5: Move events notifier registration to be after device registration Move pkey change work initialization and cleanup from device resources stage to notifier stage, since this is the stage which handles this work events. Fix a race between the device deregistration and pkey change work by moving MLX5_IB_STAGE_DEVICE_NOTIFIER to be after MLX5_IB_STAGE_IB_REG in order to ensure that the notifier is deregistered before the device during cleanup. Which ensures there are no works that are being executed after the device has already unregistered which can cause the panic below. BUG: kernel NULL pointer dereference, address: 0000000000000000 PGD 0 P4D 0 Oops: 0000 [#1] PREEMPT SMP PTI CPU: 1 PID: 630071 Comm: kworker/1:2 Kdump: loaded Tainted: G W OE --------- --- 5.14.0-162.6.1.el9_1.x86_64 #1 Hardware name: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS 090008 02/27/2023 Workqueue: events pkey_change_handler [mlx5_ib] RIP: 0010:setup_qp+0x38/0x1f0 [mlx5_ib] Code: ee 41 54 45 31 e4 55 89 f5 53 48 89 fb 48 83 ec 20 8b 77 08 65 48 8b 04 25 28 00 00 00 48 89 44 24 18 48 8b 07 48 8d 4c 24 16 <4c> 8b 38 49 8b 87 80 0b 00 00 4c 89 ff 48 8b 80 08 05 00 00 8b 40 RSP: 0018:ffffbcc54068be20 EFLAGS: 00010282 RAX: 0000000000000000 RBX: ffff954054494128 RCX: ffffbcc54068be36 RDX: ffff954004934000 RSI: 0000000000000001 RDI: ffff954054494128 RBP: 0000000000000023 R08: ffff954001be2c20 R09: 0000000000000001 R10: ffff954001be2c20 R11: ffff9540260133c0 R12: 0000000000000000 R13: 0000000000000023 R14: 0000000000000000 R15: ffff9540ffcb0905 FS: 0000000000000000(0000) GS:ffff9540ffc80000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000000000 CR3: 000000010625c001 CR4: 00000000003706e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: mlx5_ib_gsi_pkey_change+0x20/0x40 [mlx5_ib] process_one_work+0x1e8/0x3c0 worker_thread+0x50/0x3b0 ? rescuer_thread+0x380/0x380 kthread+0x149/0x170 ? set_kthread_struct+0x50/0x50 ret_from_fork+0x22/0x30 Modules linked in: rdma_ucm(OE) rdma_cm(OE) iw_cm(OE) ib_ipoib(OE) ib_cm(OE) ib_umad(OE) mlx5_ib(OE) mlx5_fwctl(OE) fwctl(OE) ib_uverbs(OE) mlx5_core(OE) mlxdevm(OE) ib_core(OE) mlx_compat(OE) psample mlxfw(OE) tls knem(OE) netconsole nfsv3 nfs_acl nfs lockd grace fscache netfs qrtr rfkill sunrpc intel_rapl_msr intel_rapl_common rapl hv_balloon hv_utils i2c_piix4 pcspkr joydev fuse ext4 mbcache jbd2 sr_mod sd_mod cdrom t10_pi sg ata_generic pci_hyperv pci_hyperv_intf hyperv_drm drm_shmem_helper drm_kms_helper hv_storvsc syscopyarea hv_netvsc sysfillrect sysimgblt hid_hyperv fb_sys_fops scsi_transport_fc hyperv_keyboard drm ata_piix crct10dif_pclmul crc32_pclmul crc32c_intel libata ghash_clmulni_intel hv_vmbus serio_raw [last unloaded: ib_core] CR2: 0000000000000000 ---[ end trace f6f8be4eae12f7bc ]---


Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_23-rt-1-150600.1.3.1
SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.23.1

Ссылки

Описание

In the Linux kernel, the following vulnerability has been resolved: RDMA/rxe: Fix the qp flush warnings in req When the qp is in error state, the status of WQEs in the queue should be set to error. Or else the following will appear. [ 920.617269] WARNING: CPU: 1 PID: 21 at drivers/infiniband/sw/rxe/rxe_comp.c:756 rxe_completer+0x989/0xcc0 [rdma_rxe] [ 920.617744] Modules linked in: rnbd_client(O) rtrs_client(O) rtrs_core(O) rdma_ucm rdma_cm iw_cm ib_cm crc32_generic rdma_rxe ip6_udp_tunnel udp_tunnel ib_uverbs ib_core loop brd null_blk ipv6 [ 920.618516] CPU: 1 PID: 21 Comm: ksoftirqd/1 Tainted: G O 6.1.113-storage+ #65 [ 920.618986] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014 [ 920.619396] RIP: 0010:rxe_completer+0x989/0xcc0 [rdma_rxe] [ 920.619658] Code: 0f b6 84 24 3a 02 00 00 41 89 84 24 44 04 00 00 e9 2a f7 ff ff 39 ca bb 03 00 00 00 b8 0e 00 00 00 48 0f 45 d8 e9 15 f7 ff ff <0f> 0b e9 cb f8 ff ff 41 bf f5 ff ff ff e9 08 f8 ff ff 49 8d bc 24 [ 920.620482] RSP: 0018:ffff97b7c00bbc38 EFLAGS: 00010246 [ 920.620817] RAX: 0000000000000000 RBX: 000000000000000c RCX: 0000000000000008 [ 920.621183] RDX: ffff960dc396ebc0 RSI: 0000000000005400 RDI: ffff960dc4e2fbac [ 920.621548] RBP: 0000000000000000 R08: 0000000000000001 R09: ffffffffac406450 [ 920.621884] R10: ffffffffac4060c0 R11: 0000000000000001 R12: ffff960dc4e2f800 [ 920.622254] R13: ffff960dc4e2f928 R14: ffff97b7c029c580 R15: 0000000000000000 [ 920.622609] FS: 0000000000000000(0000) GS:ffff960ef7d00000(0000) knlGS:0000000000000000 [ 920.622979] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 920.623245] CR2: 00007fa056965e90 CR3: 00000001107f1000 CR4: 00000000000006e0 [ 920.623680] Call Trace: [ 920.623815] <TASK> [ 920.623933] ? __warn+0x79/0xc0 [ 920.624116] ? rxe_completer+0x989/0xcc0 [rdma_rxe] [ 920.624356] ? report_bug+0xfb/0x150 [ 920.624594] ? handle_bug+0x3c/0x60 [ 920.624796] ? exc_invalid_op+0x14/0x70 [ 920.624976] ? asm_exc_invalid_op+0x16/0x20 [ 920.625203] ? rxe_completer+0x989/0xcc0 [rdma_rxe] [ 920.625474] ? rxe_completer+0x329/0xcc0 [rdma_rxe] [ 920.625749] rxe_do_task+0x80/0x110 [rdma_rxe] [ 920.626037] rxe_requester+0x625/0xde0 [rdma_rxe] [ 920.626310] ? rxe_cq_post+0xe2/0x180 [rdma_rxe] [ 920.626583] ? do_complete+0x18d/0x220 [rdma_rxe] [ 920.626812] ? rxe_completer+0x1a3/0xcc0 [rdma_rxe] [ 920.627050] rxe_do_task+0x80/0x110 [rdma_rxe] [ 920.627285] tasklet_action_common.constprop.0+0xa4/0x120 [ 920.627522] handle_softirqs+0xc2/0x250 [ 920.627728] ? sort_range+0x20/0x20 [ 920.627942] run_ksoftirqd+0x1f/0x30 [ 920.628158] smpboot_thread_fn+0xc7/0x1b0 [ 920.628334] kthread+0xd6/0x100 [ 920.628504] ? kthread_complete_and_exit+0x20/0x20 [ 920.628709] ret_from_fork+0x1f/0x30 [ 920.628892] </TASK>


Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_23-rt-1-150600.1.3.1
SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.23.1

Ссылки

Описание

In the Linux kernel, the following vulnerability has been resolved: erofs: handle NONHEAD !delta[1] lclusters gracefully syzbot reported a WARNING in iomap_iter_done: iomap_fiemap+0x73b/0x9b0 fs/iomap/fiemap.c:80 ioctl_fiemap fs/ioctl.c:220 [inline] Generally, NONHEAD lclusters won't have delta[1]==0, except for crafted images and filesystems created by pre-1.0 mkfs versions. Previously, it would immediately bail out if delta[1]==0, which led to inadequate decompressed lengths (thus FIEMAP is impacted). Treat it as delta[1]=1 to work around these legacy mkfs versions. `lclusterbits > 14` is illegal for compact indexes, error out too.


Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_23-rt-1-150600.1.3.1
SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.23.1

Ссылки

Описание

In the Linux kernel, the following vulnerability has been resolved: Bluetooth: fix use-after-free in device_for_each_child() Syzbot has reported the following KASAN splat: BUG: KASAN: slab-use-after-free in device_for_each_child+0x18f/0x1a0 Read of size 8 at addr ffff88801f605308 by task kbnepd bnep0/4980 CPU: 0 UID: 0 PID: 4980 Comm: kbnepd bnep0 Not tainted 6.12.0-rc4-00161-gae90f6a6170d #1 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-2.fc40 04/01/2014 Call Trace: <TASK> dump_stack_lvl+0x100/0x190 ? device_for_each_child+0x18f/0x1a0 print_report+0x13a/0x4cb ? __virt_addr_valid+0x5e/0x590 ? __phys_addr+0xc6/0x150 ? device_for_each_child+0x18f/0x1a0 kasan_report+0xda/0x110 ? device_for_each_child+0x18f/0x1a0 ? __pfx_dev_memalloc_noio+0x10/0x10 device_for_each_child+0x18f/0x1a0 ? __pfx_device_for_each_child+0x10/0x10 pm_runtime_set_memalloc_noio+0xf2/0x180 netdev_unregister_kobject+0x1ed/0x270 unregister_netdevice_many_notify+0x123c/0x1d80 ? __mutex_trylock_common+0xde/0x250 ? __pfx_unregister_netdevice_many_notify+0x10/0x10 ? trace_contention_end+0xe6/0x140 ? __mutex_lock+0x4e7/0x8f0 ? __pfx_lock_acquire.part.0+0x10/0x10 ? rcu_is_watching+0x12/0xc0 ? unregister_netdev+0x12/0x30 unregister_netdevice_queue+0x30d/0x3f0 ? __pfx_unregister_netdevice_queue+0x10/0x10 ? __pfx_down_write+0x10/0x10 unregister_netdev+0x1c/0x30 bnep_session+0x1fb3/0x2ab0 ? __pfx_bnep_session+0x10/0x10 ? __pfx_lock_release+0x10/0x10 ? __pfx_woken_wake_function+0x10/0x10 ? __kthread_parkme+0x132/0x200 ? __pfx_bnep_session+0x10/0x10 ? kthread+0x13a/0x370 ? __pfx_bnep_session+0x10/0x10 kthread+0x2b7/0x370 ? __pfx_kthread+0x10/0x10 ret_from_fork+0x48/0x80 ? __pfx_kthread+0x10/0x10 ret_from_fork_asm+0x1a/0x30 </TASK> Allocated by task 4974: kasan_save_stack+0x30/0x50 kasan_save_track+0x14/0x30 __kasan_kmalloc+0xaa/0xb0 __kmalloc_noprof+0x1d1/0x440 hci_alloc_dev_priv+0x1d/0x2820 __vhci_create_device+0xef/0x7d0 vhci_write+0x2c7/0x480 vfs_write+0x6a0/0xfc0 ksys_write+0x12f/0x260 do_syscall_64+0xc7/0x250 entry_SYSCALL_64_after_hwframe+0x77/0x7f Freed by task 4979: kasan_save_stack+0x30/0x50 kasan_save_track+0x14/0x30 kasan_save_free_info+0x3b/0x60 __kasan_slab_free+0x4f/0x70 kfree+0x141/0x490 hci_release_dev+0x4d9/0x600 bt_host_release+0x6a/0xb0 device_release+0xa4/0x240 kobject_put+0x1ec/0x5a0 put_device+0x1f/0x30 vhci_release+0x81/0xf0 __fput+0x3f6/0xb30 task_work_run+0x151/0x250 do_exit+0xa79/0x2c30 do_group_exit+0xd5/0x2a0 get_signal+0x1fcd/0x2210 arch_do_signal_or_restart+0x93/0x780 syscall_exit_to_user_mode+0x140/0x290 do_syscall_64+0xd4/0x250 entry_SYSCALL_64_after_hwframe+0x77/0x7f In 'hci_conn_del_sysfs()', 'device_unregister()' may be called when an underlying (kobject) reference counter is greater than 1. This means that reparenting (happened when the device is actually freed) is delayed and, during that delay, parent controller device (hciX) may be deleted. Since the latter may create a dangling pointer to freed parent, avoid that scenario by reparenting to NULL explicitly.


Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_23-rt-1-150600.1.3.1
SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.23.1

Ссылки

Описание

In the Linux kernel, the following vulnerability has been resolved: xen/netfront: fix crash when removing device When removing a netfront device directly after a suspend/resume cycle it might happen that the queues have not been setup again, causing a crash during the attempt to stop the queues another time. Fix that by checking the queues are existing before trying to stop them. This is XSA-465 / CVE-2024-53240.


Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_23-rt-1-150600.1.3.1
SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.23.1

Ссылки

Описание

In the Linux kernel, the following vulnerability has been resolved: x86/xen: don't do PV iret hypercall through hypercall page Instead of jumping to the Xen hypercall page for doing the iret hypercall, directly code the required sequence in xen-asm.S. This is done in preparation of no longer using hypercall page at all, as it has shown to cause problems with speculation mitigations. This is part of XSA-466 / CVE-2024-53241.


Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_23-rt-1-150600.1.3.1
SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.23.1

Ссылки

Описание

In the Linux kernel, the following vulnerability has been resolved: wifi: cw1200: Fix potential NULL dereference A recent refactoring was identified by static analysis to cause a potential NULL dereference, fix this!


Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_23-rt-1-150600.1.3.1
SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.23.1

Ссылки

Описание

In the Linux kernel, the following vulnerability has been resolved: wifi: mwifiex: Fix memcpy() field-spanning write warning in mwifiex_config_scan() Replace one-element array with a flexible-array member in `struct mwifiex_ie_types_wildcard_ssid_params` to fix the following warning on a MT8173 Chromebook (mt8173-elm-hana): [ 356.775250] ------------[ cut here ]------------ [ 356.784543] memcpy: detected field-spanning write (size 6) of single field "wildcard_ssid_tlv->ssid" at drivers/net/wireless/marvell/mwifiex/scan.c:904 (size 1) [ 356.813403] WARNING: CPU: 3 PID: 742 at drivers/net/wireless/marvell/mwifiex/scan.c:904 mwifiex_scan_networks+0x4fc/0xf28 [mwifiex] The "(size 6)" above is exactly the length of the SSID of the network this device was connected to. The source of the warning looks like: ssid_len = user_scan_in->ssid_list[i].ssid_len; [...] memcpy(wildcard_ssid_tlv->ssid, user_scan_in->ssid_list[i].ssid, ssid_len); There is a #define WILDCARD_SSID_TLV_MAX_SIZE that uses sizeof() on this struct, but it already didn't account for the size of the one-element array, so it doesn't need to be changed.


Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_23-rt-1-150600.1.3.1
SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.23.1

Ссылки

Описание

In the Linux kernel, the following vulnerability has been resolved: cachefiles: Fix NULL pointer dereference in object->file At present, the object->file has the NULL pointer dereference problem in ondemand-mode. The root cause is that the allocated fd and object->file lifetime are inconsistent, and the user-space invocation to anon_fd uses object->file. Following is the process that triggers the issue: [write fd] [umount] cachefiles_ondemand_fd_write_iter fscache_cookie_state_machine cachefiles_withdraw_cookie if (!file) return -ENOBUFS cachefiles_clean_up_object cachefiles_unmark_inode_in_use fput(object->file) object->file = NULL // file NULL pointer dereference! __cachefiles_write(..., file, ...) Fix this issue by add an additional reference count to the object->file before write/llseek, and decrement after it finished.


Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_23-rt-1-150600.1.3.1
SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.23.1

Ссылки

Описание

In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: fix usage slab after free [ +0.000021] BUG: KASAN: slab-use-after-free in drm_sched_entity_flush+0x6cb/0x7a0 [gpu_sched] [ +0.000027] Read of size 8 at addr ffff8881b8605f88 by task amd_pci_unplug/2147 [ +0.000023] CPU: 6 PID: 2147 Comm: amd_pci_unplug Not tainted 6.10.0+ #1 [ +0.000016] Hardware name: ASUS System Product Name/ROG STRIX B550-F GAMING (WI-FI), BIOS 1401 12/03/2020 [ +0.000016] Call Trace: [ +0.000008] <TASK> [ +0.000009] dump_stack_lvl+0x76/0xa0 [ +0.000017] print_report+0xce/0x5f0 [ +0.000017] ? drm_sched_entity_flush+0x6cb/0x7a0 [gpu_sched] [ +0.000019] ? srso_return_thunk+0x5/0x5f [ +0.000015] ? kasan_complete_mode_report_info+0x72/0x200 [ +0.000016] ? drm_sched_entity_flush+0x6cb/0x7a0 [gpu_sched] [ +0.000019] kasan_report+0xbe/0x110 [ +0.000015] ? drm_sched_entity_flush+0x6cb/0x7a0 [gpu_sched] [ +0.000023] __asan_report_load8_noabort+0x14/0x30 [ +0.000014] drm_sched_entity_flush+0x6cb/0x7a0 [gpu_sched] [ +0.000020] ? srso_return_thunk+0x5/0x5f [ +0.000013] ? __kasan_check_write+0x14/0x30 [ +0.000016] ? __pfx_drm_sched_entity_flush+0x10/0x10 [gpu_sched] [ +0.000020] ? srso_return_thunk+0x5/0x5f [ +0.000013] ? __kasan_check_write+0x14/0x30 [ +0.000013] ? srso_return_thunk+0x5/0x5f [ +0.000013] ? enable_work+0x124/0x220 [ +0.000015] ? __pfx_enable_work+0x10/0x10 [ +0.000013] ? srso_return_thunk+0x5/0x5f [ +0.000014] ? free_large_kmalloc+0x85/0xf0 [ +0.000016] drm_sched_entity_destroy+0x18/0x30 [gpu_sched] [ +0.000020] amdgpu_vce_sw_fini+0x55/0x170 [amdgpu] [ +0.000735] ? __kasan_check_read+0x11/0x20 [ +0.000016] vce_v4_0_sw_fini+0x80/0x110 [amdgpu] [ +0.000726] amdgpu_device_fini_sw+0x331/0xfc0 [amdgpu] [ +0.000679] ? mutex_unlock+0x80/0xe0 [ +0.000017] ? __pfx_amdgpu_device_fini_sw+0x10/0x10 [amdgpu] [ +0.000662] ? srso_return_thunk+0x5/0x5f [ +0.000014] ? __kasan_check_write+0x14/0x30 [ +0.000013] ? srso_return_thunk+0x5/0x5f [ +0.000013] ? mutex_unlock+0x80/0xe0 [ +0.000016] amdgpu_driver_release_kms+0x16/0x80 [amdgpu] [ +0.000663] drm_minor_release+0xc9/0x140 [drm] [ +0.000081] drm_release+0x1fd/0x390 [drm] [ +0.000082] __fput+0x36c/0xad0 [ +0.000018] __fput_sync+0x3c/0x50 [ +0.000014] __x64_sys_close+0x7d/0xe0 [ +0.000014] x64_sys_call+0x1bc6/0x2680 [ +0.000014] do_syscall_64+0x70/0x130 [ +0.000014] ? srso_return_thunk+0x5/0x5f [ +0.000014] ? irqentry_exit_to_user_mode+0x60/0x190 [ +0.000015] ? srso_return_thunk+0x5/0x5f [ +0.000014] ? irqentry_exit+0x43/0x50 [ +0.000012] ? srso_return_thunk+0x5/0x5f [ +0.000013] ? exc_page_fault+0x7c/0x110 [ +0.000015] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ +0.000014] RIP: 0033:0x7ffff7b14f67 [ +0.000013] Code: ff e8 0d 16 02 00 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 f3 0f 1e fa 64 8b 04 25 18 00 00 00 85 c0 75 10 b8 03 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 41 c3 48 83 ec 18 89 7c 24 0c e8 73 ba f7 ff [ +0.000026] RSP: 002b:00007fffffffe378 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ +0.000019] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ffff7b14f67 [ +0.000014] RDX: 0000000000000000 RSI: 00007ffff7f6f47a RDI: 0000000000000003 [ +0.000014] RBP: 00007fffffffe3a0 R08: 0000555555569890 R09: 0000000000000000 [ +0.000014] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fffffffe5c8 [ +0.000013] R13: 00005555555552a9 R14: 0000555555557d48 R15: 00007ffff7ffd040 [ +0.000020] </TASK> [ +0.000016] Allocated by task 383 on cpu 7 at 26.880319s: [ +0.000014] kasan_save_stack+0x28/0x60 [ +0.000008] kasan_save_track+0x18/0x70 [ +0.000007] kasan_save_alloc_info+0x38/0x60 [ +0.000007] __kasan_kmalloc+0xc1/0xd0 [ +0.000007] kmalloc_trace_noprof+0x180/0x380 [ +0.000007] drm_sched_init+0x411/0xec0 [gpu_sched] [ +0.000012] amdgpu_device_init+0x695f/0xa610 [amdgpu] [ +0.000658] amdgpu_driver_load_kms+0x1a/0x120 [amdgpu] [ +0.000662] amdgpu_pci_p ---truncated---


Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_23-rt-1-150600.1.3.1
SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.23.1

Ссылки

Описание

In the Linux kernel, the following vulnerability has been resolved: i3c: master: Fix miss free init_dyn_addr at i3c_master_put_i3c_addrs() if (dev->boardinfo && dev->boardinfo->init_dyn_addr) ^^^ here check "init_dyn_addr" i3c_bus_set_addr_slot_status(&master->bus, dev->info.dyn_addr, ...) ^^^^ free "dyn_addr" Fix copy/paste error "dyn_addr" by replacing it with "init_dyn_addr".


Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_23-rt-1-150600.1.3.1
SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.23.1

Ссылки

Описание

In the Linux kernel, the following vulnerability has been resolved: mm/slub: Avoid list corruption when removing a slab from the full list Boot with slub_debug=UFPZ. If allocated object failed in alloc_consistency_checks, all objects of the slab will be marked as used, and then the slab will be removed from the partial list. When an object belonging to the slab got freed later, the remove_full() function is called. Because the slab is neither on the partial list nor on the full list, it eventually lead to a list corruption (actually a list poison being detected). So we need to mark and isolate the slab page with metadata corruption, do not put it back in circulation. Because the debug caches avoid all the fastpaths, reusing the frozen bit to mark slab page with metadata corruption seems to be fine. [ 4277.385669] list_del corruption, ffffea00044b3e50->next is LIST_POISON1 (dead000000000100) [ 4277.387023] ------------[ cut here ]------------ [ 4277.387880] kernel BUG at lib/list_debug.c:56! [ 4277.388680] invalid opcode: 0000 [#1] PREEMPT SMP PTI [ 4277.389562] CPU: 5 PID: 90 Comm: kworker/5:1 Kdump: loaded Tainted: G OE 6.6.1-1 #1 [ 4277.392113] Workqueue: xfs-inodegc/vda1 xfs_inodegc_worker [xfs] [ 4277.393551] RIP: 0010:__list_del_entry_valid_or_report+0x7b/0xc0 [ 4277.394518] Code: 48 91 82 e8 37 f9 9a ff 0f 0b 48 89 fe 48 c7 c7 28 49 91 82 e8 26 f9 9a ff 0f 0b 48 89 fe 48 c7 c7 58 49 91 [ 4277.397292] RSP: 0018:ffffc90000333b38 EFLAGS: 00010082 [ 4277.398202] RAX: 000000000000004e RBX: ffffea00044b3e50 RCX: 0000000000000000 [ 4277.399340] RDX: 0000000000000002 RSI: ffffffff828f8715 RDI: 00000000ffffffff [ 4277.400545] RBP: ffffea00044b3e40 R08: 0000000000000000 R09: ffffc900003339f0 [ 4277.401710] R10: 0000000000000003 R11: ffffffff82d44088 R12: ffff888112cf9910 [ 4277.402887] R13: 0000000000000001 R14: 0000000000000001 R15: ffff8881000424c0 [ 4277.404049] FS: 0000000000000000(0000) GS:ffff88842fd40000(0000) knlGS:0000000000000000 [ 4277.405357] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 4277.406389] CR2: 00007f2ad0b24000 CR3: 0000000102a3a006 CR4: 00000000007706e0 [ 4277.407589] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 4277.408780] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 4277.410000] PKRU: 55555554 [ 4277.410645] Call Trace: [ 4277.411234] <TASK> [ 4277.411777] ? die+0x32/0x80 [ 4277.412439] ? do_trap+0xd6/0x100 [ 4277.413150] ? __list_del_entry_valid_or_report+0x7b/0xc0 [ 4277.414158] ? do_error_trap+0x6a/0x90 [ 4277.414948] ? __list_del_entry_valid_or_report+0x7b/0xc0 [ 4277.415915] ? exc_invalid_op+0x4c/0x60 [ 4277.416710] ? __list_del_entry_valid_or_report+0x7b/0xc0 [ 4277.417675] ? asm_exc_invalid_op+0x16/0x20 [ 4277.418482] ? __list_del_entry_valid_or_report+0x7b/0xc0 [ 4277.419466] ? __list_del_entry_valid_or_report+0x7b/0xc0 [ 4277.420410] free_to_partial_list+0x515/0x5e0 [ 4277.421242] ? xfs_iext_remove+0x41a/0xa10 [xfs] [ 4277.422298] xfs_iext_remove+0x41a/0xa10 [xfs] [ 4277.423316] ? xfs_inodegc_worker+0xb4/0x1a0 [xfs] [ 4277.424383] xfs_bmap_del_extent_delay+0x4fe/0x7d0 [xfs] [ 4277.425490] __xfs_bunmapi+0x50d/0x840 [xfs] [ 4277.426445] xfs_itruncate_extents_flags+0x13a/0x490 [xfs] [ 4277.427553] xfs_inactive_truncate+0xa3/0x120 [xfs] [ 4277.428567] xfs_inactive+0x22d/0x290 [xfs] [ 4277.429500] xfs_inodegc_worker+0xb4/0x1a0 [xfs] [ 4277.430479] process_one_work+0x171/0x340 [ 4277.431227] worker_thread+0x277/0x390 [ 4277.431962] ? __pfx_worker_thread+0x10/0x10 [ 4277.432752] kthread+0xf0/0x120 [ 4277.433382] ? __pfx_kthread+0x10/0x10 [ 4277.434134] ret_from_fork+0x2d/0x50 [ 4277.434837] ? __pfx_kthread+0x10/0x10 [ 4277.435566] ret_from_fork_asm+0x1b/0x30 [ 4277.436280] </TASK>


Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_23-rt-1-150600.1.3.1
SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.23.1

Ссылки

Описание

In the Linux kernel, the following vulnerability has been resolved: ad7780: fix division by zero in ad7780_write_raw() In the ad7780_write_raw() , val2 can be zero, which might lead to a division by zero error in DIV_ROUND_CLOSEST(). The ad7780_write_raw() is based on iio_info's write_raw. While val is explicitly declared that can be zero (in read mode), val2 is not specified to be non-zero.


Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_23-rt-1-150600.1.3.1
SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.23.1

Ссылки

Описание

In the Linux kernel, the following vulnerability has been resolved: media: i2c: tc358743: Fix crash in the probe error path when using polling If an error occurs in the probe() function, we should remove the polling timer that was alarmed earlier, otherwise the timer is called with arguments that are already freed, which results in a crash. ------------[ cut here ]------------ WARNING: CPU: 3 PID: 0 at kernel/time/timer.c:1830 __run_timers+0x244/0x268 Modules linked in: CPU: 3 UID: 0 PID: 0 Comm: swapper/3 Not tainted 6.11.0 #226 Hardware name: Diasom DS-RK3568-SOM-EVB (DT) pstate: 804000c9 (Nzcv daIF +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : __run_timers+0x244/0x268 lr : __run_timers+0x1d4/0x268 sp : ffffff80eff2baf0 x29: ffffff80eff2bb50 x28: 7fffffffffffffff x27: ffffff80eff2bb00 x26: ffffffc080f669c0 x25: ffffff80efef6bf0 x24: ffffff80eff2bb00 x23: 0000000000000000 x22: dead000000000122 x21: 0000000000000000 x20: ffffff80efef6b80 x19: ffffff80041c8bf8 x18: ffffffffffffffff x17: ffffffc06f146000 x16: ffffff80eff27dc0 x15: 000000000000003e x14: 0000000000000000 x13: 00000000000054da x12: 0000000000000000 x11: 00000000000639c0 x10: 000000000000000c x9 : 0000000000000009 x8 : ffffff80eff2cb40 x7 : ffffff80eff2cb40 x6 : ffffff8002bee480 x5 : ffffffc080cb2220 x4 : ffffffc080cb2150 x3 : 00000000000f4240 x2 : 0000000000000102 x1 : ffffff80eff2bb00 x0 : ffffff80041c8bf0 Call trace: __run_timers+0x244/0x268 timer_expire_remote+0x50/0x68 tmigr_handle_remote+0x388/0x39c run_timer_softirq+0x38/0x44 handle_softirqs+0x138/0x298 __do_softirq+0x14/0x20 ____do_softirq+0x10/0x1c call_on_irq_stack+0x24/0x4c do_softirq_own_stack+0x1c/0x2c irq_exit_rcu+0x9c/0xcc el1_interrupt+0x48/0xc0 el1h_64_irq_handler+0x18/0x24 el1h_64_irq+0x7c/0x80 default_idle_call+0x34/0x68 do_idle+0x23c/0x294 cpu_startup_entry+0x38/0x3c secondary_start_kernel+0x128/0x160 __secondary_switched+0xb8/0xbc ---[ end trace 0000000000000000 ]---


Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_23-rt-1-150600.1.3.1
SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.23.1

Ссылки

Описание

In the Linux kernel, the following vulnerability has been resolved: btrfs: fix use-after-free in btrfs_encoded_read_endio() Shinichiro reported the following use-after free that sometimes is happening in our CI system when running fstests' btrfs/284 on a TCMU runner device: BUG: KASAN: slab-use-after-free in lock_release+0x708/0x780 Read of size 8 at addr ffff888106a83f18 by task kworker/u80:6/219 CPU: 8 UID: 0 PID: 219 Comm: kworker/u80:6 Not tainted 6.12.0-rc6-kts+ #15 Hardware name: Supermicro Super Server/X11SPi-TF, BIOS 3.3 02/21/2020 Workqueue: btrfs-endio btrfs_end_bio_work [btrfs] Call Trace: <TASK> dump_stack_lvl+0x6e/0xa0 ? lock_release+0x708/0x780 print_report+0x174/0x505 ? lock_release+0x708/0x780 ? __virt_addr_valid+0x224/0x410 ? lock_release+0x708/0x780 kasan_report+0xda/0x1b0 ? lock_release+0x708/0x780 ? __wake_up+0x44/0x60 lock_release+0x708/0x780 ? __pfx_lock_release+0x10/0x10 ? __pfx_do_raw_spin_lock+0x10/0x10 ? lock_is_held_type+0x9a/0x110 _raw_spin_unlock_irqrestore+0x1f/0x60 __wake_up+0x44/0x60 btrfs_encoded_read_endio+0x14b/0x190 [btrfs] btrfs_check_read_bio+0x8d9/0x1360 [btrfs] ? lock_release+0x1b0/0x780 ? trace_lock_acquire+0x12f/0x1a0 ? __pfx_btrfs_check_read_bio+0x10/0x10 [btrfs] ? process_one_work+0x7e3/0x1460 ? lock_acquire+0x31/0xc0 ? process_one_work+0x7e3/0x1460 process_one_work+0x85c/0x1460 ? __pfx_process_one_work+0x10/0x10 ? assign_work+0x16c/0x240 worker_thread+0x5e6/0xfc0 ? __pfx_worker_thread+0x10/0x10 kthread+0x2c3/0x3a0 ? __pfx_kthread+0x10/0x10 ret_from_fork+0x31/0x70 ? __pfx_kthread+0x10/0x10 ret_from_fork_asm+0x1a/0x30 </TASK> Allocated by task 3661: kasan_save_stack+0x30/0x50 kasan_save_track+0x14/0x30 __kasan_kmalloc+0xaa/0xb0 btrfs_encoded_read_regular_fill_pages+0x16c/0x6d0 [btrfs] send_extent_data+0xf0f/0x24a0 [btrfs] process_extent+0x48a/0x1830 [btrfs] changed_cb+0x178b/0x2ea0 [btrfs] btrfs_ioctl_send+0x3bf9/0x5c20 [btrfs] _btrfs_ioctl_send+0x117/0x330 [btrfs] btrfs_ioctl+0x184a/0x60a0 [btrfs] __x64_sys_ioctl+0x12e/0x1a0 do_syscall_64+0x95/0x180 entry_SYSCALL_64_after_hwframe+0x76/0x7e Freed by task 3661: kasan_save_stack+0x30/0x50 kasan_save_track+0x14/0x30 kasan_save_free_info+0x3b/0x70 __kasan_slab_free+0x4f/0x70 kfree+0x143/0x490 btrfs_encoded_read_regular_fill_pages+0x531/0x6d0 [btrfs] send_extent_data+0xf0f/0x24a0 [btrfs] process_extent+0x48a/0x1830 [btrfs] changed_cb+0x178b/0x2ea0 [btrfs] btrfs_ioctl_send+0x3bf9/0x5c20 [btrfs] _btrfs_ioctl_send+0x117/0x330 [btrfs] btrfs_ioctl+0x184a/0x60a0 [btrfs] __x64_sys_ioctl+0x12e/0x1a0 do_syscall_64+0x95/0x180 entry_SYSCALL_64_after_hwframe+0x76/0x7e The buggy address belongs to the object at ffff888106a83f00 which belongs to the cache kmalloc-rnd-07-96 of size 96 The buggy address is located 24 bytes inside of freed 96-byte region [ffff888106a83f00, ffff888106a83f60) The buggy address belongs to the physical page: page: refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff888106a83800 pfn:0x106a83 flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff) page_type: f5(slab) raw: 0017ffffc0000000 ffff888100053680 ffffea0004917200 0000000000000004 raw: ffff888106a83800 0000000080200019 00000001f5000000 0000000000000000 page dumped because: kasan: bad access detected Memory state around the buggy address: ffff888106a83e00: fa fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc ffff888106a83e80: fa fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc >ffff888106a83f00: fa fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc ^ ffff888106a83f80: fa fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc ffff888106a84000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ================================================================== Further analyzing the trace and ---truncated---


Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_23-rt-1-150600.1.3.1
SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.23.1

Ссылки

Описание

In the Linux kernel, the following vulnerability has been resolved: wifi: ath10k: avoid NULL pointer error during sdio remove When running 'rmmod ath10k', ath10k_sdio_remove() will free sdio workqueue by destroy_workqueue(). But if CONFIG_INIT_ON_FREE_DEFAULT_ON is set to yes, kernel panic will happen: Call trace: destroy_workqueue+0x1c/0x258 ath10k_sdio_remove+0x84/0x94 sdio_bus_remove+0x50/0x16c device_release_driver_internal+0x188/0x25c device_driver_detach+0x20/0x2c This is because during 'rmmod ath10k', ath10k_sdio_remove() will call ath10k_core_destroy() before destroy_workqueue(). wiphy_dev_release() will finally be called in ath10k_core_destroy(). This function will free struct cfg80211_registered_device *rdev and all its members, including wiphy, dev and the pointer of sdio workqueue. Then the pointer of sdio workqueue will be set to NULL due to CONFIG_INIT_ON_FREE_DEFAULT_ON. After device release, destroy_workqueue() will use NULL pointer then the kernel panic happen. Call trace: ath10k_sdio_remove ->ath10k_core_unregister …… ->ath10k_core_stop ->ath10k_hif_stop ->ath10k_sdio_irq_disable ->ath10k_hif_power_down ->del_timer_sync(&ar_sdio->sleep_timer) ->ath10k_core_destroy ->ath10k_mac_destroy ->ieee80211_free_hw ->wiphy_free …… ->wiphy_dev_release ->destroy_workqueue Need to call destroy_workqueue() before ath10k_core_destroy(), free the work queue buffer first and then free pointer of work queue by ath10k_core_destroy(). This order matches the error path order in ath10k_sdio_probe(). No work will be queued on sdio workqueue between it is destroyed and ath10k_core_destroy() is called. Based on the call_stack above, the reason is: Only ath10k_sdio_sleep_timer_handler(), ath10k_sdio_hif_tx_sg() and ath10k_sdio_irq_disable() will queue work on sdio workqueue. Sleep timer will be deleted before ath10k_core_destroy() in ath10k_hif_power_down(). ath10k_sdio_irq_disable() only be called in ath10k_hif_stop(). ath10k_core_unregister() will call ath10k_hif_power_down() to stop hif bus, so ath10k_sdio_hif_tx_sg() won't be called anymore. Tested-on: QCA6174 hw3.2 SDIO WLAN.RMH.4.4.1-00189


Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_23-rt-1-150600.1.3.1
SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.23.1

Ссылки

Описание

In the Linux kernel, the following vulnerability has been resolved: Bluetooth: RFCOMM: avoid leaving dangling sk pointer in rfcomm_sock_alloc() bt_sock_alloc() attaches allocated sk object to the provided sock object. If rfcomm_dlc_alloc() fails, we release the sk object, but leave the dangling pointer in the sock object, which may cause use-after-free. Fix this by swapping calls to bt_sock_alloc() and rfcomm_dlc_alloc().


Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_23-rt-1-150600.1.3.1
SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.23.1

Ссылки

Описание

In the Linux kernel, the following vulnerability has been resolved: Bluetooth: L2CAP: do not leave dangling sk pointer on error in l2cap_sock_create() bt_sock_alloc() allocates the sk object and attaches it to the provided sock object. On error l2cap_sock_alloc() frees the sk object, but the dangling pointer is still attached to the sock object, which may create use-after-free in other code.


Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_23-rt-1-150600.1.3.1
SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.23.1

Ссылки

Описание

In the Linux kernel, the following vulnerability has been resolved: can: j1939: j1939_session_new(): fix skb reference counting Since j1939_session_skb_queue() does an extra skb_get() for each new skb, do the same for the initial one in j1939_session_new() to avoid refcount underflow. [mkl: clean up commit message]


Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_23-rt-1-150600.1.3.1
SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.23.1

Ссылки

Описание

In the Linux kernel, the following vulnerability has been resolved: drm/i915: Fix NULL pointer dereference in capture_engine When the intel_context structure contains NULL, it raises a NULL pointer dereference error in drm_info(). (cherry picked from commit 754302a5bc1bd8fd3b7d85c168b0a1af6d4bba4d)


Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_23-rt-1-150600.1.3.1
SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.23.1

Ссылки

Описание

** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.


Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_23-rt-1-150600.1.3.1
SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.23.1

Ссылки

Описание

In the Linux kernel, the following vulnerability has been resolved: crypto: caam - Fix the pointer passed to caam_qi_shutdown() The type of the last parameter given to devm_add_action_or_reset() is "struct caam_drv_private *", but in caam_qi_shutdown(), it is casted to "struct device *". Pass the correct parameter to devm_add_action_or_reset() so that the resources are released as expected.


Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_23-rt-1-150600.1.3.1
SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.23.1

Ссылки

Описание

In the Linux kernel, the following vulnerability has been resolved: netfs/fscache: Add a memory barrier for FSCACHE_VOLUME_CREATING In fscache_create_volume(), there is a missing memory barrier between the bit-clearing operation and the wake-up operation. This may cause a situation where, after a wake-up, the bit-clearing operation hasn't been detected yet, leading to an indefinite wait. The triggering process is as follows: [cookie1] [cookie2] [volume_work] fscache_perform_lookup fscache_create_volume fscache_perform_lookup fscache_create_volume fscache_create_volume_work cachefiles_acquire_volume clear_and_wake_up_bit test_and_set_bit test_and_set_bit goto maybe_wait goto no_wait In the above process, cookie1 and cookie2 has the same volume. When cookie1 enters the -no_wait- process, it will clear the bit and wake up the waiting process. If a barrier is missing, it may cause cookie2 to remain in the -wait- process indefinitely. In commit 3288666c7256 ("fscache: Use clear_and_wake_up_bit() in fscache_create_volume_work()"), barriers were added to similar operations in fscache_create_volume_work(), but fscache_create_volume() was missed. By combining the clear and wake operations into clear_and_wake_up_bit() to fix this issue.


Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_23-rt-1-150600.1.3.1
SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.23.1

Ссылки

Описание

In the Linux kernel, the following vulnerability has been resolved: nvme-pci: fix freeing of the HMB descriptor table The HMB descriptor table is sized to the maximum number of descriptors that could be used for a given device, but __nvme_alloc_host_mem could break out of the loop earlier on memory allocation failure and end up using less descriptors than planned for, which leads to an incorrect size passed to dma_free_coherent. In practice this was not showing up because the number of descriptors tends to be low and the dma coherent allocator always allocates and frees at least a page.


Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_23-rt-1-150600.1.3.1
SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.23.1

Ссылки

Описание

BlueZ HID over GATT Profile Improper Access Control Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of BlueZ. Authentication is not required to exploit this vulnerability. The specific flaw exists within the implementation of the HID over GATT Profile. The issue results from the lack of authorization prior to allowing access to functionality. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-25177.


Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_23-rt-1-150600.1.3.1
SUSE Real Time Module 15 SP6:cluster-md-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:dlm-kmp-rt-6.4.0-150600.10.23.1
SUSE Real Time Module 15 SP6:gfs2-kmp-rt-6.4.0-150600.10.23.1

Ссылки
Уязвимость SUSE-SU-2025:0153-1