ALT-BU-2023-8347-2
Branch p9 update bulletin.
Package kernel-image-un-def updated to version 5.10.205-alt1 for branch p9 in task 336931.
Closed vulnerabilities
Modified: 2025-08-19
BDU:2023-08958
Уязвимость функции nft_pipapo_walk() в модуле net/netfilter/nft_set_pipapo.c подсистемы Netfilter ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации и повысить свои привилегии в системе
Modified: 2025-08-19
BDU:2023-09022
Уязвимость функции igmp_start_timer() в модуле net/ipv4/igmp.c реализации протокола IGMP ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации и повысить свои привилегии в системе
Modified: 2025-10-24
BDU:2024-03940
Уязвимость функции aqc111_rx_fixup() драйвера адаптера Aquantia AQtion USB ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-10-24
BDU:2024-06906
Уязвимость компонента drm/amdgpu ядра операционной системы Linux, связанная с ошибками разыменования указателя, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2026-04-09
BDU:2024-06907
Уязвимость ядра операционной системы Linux, связанная с неправильным побитовым смещением целого числа, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
Modified: 2025-10-24
BDU:2024-06908
Уязвимость функций fc_lport_ptp_setup() fc_lport_ptp_setup(), fc_rport_create(), fc_rport_create(), fc_rport_create() ядра операционной системы Linux, связанная с ошибками разыменования указателя, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-10-24
BDU:2024-06910
Уязвимость компонента drm/amd/display ядра операционной системы Linux, связанная с ошибками разыменования указателя, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2026-01-20
BDU:2024-06927
Уязвимость компонента net/wireless/nl80211.c ядра операционной системы Linux, связанная с неправильным ограничением потребления энергии, позволяющая нарушителю получить доступ к конфиденциальным данным, а также вызвать отказ в обслуживании
Modified: 2024-11-12
BDU:2024-06931
Уязвимость компонента drivers/media/test-drivers/vidtv/vidtv_psi.c ядра операционной системы Linux, связанная с ошибками разыменования указателя, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-10-24
BDU:2024-06978
Уязвимость функции компонента ALSA ядра операционной системы Linux, связанная с ошибками разыменования указателя, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-12
BDU:2024-06983
Уязвимость компонента fs/pstore/platform.c ядра операционной системы Linux, связанная с ошибками разыменования указателя, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-10-24
BDU:2024-06986
Уязвимость ядра операционной системы Linux, связанная с ошибками разыменования указателя, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-12
BDU:2024-06987
Уязвимость компонента drivers/clk/mediatek/clk-mt7629.c ядра операционной системы Linux, связанная с ошибками разыменования указателя, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-04-29
BDU:2024-09707
Уязвимость компонентов io_uring/af_unix ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-12-03
BDU:2024-10197
Уязвимость компонента dwc2 ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-12-03
BDU:2024-10202
Уязвимость компонента hwmon ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-12-03
BDU:2024-10203
Уязвимость компонента padata ядра операционной системы Linux, позволяющая нарушителю повысить привилегии в системе
Modified: 2024-12-03
BDU:2024-10204
Уязвимость компонента cp2112 ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-08-19
BDU:2024-10206
Уязвимость функции bttv_remove() в модуле drivers/media/pci/bt8xx/bttv-driver.c компонента bttv ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
Modified: 2024-12-03
BDU:2024-10207
Уязвимость компонента hsr ядра операционной системы Linux, позволяющая нарушителю повысить привилегии в системе
Modified: 2025-01-10
BDU:2024-10230
Уязвимость компонента mux ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-01-10
BDU:2024-10252
Уязвимость компонента imsttfb ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-10-24
BDU:2024-10253
Уязвимость компонентов locking/ww_mutex/test ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-08-19
BDU:2024-10254
Уязвимость компонента Input ядра операционной системы Linux, позволяющая нарушителю повысить привилегии в системе
Modified: 2025-10-24
BDU:2024-10255
Уязвимость компонентов perf/core ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-10-24
BDU:2024-10257
Уязвимость компонента btusb ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-08-19
BDU:2024-10258
Уязвимость компонента tipc ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-01-10
BDU:2024-10265
Уязвимость компонента llc ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-01-10
BDU:2024-10398
Уязвимость функции qcom_llcc_probe() компонента llcc ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-01-10
BDU:2024-10403
Уязвимость функций clk_mt6765_apmixed_probe(), clk_mt6765_top_probe() и clk_mt6765_ifr_probe() компонента clk-mt6765 ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-01-10
BDU:2024-10412
Уязвимость функции sprintf() ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-10-24
BDU:2024-10414
Уязвимость компонента bpf ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-08-19
BDU:2024-10416
Уязвимость функции wmi_char_open() ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-10-24
BDU:2024-10417
Уязвимость драйвера компонента imon (drivers/media/rc/imon.c) ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-01-10
BDU:2024-10458
Уязвимость драйвера графического процессора radeon (drivers/gpu/drm/radeon/evergreen.c) ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-01-10
BDU:2024-10462
Уязвимость функций mtk_topckgen_init(), mtk_infrasys_init_early() и mtk_infrasys_init() компонента clk-mt6797 ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-10-24
BDU:2024-10490
Уязвимость компонентов drm/panel/panel-tpo-tpg110 ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-01-24
BDU:2024-10496
Уязвимость компонента clk-mt6779 ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-10-24
BDU:2024-10503
Уязвимость компонента f2fs ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-10-24
BDU:2024-10504
Уязвимость компонента arm64 ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-10-24
BDU:2024-10505
Уязвимость компонента jfs ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-10-24
BDU:2024-10508
Уязвимость компонента crypto ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-10-24
BDU:2024-10515
Уязвимость компонентов drm/amd ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-10-24
BDU:2024-10516
Уязвимость компонентов drm/amd ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-01-24
BDU:2024-10520
Уязвимость компонента clk-mt7629-eth ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-05-06
BDU:2024-10521
Уязвимость компонента tracing ядра операционной системы Linux, позволяющая нарушителю повысить привилегии в системе
Modified: 2025-01-24
BDU:2024-10523
Уязвимость компонента clk-mt2701 ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-04-29
BDU:2024-10660
Уязвимость компонента tcp ядра операционной системы Linux, позволяющая нарушителю выполнить атаку методом подмены
BDU:2025-07410
Уязвимость функции ath11k_wmi_pdev_dfs_radar_detected_event() модуля drivers/net/wireless/ath/ath11k/wmi.c - драйвера поддержки адаптеров беспроводной связи Atheros/Qualcomm ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2025-07713
Уязвимость компонента s390/dasd ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2025-07714
Уязвимость компонента net/smc ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на целостность данных
BDU:2025-07716
Уязвимость функции usb_get_bos_descriptor() компонента drivers/usb/core/config.c ядра операционной системы Linux, позволяющая нарушителю получить доступ к конфиденциальным данным
Modified: 2025-10-24
BDU:2025-10571
Уязвимость функции vcc_probe() модуля drivers/tty/vcc.c - драйвера поддержки консоли TTY ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-10-29
BDU:2025-12483
Уязвимость компонента drm/panel ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2025-15326
Уязвимость функции set_flicker() модуля drivers/media/usb/gspca/cpia1.c - драйвера поддержки мультимедийных устройств USB ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2025-15327
Уязвимость функции bond_setup_by_slave() модуля drivers/net/bonding/bond_main.c - драйвера поддержки сетевых адаптеров ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2025-15328
Уязвимость функции rpc_clnt_remove_pipedir() модуля net/sunrpc/clnt.c реализации протокола RPC ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2025-15329
Уязвимость функции i2c_dev_irq_from_resources() модуля drivers/i2c/i2c-core.h - драйвера поддержки I2C ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2025-15330
Уязвимость функции ath11k_htt_pktlog() модуля drivers/net/wireless/ath/ath11k/dp_rx.c - драйвера поддержки адаптеров беспроводной связи Atheros/Qualcomm ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2025-15341
Уязвимость функции ipvlan_addr_lookup() модуля drivers/net/ipvlan/ipvlan_core.c - драйвера поддержки сетевых адаптеров ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2025-15349
Уязвимость функции dbAllocCtl() модуля fs/jfs/jfs_dmap.c поддержки файловой системы JFS ядра операционной системы Linux, позволяющая нарушителю получить доступ к защищаемой информации или вызвать отказ в обслуживании
BDU:2025-15387
Уязвимость функции dbMount() модуля fs/jfs/jfs_dmap.c поддержки файловой системы JFS ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-09-18
CVE-2023-52654
In the Linux kernel, the following vulnerability has been resolved: io_uring/af_unix: disable sending io_uring over sockets File reference cycles have caused lots of problems for io_uring in the past, and it still doesn't work exactly right and races with unix_stream_read_generic(). The safest fix would be to completely disallow sending io_uring files via sockets via SCM_RIGHT, so there are no possible cycles invloving registered files and thus rendering SCM accounting on the io_uring side unnecessary.
- https://git.kernel.org/stable/c/18824f592aad4124d79751bbc1500ea86ac3ff29
- https://git.kernel.org/stable/c/3fe1ea5f921bf5b71cbfdc4469fb96c05936610e
- https://git.kernel.org/stable/c/5a33d385eb36991a91e3dddb189d8679e2aac2be
- https://git.kernel.org/stable/c/705318a99a138c29a512a72c3e0043b3cd7f55f4
- https://git.kernel.org/stable/c/bcedd497b3b4a0be56f3adf7c7542720eced0792
- https://git.kernel.org/stable/c/f2f57f51b53be153a522300454ddb3887722fb2c
- https://git.kernel.org/stable/c/18824f592aad4124d79751bbc1500ea86ac3ff29
- https://git.kernel.org/stable/c/3fe1ea5f921bf5b71cbfdc4469fb96c05936610e
- https://git.kernel.org/stable/c/5a33d385eb36991a91e3dddb189d8679e2aac2be
- https://git.kernel.org/stable/c/705318a99a138c29a512a72c3e0043b3cd7f55f4
- https://git.kernel.org/stable/c/bcedd497b3b4a0be56f3adf7c7542720eced0792
- https://git.kernel.org/stable/c/f2f57f51b53be153a522300454ddb3887722fb2c
Modified: 2025-09-18
CVE-2023-52655
In the Linux kernel, the following vulnerability has been resolved: usb: aqc111: check packet for fixup for true limit If a device sends a packet that is inbetween 0 and sizeof(u64) the value passed to skb_trim() as length will wrap around ending up as some very large value. The driver will then proceed to parse the header located at that position, which will either oops or process some random value. The fix is to check against sizeof(u64) rather than 0, which the driver currently does. The issue exists since the introduction of the driver.
- https://git.kernel.org/stable/c/2ebf775f0541ae0d474836fa0cf3220e502f8e3e
- https://git.kernel.org/stable/c/46412b2fb1f9cc895d6d4036bf24f640b5d86dab
- https://git.kernel.org/stable/c/82c386d73689a45d5ee8c1290827bce64056dddd
- https://git.kernel.org/stable/c/84f2e5b3e70f08fce3cb1ff73414631c5e490204
- https://git.kernel.org/stable/c/ccab434e674ca95d483788b1895a70c21b7f016a
- https://git.kernel.org/stable/c/d69581c17608d81824dd497d9a54b6a5b6139975
- https://git.kernel.org/stable/c/2ebf775f0541ae0d474836fa0cf3220e502f8e3e
- https://git.kernel.org/stable/c/46412b2fb1f9cc895d6d4036bf24f640b5d86dab
- https://git.kernel.org/stable/c/82c386d73689a45d5ee8c1290827bce64056dddd
- https://git.kernel.org/stable/c/84f2e5b3e70f08fce3cb1ff73414631c5e490204
- https://git.kernel.org/stable/c/ccab434e674ca95d483788b1895a70c21b7f016a
- https://git.kernel.org/stable/c/d69581c17608d81824dd497d9a54b6a5b6139975
Modified: 2025-09-23
CVE-2023-52748
In the Linux kernel, the following vulnerability has been resolved: f2fs: avoid format-overflow warning With gcc and W=1 option, there's a warning like this: fs/f2fs/compress.c: In function ‘f2fs_init_page_array_cache’: fs/f2fs/compress.c:1984:47: error: ‘%u’ directive writing between 1 and 7 bytes into a region of size between 5 and 8 [-Werror=format-overflow=] 1984 | sprintf(slab_name, "f2fs_page_array_entry-%u:%u", MAJOR(dev), MINOR(dev)); | ^~ String "f2fs_page_array_entry-%u:%u" can up to 35. The first "%u" can up to 4 and the second "%u" can up to 7, so total size is "24 + 4 + 7 = 35". slab_name's size should be 35 rather than 32.
- https://git.kernel.org/stable/c/3eebe636cac53886bd5d1cdd55e082ec9e84983f
- https://git.kernel.org/stable/c/526dd7540a09ecf87b5f54f3ab4e0a2528f25a79
- https://git.kernel.org/stable/c/6fca08fd3085253b48fcb1bd243a0a5e18821a00
- https://git.kernel.org/stable/c/c041f5ddef00c731c541e00bc8ae97b8c84c682f
- https://git.kernel.org/stable/c/e0d4e8acb3789c5a8651061fbab62ca24a45c063
- https://git.kernel.org/stable/c/e4088d7d8f1123006d46a42edf51b8c960a58ef9
- https://git.kernel.org/stable/c/3eebe636cac53886bd5d1cdd55e082ec9e84983f
- https://git.kernel.org/stable/c/526dd7540a09ecf87b5f54f3ab4e0a2528f25a79
- https://git.kernel.org/stable/c/6fca08fd3085253b48fcb1bd243a0a5e18821a00
- https://git.kernel.org/stable/c/c041f5ddef00c731c541e00bc8ae97b8c84c682f
- https://git.kernel.org/stable/c/e0d4e8acb3789c5a8651061fbab62ca24a45c063
- https://git.kernel.org/stable/c/e4088d7d8f1123006d46a42edf51b8c960a58ef9
Modified: 2025-09-25
CVE-2023-52750
In the Linux kernel, the following vulnerability has been resolved: arm64: Restrict CPU_BIG_ENDIAN to GNU as or LLVM IAS 15.x or newer Prior to LLVM 15.0.0, LLVM's integrated assembler would incorrectly byte-swap NOP when compiling for big-endian, and the resulting series of bytes happened to match the encoding of FNMADD S21, S30, S0, S0. This went unnoticed until commit: 34f66c4c4d5518c1 ("arm64: Use a positive cpucap for FP/SIMD") Prior to that commit, the kernel would always enable the use of FPSIMD early in boot when __cpu_setup() initialized CPACR_EL1, and so usage of FNMADD within the kernel was not detected, but could result in the corruption of user or kernel FPSIMD state. After that commit, the instructions happen to trap during boot prior to FPSIMD being detected and enabled, e.g. | Unhandled 64-bit el1h sync exception on CPU0, ESR 0x000000001fe00000 -- ASIMD | CPU: 0 PID: 0 Comm: swapper Not tainted 6.6.0-rc3-00013-g34f66c4c4d55 #1 | Hardware name: linux,dummy-virt (DT) | pstate: 400000c9 (nZcv daIF -PAN -UAO -TCO -DIT -SSBS BTYPE=--) | pc : __pi_strcmp+0x1c/0x150 | lr : populate_properties+0xe4/0x254 | sp : ffffd014173d3ad0 | x29: ffffd014173d3af0 x28: fffffbfffddffcb8 x27: 0000000000000000 | x26: 0000000000000058 x25: fffffbfffddfe054 x24: 0000000000000008 | x23: fffffbfffddfe000 x22: fffffbfffddfe000 x21: fffffbfffddfe044 | x20: ffffd014173d3b70 x19: 0000000000000001 x18: 0000000000000005 | x17: 0000000000000010 x16: 0000000000000000 x15: 00000000413e7000 | x14: 0000000000000000 x13: 0000000000001bcc x12: 0000000000000000 | x11: 00000000d00dfeed x10: ffffd414193f2cd0 x9 : 0000000000000000 | x8 : 0101010101010101 x7 : ffffffffffffffc0 x6 : 0000000000000000 | x5 : 0000000000000000 x4 : 0101010101010101 x3 : 000000000000002a | x2 : 0000000000000001 x1 : ffffd014171f2988 x0 : fffffbfffddffcb8 | Kernel panic - not syncing: Unhandled exception | CPU: 0 PID: 0 Comm: swapper Not tainted 6.6.0-rc3-00013-g34f66c4c4d55 #1 | Hardware name: linux,dummy-virt (DT) | Call trace: | dump_backtrace+0xec/0x108 | show_stack+0x18/0x2c | dump_stack_lvl+0x50/0x68 | dump_stack+0x18/0x24 | panic+0x13c/0x340 | el1t_64_irq_handler+0x0/0x1c | el1_abort+0x0/0x5c | el1h_64_sync+0x64/0x68 | __pi_strcmp+0x1c/0x150 | unflatten_dt_nodes+0x1e8/0x2d8 | __unflatten_device_tree+0x5c/0x15c | unflatten_device_tree+0x38/0x50 | setup_arch+0x164/0x1e0 | start_kernel+0x64/0x38c | __primary_switched+0xbc/0xc4 Restrict CONFIG_CPU_BIG_ENDIAN to a known good assembler, which is either GNU as or LLVM's IAS 15.0.0 and newer, which contains the linked commit.
- https://git.kernel.org/stable/c/146a15b873353f8ac28dc281c139ff611a3c4848
- https://git.kernel.org/stable/c/69e619d2fd056fe1f5d0adf01584f2da669e0d28
- https://git.kernel.org/stable/c/936c9c10efaefaf1ab3ef020e1f8aaaaff1ad2f9
- https://git.kernel.org/stable/c/bd31e534721ab95ef237020fe6995c899ffdf21a
- https://git.kernel.org/stable/c/d08a1e75253b4e19ae290b1c35349f12cfcebc0a
- https://git.kernel.org/stable/c/ef0224ee5399ea8a46bc07dc6c6494961ed5fdd2
- https://git.kernel.org/stable/c/146a15b873353f8ac28dc281c139ff611a3c4848
- https://git.kernel.org/stable/c/69e619d2fd056fe1f5d0adf01584f2da669e0d28
- https://git.kernel.org/stable/c/936c9c10efaefaf1ab3ef020e1f8aaaaff1ad2f9
- https://git.kernel.org/stable/c/bd31e534721ab95ef237020fe6995c899ffdf21a
- https://git.kernel.org/stable/c/d08a1e75253b4e19ae290b1c35349f12cfcebc0a
- https://git.kernel.org/stable/c/ef0224ee5399ea8a46bc07dc6c6494961ed5fdd2
Modified: 2024-11-21
CVE-2023-52753
In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Avoid NULL dereference of timing generator [Why & How] Check whether assigned timing generator is NULL or not before accessing its funcs to prevent NULL dereference.
- https://git.kernel.org/stable/c/09909f515032fa80b921fd3118efe66b185d10fd
- https://git.kernel.org/stable/c/4e497f1acd99075b13605b2e7fa0cba721a2cfd9
- https://git.kernel.org/stable/c/6d8653b1a7a8dc938b566ae8c4f373b36e792c68
- https://git.kernel.org/stable/c/79b6a90f4f2433312154cd68452b0ba501fa74db
- https://git.kernel.org/stable/c/8a06894666e0b462c9316b26ab615cefdd0d676c
- https://git.kernel.org/stable/c/b1904ed480cee3f9f4036ea0e36d139cb5fee2d6
- https://git.kernel.org/stable/c/df8bc953eed72371e43ca407bd063507f760cf89
- https://git.kernel.org/stable/c/eac3e4760aa12159f7f5475d55a67b7933abc195
- https://git.kernel.org/stable/c/09909f515032fa80b921fd3118efe66b185d10fd
- https://git.kernel.org/stable/c/4e497f1acd99075b13605b2e7fa0cba721a2cfd9
- https://git.kernel.org/stable/c/6d8653b1a7a8dc938b566ae8c4f373b36e792c68
- https://git.kernel.org/stable/c/79b6a90f4f2433312154cd68452b0ba501fa74db
- https://git.kernel.org/stable/c/8a06894666e0b462c9316b26ab615cefdd0d676c
- https://git.kernel.org/stable/c/b1904ed480cee3f9f4036ea0e36d139cb5fee2d6
- https://git.kernel.org/stable/c/df8bc953eed72371e43ca407bd063507f760cf89
- https://git.kernel.org/stable/c/eac3e4760aa12159f7f5475d55a67b7933abc195
Modified: 2025-09-23
CVE-2023-52754
In the Linux kernel, the following vulnerability has been resolved: media: imon: fix access to invalid resource for the second interface imon driver probes two USB interfaces, and at the probe of the second interface, the driver assumes blindly that the first interface got bound with the same imon driver. It's usually true, but it's still possible that the first interface is bound with another driver via a malformed descriptor. Then it may lead to a memory corruption, as spotted by syzkaller; imon driver accesses the data from drvdata as struct imon_context object although it's a completely different one that was assigned by another driver. This patch adds a sanity check -- whether the first interface is really bound with the imon driver or not -- for avoiding the problem above at the probe time.
- https://git.kernel.org/stable/c/0f5068519f89d928d6c51100e4b274479123829f
- https://git.kernel.org/stable/c/10ec5a97f8f5a772a1a42b4eb27196b447cd3aa9
- https://git.kernel.org/stable/c/2a493a34bd6e496c55fabedd82b957193ace178f
- https://git.kernel.org/stable/c/5e0b788fb96be36d1baf1a5c88d09c7c82a0452a
- https://git.kernel.org/stable/c/a1766a4fd83befa0b34d932d532e7ebb7fab1fa7
- https://git.kernel.org/stable/c/b083aaf5db2eeca9e362723258e5d8698f7dd84e
- https://git.kernel.org/stable/c/0f5068519f89d928d6c51100e4b274479123829f
- https://git.kernel.org/stable/c/10ec5a97f8f5a772a1a42b4eb27196b447cd3aa9
- https://git.kernel.org/stable/c/2a493a34bd6e496c55fabedd82b957193ace178f
- https://git.kernel.org/stable/c/5e0b788fb96be36d1baf1a5c88d09c7c82a0452a
- https://git.kernel.org/stable/c/a1766a4fd83befa0b34d932d532e7ebb7fab1fa7
- https://git.kernel.org/stable/c/b083aaf5db2eeca9e362723258e5d8698f7dd84e
Modified: 2025-09-23
CVE-2023-52764
In the Linux kernel, the following vulnerability has been resolved: media: gspca: cpia1: shift-out-of-bounds in set_flicker Syzkaller reported the following issue: UBSAN: shift-out-of-bounds in drivers/media/usb/gspca/cpia1.c:1031:27 shift exponent 245 is too large for 32-bit type 'int' When the value of the variable "sd->params.exposure.gain" exceeds the number of bits in an integer, a shift-out-of-bounds error is reported. It is triggered because the variable "currentexp" cannot be left-shifted by more than the number of bits in an integer. In order to avoid invalid range during left-shift, the conditional expression is added.
- https://git.kernel.org/stable/c/099be1822d1f095433f4b08af9cc9d6308ec1953
- https://git.kernel.org/stable/c/09cd8b561aa9796903710a1046957f2b112c8f26
- https://git.kernel.org/stable/c/2eee8edfff90e22980a6b22079d238c3c9d323bb
- https://git.kernel.org/stable/c/69bba62600bd91d6b7c1e8ca181faf8ac64f7060
- https://git.kernel.org/stable/c/8f83c85ee88225319c52680792320c02158c2a9b
- https://git.kernel.org/stable/c/93bddd6529f187f510eec759f37d0569243c9809
- https://git.kernel.org/stable/c/a647f27a7426d2fe1b40da7c8fa2b81354a51177
- https://git.kernel.org/stable/c/c6b6b8692218da73b33b310d7c1df90f115bdd9a
- https://git.kernel.org/stable/c/e2d7149b913d14352c82624e723ce1c211ca06d3
- https://git.kernel.org/stable/c/099be1822d1f095433f4b08af9cc9d6308ec1953
- https://git.kernel.org/stable/c/09cd8b561aa9796903710a1046957f2b112c8f26
- https://git.kernel.org/stable/c/2eee8edfff90e22980a6b22079d238c3c9d323bb
- https://git.kernel.org/stable/c/69bba62600bd91d6b7c1e8ca181faf8ac64f7060
- https://git.kernel.org/stable/c/8f83c85ee88225319c52680792320c02158c2a9b
- https://git.kernel.org/stable/c/93bddd6529f187f510eec759f37d0569243c9809
- https://git.kernel.org/stable/c/a647f27a7426d2fe1b40da7c8fa2b81354a51177
- https://git.kernel.org/stable/c/c6b6b8692218da73b33b310d7c1df90f115bdd9a
- https://git.kernel.org/stable/c/e2d7149b913d14352c82624e723ce1c211ca06d3
Modified: 2025-09-23
CVE-2023-52774
In the Linux kernel, the following vulnerability has been resolved: s390/dasd: protect device queue against concurrent access In dasd_profile_start() the amount of requests on the device queue are counted. The access to the device queue is unprotected against concurrent access. With a lot of parallel I/O, especially with alias devices enabled, the device queue can change while dasd_profile_start() is accessing the queue. In the worst case this leads to a kernel panic due to incorrect pointer accesses. Fix this by taking the device lock before accessing the queue and counting the requests. Additionally the check for a valid profile data pointer can be done earlier to avoid unnecessary locking in a hot path.
- https://git.kernel.org/stable/c/6062c527d0403cef27c54b91ac8390c3a497b250
- https://git.kernel.org/stable/c/9372aab5d0ff621ea203c8c603e7e5f75e888240
- https://git.kernel.org/stable/c/c841de6247e94e07566d57163d3c0d8b29278f7a
- https://git.kernel.org/stable/c/db46cd1e0426f52999d50fa72cfa97fa39952885
- https://git.kernel.org/stable/c/dc96fde8fcb2b896fd6c64802a7f4ece2e69b0be
- https://git.kernel.org/stable/c/ebdc569a07a3e8dbe66b4184922ad6f88ac0b96f
- https://git.kernel.org/stable/c/f1ac7789406e2ca9ac51c41ad2daa597f47bdd4d
- https://git.kernel.org/stable/c/f75617cc8df4155374132f0b500b0b3ebb967458
- https://git.kernel.org/stable/c/6062c527d0403cef27c54b91ac8390c3a497b250
- https://git.kernel.org/stable/c/9372aab5d0ff621ea203c8c603e7e5f75e888240
- https://git.kernel.org/stable/c/c841de6247e94e07566d57163d3c0d8b29278f7a
- https://git.kernel.org/stable/c/db46cd1e0426f52999d50fa72cfa97fa39952885
- https://git.kernel.org/stable/c/dc96fde8fcb2b896fd6c64802a7f4ece2e69b0be
- https://git.kernel.org/stable/c/ebdc569a07a3e8dbe66b4184922ad6f88ac0b96f
- https://git.kernel.org/stable/c/f1ac7789406e2ca9ac51c41ad2daa597f47bdd4d
- https://git.kernel.org/stable/c/f75617cc8df4155374132f0b500b0b3ebb967458
Modified: 2025-09-23
CVE-2023-52775
In the Linux kernel, the following vulnerability has been resolved: net/smc: avoid data corruption caused by decline We found a data corruption issue during testing of SMC-R on Redis applications. The benchmark has a low probability of reporting a strange error as shown below. "Error: Protocol error, got "\xe2" as reply type byte" Finally, we found that the retrieved error data was as follows: 0xE2 0xD4 0xC3 0xD9 0x04 0x00 0x2C 0x20 0xA6 0x56 0x00 0x16 0x3E 0x0C 0xCB 0x04 0x02 0x01 0x00 0x00 0x20 0x00 0x00 0x00 0x00 0x00 0x00 0x00 0x00 0x00 0x00 0x00 0x00 0x00 0x00 0x00 0x00 0x00 0xE2 It is quite obvious that this is a SMC DECLINE message, which means that the applications received SMC protocol message. We found that this was caused by the following situations: client server ¦ clc proposal -------------> ¦ clc accept <------------- ¦ clc confirm -------------> wait llc confirm send llc confirm ¦failed llc confirm ¦ x------ (after 2s)timeout wait llc confirm rsp wait decline (after 1s) timeout (after 2s) timeout ¦ decline --------------> ¦ decline <-------------- As a result, a decline message was sent in the implementation, and this message was read from TCP by the already-fallback connection. This patch double the client timeout as 2x of the server value, With this simple change, the Decline messages should never cross or collide (during Confirm link timeout). This issue requires an immediate solution, since the protocol updates involve a more long-term solution.
- https://git.kernel.org/stable/c/5ada292b5c504720a0acef8cae9acc62a694d19c
- https://git.kernel.org/stable/c/7234d2b5dffa5af77fd4e0deaebab509e130c6b1
- https://git.kernel.org/stable/c/90072af9efe8c7bd7d086709014ddd44cebd5e7c
- https://git.kernel.org/stable/c/94a0ae698b4d5d5bb598e23228002a1491c50add
- https://git.kernel.org/stable/c/e6d71b437abc2f249e3b6a1ae1a7228e09c6e563
- https://git.kernel.org/stable/c/5ada292b5c504720a0acef8cae9acc62a694d19c
- https://git.kernel.org/stable/c/7234d2b5dffa5af77fd4e0deaebab509e130c6b1
- https://git.kernel.org/stable/c/90072af9efe8c7bd7d086709014ddd44cebd5e7c
- https://git.kernel.org/stable/c/94a0ae698b4d5d5bb598e23228002a1491c50add
- https://git.kernel.org/stable/c/e6d71b437abc2f249e3b6a1ae1a7228e09c6e563
Modified: 2025-09-25
CVE-2023-52781
In the Linux kernel, the following vulnerability has been resolved: usb: config: fix iteration issue in 'usb_get_bos_descriptor()' The BOS descriptor defines a root descriptor and is the base descriptor for accessing a family of related descriptors. Function 'usb_get_bos_descriptor()' encounters an iteration issue when skipping the 'USB_DT_DEVICE_CAPABILITY' descriptor type. This results in the same descriptor being read repeatedly. To address this issue, a 'goto' statement is introduced to ensure that the pointer and the amount read is updated correctly. This ensures that the function iterates to the next descriptor instead of reading the same descriptor repeatedly.
- https://git.kernel.org/stable/c/64c27b7b2357ddb38b6afebaf46d5bff4d250702
- https://git.kernel.org/stable/c/7c0244cc311a4038505b73682b7c8ceaa5c7a8c8
- https://git.kernel.org/stable/c/974bba5c118f4c2baf00de0356e3e4f7928b4cbc
- https://git.kernel.org/stable/c/9ef94ec8e52eaf7b9abc5b5f8f5b911751112223
- https://git.kernel.org/stable/c/f89fef7710b2ba0f7a1e46594e530dcf2f77be91
- https://git.kernel.org/stable/c/64c27b7b2357ddb38b6afebaf46d5bff4d250702
- https://git.kernel.org/stable/c/7c0244cc311a4038505b73682b7c8ceaa5c7a8c8
- https://git.kernel.org/stable/c/974bba5c118f4c2baf00de0356e3e4f7928b4cbc
- https://git.kernel.org/stable/c/9ef94ec8e52eaf7b9abc5b5f8f5b911751112223
- https://git.kernel.org/stable/c/f89fef7710b2ba0f7a1e46594e530dcf2f77be91
Modified: 2025-09-25
CVE-2023-52784
In the Linux kernel, the following vulnerability has been resolved: bonding: stop the device in bond_setup_by_slave() Commit 9eed321cde22 ("net: lapbether: only support ethernet devices") has been able to keep syzbot away from net/lapb, until today. In the following splat [1], the issue is that a lapbether device has been created on a bonding device without members. Then adding a non ARPHRD_ETHER member forced the bonding master to change its type. The fix is to make sure we call dev_close() in bond_setup_by_slave() so that the potential linked lapbether devices (or any other devices having assumptions on the physical device) are removed. A similar bug has been addressed in commit 40baec225765 ("bonding: fix panic on non-ARPHRD_ETHER enslave failure") [1] skbuff: skb_under_panic: text:ffff800089508810 len:44 put:40 head:ffff0000c78e7c00 data:ffff0000c78e7bea tail:0x16 end:0x140 dev:bond0 kernel BUG at net/core/skbuff.c:192 ! Internal error: Oops - BUG: 00000000f2000800 [#1] PREEMPT SMP Modules linked in: CPU: 0 PID: 6007 Comm: syz-executor383 Not tainted 6.6.0-rc3-syzkaller-gbf6547d8715b #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023 pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : skb_panic net/core/skbuff.c:188 [inline] pc : skb_under_panic+0x13c/0x140 net/core/skbuff.c:202 lr : skb_panic net/core/skbuff.c:188 [inline] lr : skb_under_panic+0x13c/0x140 net/core/skbuff.c:202 sp : ffff800096a06aa0 x29: ffff800096a06ab0 x28: ffff800096a06ba0 x27: dfff800000000000 x26: ffff0000ce9b9b50 x25: 0000000000000016 x24: ffff0000c78e7bea x23: ffff0000c78e7c00 x22: 000000000000002c x21: 0000000000000140 x20: 0000000000000028 x19: ffff800089508810 x18: ffff800096a06100 x17: 0000000000000000 x16: ffff80008a629a3c x15: 0000000000000001 x14: 1fffe00036837a32 x13: 0000000000000000 x12: 0000000000000000 x11: 0000000000000201 x10: 0000000000000000 x9 : cb50b496c519aa00 x8 : cb50b496c519aa00 x7 : 0000000000000001 x6 : 0000000000000001 x5 : ffff800096a063b8 x4 : ffff80008e280f80 x3 : ffff8000805ad11c x2 : 0000000000000001 x1 : 0000000100000201 x0 : 0000000000000086 Call trace: skb_panic net/core/skbuff.c:188 [inline] skb_under_panic+0x13c/0x140 net/core/skbuff.c:202 skb_push+0xf0/0x108 net/core/skbuff.c:2446 ip6gre_header+0xbc/0x738 net/ipv6/ip6_gre.c:1384 dev_hard_header include/linux/netdevice.h:3136 [inline] lapbeth_data_transmit+0x1c4/0x298 drivers/net/wan/lapbether.c:257 lapb_data_transmit+0x8c/0xb0 net/lapb/lapb_iface.c:447 lapb_transmit_buffer+0x178/0x204 net/lapb/lapb_out.c:149 lapb_send_control+0x220/0x320 net/lapb/lapb_subr.c:251 __lapb_disconnect_request+0x9c/0x17c net/lapb/lapb_iface.c:326 lapb_device_event+0x288/0x4e0 net/lapb/lapb_iface.c:492 notifier_call_chain+0x1a4/0x510 kernel/notifier.c:93 raw_notifier_call_chain+0x3c/0x50 kernel/notifier.c:461 call_netdevice_notifiers_info net/core/dev.c:1970 [inline] call_netdevice_notifiers_extack net/core/dev.c:2008 [inline] call_netdevice_notifiers net/core/dev.c:2022 [inline] __dev_close_many+0x1b8/0x3c4 net/core/dev.c:1508 dev_close_many+0x1e0/0x470 net/core/dev.c:1559 dev_close+0x174/0x250 net/core/dev.c:1585 lapbeth_device_event+0x2e4/0x958 drivers/net/wan/lapbether.c:466 notifier_call_chain+0x1a4/0x510 kernel/notifier.c:93 raw_notifier_call_chain+0x3c/0x50 kernel/notifier.c:461 call_netdevice_notifiers_info net/core/dev.c:1970 [inline] call_netdevice_notifiers_extack net/core/dev.c:2008 [inline] call_netdevice_notifiers net/core/dev.c:2022 [inline] __dev_close_many+0x1b8/0x3c4 net/core/dev.c:1508 dev_close_many+0x1e0/0x470 net/core/dev.c:1559 dev_close+0x174/0x250 net/core/dev.c:1585 bond_enslave+0x2298/0x30cc drivers/net/bonding/bond_main.c:2332 bond_do_ioctl+0x268/0xc64 drivers/net/bonding/bond_main.c:4539 dev_ifsioc+0x754/0x9ac dev_ioctl+0x4d8/0xd34 net/core/dev_ioctl.c:786 sock_do_ioctl+0x1d4/0x2d0 net/socket.c:1217 sock_ioctl+0x4e8/0x834 net/socket.c:1322 vfs_ioctl fs/ioctl.c:51 [inline] __do_ ---truncated---
- https://git.kernel.org/stable/c/19554aa901b5833787df4417a05ccdebf351b7f4
- https://git.kernel.org/stable/c/396baca6683f415b5bc2b380289387bef1406edc
- https://git.kernel.org/stable/c/3cffa2ddc4d3fcf70cde361236f5a614f81a09b2
- https://git.kernel.org/stable/c/53064e8239dd2ecfefc5634e991f1025abc2ee0c
- https://git.kernel.org/stable/c/87c49806a37f88eddde3f537c162fd0c2834170c
- https://git.kernel.org/stable/c/b4f0e605a508f6d7cda6df2f03a0c676b778b1fe
- https://git.kernel.org/stable/c/d98c91215a5748a0f536e7ccea26027005196859
- https://git.kernel.org/stable/c/19554aa901b5833787df4417a05ccdebf351b7f4
- https://git.kernel.org/stable/c/396baca6683f415b5bc2b380289387bef1406edc
- https://git.kernel.org/stable/c/3cffa2ddc4d3fcf70cde361236f5a614f81a09b2
- https://git.kernel.org/stable/c/53064e8239dd2ecfefc5634e991f1025abc2ee0c
- https://git.kernel.org/stable/c/87c49806a37f88eddde3f537c162fd0c2834170c
- https://git.kernel.org/stable/c/b4f0e605a508f6d7cda6df2f03a0c676b778b1fe
- https://git.kernel.org/stable/c/d98c91215a5748a0f536e7ccea26027005196859
Modified: 2025-01-15
CVE-2023-52789
In the Linux kernel, the following vulnerability has been resolved: tty: vcc: Add check for kstrdup() in vcc_probe() Add check for the return value of kstrdup() and return the error, if it fails in order to avoid NULL pointer dereference.
- https://git.kernel.org/stable/c/38cd56fc9de78bf3c878790785e8c231116ef9d3
- https://git.kernel.org/stable/c/460284dfb10b207980c6f3f7046e33446ceb38ac
- https://git.kernel.org/stable/c/4a24a31826246b15477399febd13292b0c9f0ee9
- https://git.kernel.org/stable/c/4ef41a7f33ffe1a335e7db7e1564ddc6afad47cc
- https://git.kernel.org/stable/c/6c80f48912b5bd4965352d1a9a989e21743a4a06
- https://git.kernel.org/stable/c/7cebc86481bf16049e266f6774d90f2fd4f8d5d2
- https://git.kernel.org/stable/c/8f8771757b130383732195497e47fba2aba76d3a
- https://git.kernel.org/stable/c/909963e0c16778cec28efb1affc21558825f4200
- https://git.kernel.org/stable/c/d81ffb87aaa75f842cd7aa57091810353755b3e6
- https://git.kernel.org/stable/c/38cd56fc9de78bf3c878790785e8c231116ef9d3
- https://git.kernel.org/stable/c/460284dfb10b207980c6f3f7046e33446ceb38ac
- https://git.kernel.org/stable/c/4a24a31826246b15477399febd13292b0c9f0ee9
- https://git.kernel.org/stable/c/4ef41a7f33ffe1a335e7db7e1564ddc6afad47cc
- https://git.kernel.org/stable/c/6c80f48912b5bd4965352d1a9a989e21743a4a06
- https://git.kernel.org/stable/c/7cebc86481bf16049e266f6774d90f2fd4f8d5d2
- https://git.kernel.org/stable/c/8f8771757b130383732195497e47fba2aba76d3a
- https://git.kernel.org/stable/c/909963e0c16778cec28efb1affc21558825f4200
- https://git.kernel.org/stable/c/d81ffb87aaa75f842cd7aa57091810353755b3e6
Modified: 2025-09-26
CVE-2023-52791
In the Linux kernel, the following vulnerability has been resolved: i2c: core: Run atomic i2c xfer when !preemptible Since bae1d3a05a8b, i2c transfers are non-atomic if preemption is disabled. However, non-atomic i2c transfers require preemption (e.g. in wait_for_completion() while waiting for the DMA). panic() calls preempt_disable_notrace() before calling emergency_restart(). Therefore, if an i2c device is used for the restart, the xfer should be atomic. This avoids warnings like: [ 12.667612] WARNING: CPU: 1 PID: 1 at kernel/rcu/tree_plugin.h:318 rcu_note_context_switch+0x33c/0x6b0 [ 12.676926] Voluntary context switch within RCU read-side critical section! ... [ 12.742376] schedule_timeout from wait_for_completion_timeout+0x90/0x114 [ 12.749179] wait_for_completion_timeout from tegra_i2c_wait_completion+0x40/0x70 ... [ 12.994527] atomic_notifier_call_chain from machine_restart+0x34/0x58 [ 13.001050] machine_restart from panic+0x2a8/0x32c Use !preemptible() instead, which is basically the same check as pre-v5.2.
- https://git.kernel.org/stable/c/185f3617adc8fe45e40489b458f03911f0dec46c
- https://git.kernel.org/stable/c/25284c46b657f48c0f3880a2e0706c70d81182c0
- https://git.kernel.org/stable/c/25eb381a736e7ae39a4245ef5c96484eb1073809
- https://git.kernel.org/stable/c/3473cf43b9068b9dfef2f545f833f33c6a544b91
- https://git.kernel.org/stable/c/8c3fa52a46ff4d208cefb1a462ec94e0043a91e1
- https://git.kernel.org/stable/c/aa49c90894d06e18a1ee7c095edbd2f37c232d02
- https://git.kernel.org/stable/c/f6237afabc349c1c7909db00e15d2816519e0d2b
- https://git.kernel.org/stable/c/185f3617adc8fe45e40489b458f03911f0dec46c
- https://git.kernel.org/stable/c/25284c46b657f48c0f3880a2e0706c70d81182c0
- https://git.kernel.org/stable/c/25eb381a736e7ae39a4245ef5c96484eb1073809
- https://git.kernel.org/stable/c/3473cf43b9068b9dfef2f545f833f33c6a544b91
- https://git.kernel.org/stable/c/8c3fa52a46ff4d208cefb1a462ec94e0043a91e1
- https://git.kernel.org/stable/c/aa49c90894d06e18a1ee7c095edbd2f37c232d02
- https://git.kernel.org/stable/c/f6237afabc349c1c7909db00e15d2816519e0d2b
Modified: 2025-09-23
CVE-2023-52796
In the Linux kernel, the following vulnerability has been resolved:
ipvlan: add ipvlan_route_v6_outbound() helper
Inspired by syzbot reports using a stack of multiple ipvlan devices.
Reduce stack size needed in ipvlan_process_v6_outbound() by moving
the flowi6 struct used for the route lookup in an non inlined
helper. ipvlan_route_v6_outbound() needs 120 bytes on the stack,
immediately reclaimed.
Also make sure ipvlan_process_v4_outbound() is not inlined.
We might also have to lower MAX_NEST_DEV, because only syzbot uses
setups with more than four stacked devices.
BUG: TASK stack guard page was hit at ffffc9000e803ff8 (stack is ffffc9000e804000..ffffc9000e808000)
stack guard page: 0000 [#1] SMP KASAN
CPU: 0 PID: 13442 Comm: syz-executor.4 Not tainted 6.1.52-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023
RIP: 0010:kasan_check_range+0x4/0x2a0 mm/kasan/generic.c:188
Code: 48 01 c6 48 89 c7 e8 db 4e c1 03 31 c0 5d c3 cc 0f 0b eb 02 0f 0b b8 ea ff ff ff 5d c3 cc 00 00 cc cc 00 00 cc cc 55 48 89 e5 <41> 57 41 56 41 55 41 54 53 b0 01 48 85 f6 0f 84 a4 01 00 00 48 89
RSP: 0018:ffffc9000e804000 EFLAGS: 00010246
RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffffff817e5bf2
RDX: 0000000000000000 RSI: 0000000000000008 RDI: ffffffff887c6568
RBP: ffffc9000e804000 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: dffffc0000000001 R12: 1ffff92001d0080c
R13: dffffc0000000000 R14: ffffffff87e6b100 R15: 0000000000000000
FS: 00007fd0c55826c0(0000) GS:ffff8881f6800000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffffc9000e803ff8 CR3: 0000000170ef7000 CR4: 00000000003506f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
<#DF>#DF>
- https://git.kernel.org/stable/c/03cddc4df8c6be47fd27c8f8b87e5f9a989e1458
- https://git.kernel.org/stable/c/18f039428c7df183b09c69ebf10ffd4e521035d2
- https://git.kernel.org/stable/c/1f64cad3ac38ac5978b53c40e6c5e6fd3477c68f
- https://git.kernel.org/stable/c/43b781e7cb5cd0b435de276111953bf2bacd1f02
- https://git.kernel.org/stable/c/4d2d30f0792b47908af64c4d02ed1ee25ff50542
- https://git.kernel.org/stable/c/4f7f850611aa27aaaf1bf5687702ad2240ae442a
- https://git.kernel.org/stable/c/732a67ca436887b594ebc43bb5a04ffb0971a760
- https://git.kernel.org/stable/c/8872dc638c24bb774cd2224a69d72a7f661a4d56
- https://git.kernel.org/stable/c/03cddc4df8c6be47fd27c8f8b87e5f9a989e1458
- https://git.kernel.org/stable/c/18f039428c7df183b09c69ebf10ffd4e521035d2
- https://git.kernel.org/stable/c/1f64cad3ac38ac5978b53c40e6c5e6fd3477c68f
- https://git.kernel.org/stable/c/43b781e7cb5cd0b435de276111953bf2bacd1f02
- https://git.kernel.org/stable/c/4d2d30f0792b47908af64c4d02ed1ee25ff50542
- https://git.kernel.org/stable/c/4f7f850611aa27aaaf1bf5687702ad2240ae442a
- https://git.kernel.org/stable/c/732a67ca436887b594ebc43bb5a04ffb0971a760
- https://git.kernel.org/stable/c/8872dc638c24bb774cd2224a69d72a7f661a4d56
Modified: 2025-04-02
CVE-2023-52798
In the Linux kernel, the following vulnerability has been resolved: wifi: ath11k: fix dfs radar event locking The ath11k active pdevs are protected by RCU but the DFS radar event handling code calling ath11k_mac_get_ar_by_pdev_id() was not marked as a read-side critical section. Mark the code in question as an RCU read-side critical section to avoid any potential use-after-free issues. Compile tested only.
- https://git.kernel.org/stable/c/1fd878e1750190a612b5de2af357cca422ec0822
- https://git.kernel.org/stable/c/21ebb0aba580d347e12f01ce5f6e75044427b3d5
- https://git.kernel.org/stable/c/3b6c14833165f689cc5928574ebafe52bbce5f1e
- https://git.kernel.org/stable/c/426e718ce9ba60013364a54233feee309356cb82
- https://git.kernel.org/stable/c/ca420ac4f9451f22347bae44b18ab47ba2c267ec
- https://git.kernel.org/stable/c/f882f51905517575c9f793a3dff567af90ef9a10
- https://git.kernel.org/stable/c/1fd878e1750190a612b5de2af357cca422ec0822
- https://git.kernel.org/stable/c/21ebb0aba580d347e12f01ce5f6e75044427b3d5
- https://git.kernel.org/stable/c/3b6c14833165f689cc5928574ebafe52bbce5f1e
- https://git.kernel.org/stable/c/426e718ce9ba60013364a54233feee309356cb82
- https://git.kernel.org/stable/c/ca420ac4f9451f22347bae44b18ab47ba2c267ec
- https://git.kernel.org/stable/c/f882f51905517575c9f793a3dff567af90ef9a10
Modified: 2025-03-06
CVE-2023-52799
In the Linux kernel, the following vulnerability has been resolved: jfs: fix array-index-out-of-bounds in dbFindLeaf Currently while searching for dmtree_t for sufficient free blocks there is an array out of bounds while getting element in tp->dm_stree. To add the required check for out of bound we first need to determine the type of dmtree. Thus added an extra parameter to dbFindLeaf so that the type of tree can be determined and the required check can be applied.
- https://git.kernel.org/stable/c/20f9310a18e3e99fc031e036fcbed67105ae1859
- https://git.kernel.org/stable/c/22cad8bc1d36547cdae0eef316c47d917ce3147c
- https://git.kernel.org/stable/c/81aa58cd8495b8c3b527f58ccbe19478d8087f61
- https://git.kernel.org/stable/c/86df90f3fea7c5591f05c8a0010871d435e83046
- https://git.kernel.org/stable/c/87c681ab49e99039ff2dd3e71852417381b13878
- https://git.kernel.org/stable/c/88b7894a8f8705bf4e7ea90b10229376abf14514
- https://git.kernel.org/stable/c/a50b796d36719757526ee094c703378895ab5e67
- https://git.kernel.org/stable/c/da3da5e1e6f71c21d8e6149d7076d936ef5d4cb9
- https://git.kernel.org/stable/c/ecfb47f13b08b02cf28b7b50d4941eefa21954d2
- https://git.kernel.org/stable/c/20f9310a18e3e99fc031e036fcbed67105ae1859
- https://git.kernel.org/stable/c/22cad8bc1d36547cdae0eef316c47d917ce3147c
- https://git.kernel.org/stable/c/81aa58cd8495b8c3b527f58ccbe19478d8087f61
- https://git.kernel.org/stable/c/86df90f3fea7c5591f05c8a0010871d435e83046
- https://git.kernel.org/stable/c/87c681ab49e99039ff2dd3e71852417381b13878
- https://git.kernel.org/stable/c/88b7894a8f8705bf4e7ea90b10229376abf14514
- https://git.kernel.org/stable/c/a50b796d36719757526ee094c703378895ab5e67
- https://git.kernel.org/stable/c/da3da5e1e6f71c21d8e6149d7076d936ef5d4cb9
- https://git.kernel.org/stable/c/ecfb47f13b08b02cf28b7b50d4941eefa21954d2
Modified: 2025-04-02
CVE-2023-52800
In the Linux kernel, the following vulnerability has been resolved: wifi: ath11k: fix htt pktlog locking The ath11k active pdevs are protected by RCU but the htt pktlog handling code calling ath11k_mac_get_ar_by_pdev_id() was not marked as a read-side critical section. Mark the code in question as an RCU read-side critical section to avoid any potential use-after-free issues. Compile tested only.
- https://git.kernel.org/stable/c/03ed26935bebf6b6fd8a656490bf3dcc71b72679
- https://git.kernel.org/stable/c/3a51e6b4da71fdfa43ec006d6abc020f3e22d14e
- https://git.kernel.org/stable/c/3f77c7d605b29df277d77e9ee75d96e7ad145d2d
- https://git.kernel.org/stable/c/423762f021825b5e57c3d6f01ff96a9ff19cdcd8
- https://git.kernel.org/stable/c/69cede2a5a5f60e3f5602b901b52cb64edd2ea6c
- https://git.kernel.org/stable/c/e3199b3fac65c9f103055390b6fd07c5cffa5961
- https://git.kernel.org/stable/c/03ed26935bebf6b6fd8a656490bf3dcc71b72679
- https://git.kernel.org/stable/c/3a51e6b4da71fdfa43ec006d6abc020f3e22d14e
- https://git.kernel.org/stable/c/3f77c7d605b29df277d77e9ee75d96e7ad145d2d
- https://git.kernel.org/stable/c/423762f021825b5e57c3d6f01ff96a9ff19cdcd8
- https://git.kernel.org/stable/c/69cede2a5a5f60e3f5602b901b52cb64edd2ea6c
- https://git.kernel.org/stable/c/e3199b3fac65c9f103055390b6fd07c5cffa5961
Modified: 2025-09-23
CVE-2023-52803
In the Linux kernel, the following vulnerability has been resolved: SUNRPC: Fix RPC client cleaned up the freed pipefs dentries RPC client pipefs dentries cleanup is in separated rpc_remove_pipedir() workqueue,which takes care about pipefs superblock locking. In some special scenarios, when kernel frees the pipefs sb of the current client and immediately alloctes a new pipefs sb, rpc_remove_pipedir function would misjudge the existence of pipefs sb which is not the one it used to hold. As a result, the rpc_remove_pipedir would clean the released freed pipefs dentries. To fix this issue, rpc_remove_pipedir should check whether the current pipefs sb is consistent with the original pipefs sb. This error can be catched by KASAN: ========================================================= [ 250.497700] BUG: KASAN: slab-use-after-free in dget_parent+0x195/0x200 [ 250.498315] Read of size 4 at addr ffff88800a2ab804 by task kworker/0:18/106503 [ 250.500549] Workqueue: events rpc_free_client_work [ 250.501001] Call Trace: [ 250.502880] kasan_report+0xb6/0xf0 [ 250.503209] ? dget_parent+0x195/0x200 [ 250.503561] dget_parent+0x195/0x200 [ 250.503897] ? __pfx_rpc_clntdir_depopulate+0x10/0x10 [ 250.504384] rpc_rmdir_depopulate+0x1b/0x90 [ 250.504781] rpc_remove_client_dir+0xf5/0x150 [ 250.505195] rpc_free_client_work+0xe4/0x230 [ 250.505598] process_one_work+0x8ee/0x13b0 ... [ 22.039056] Allocated by task 244: [ 22.039390] kasan_save_stack+0x22/0x50 [ 22.039758] kasan_set_track+0x25/0x30 [ 22.040109] __kasan_slab_alloc+0x59/0x70 [ 22.040487] kmem_cache_alloc_lru+0xf0/0x240 [ 22.040889] __d_alloc+0x31/0x8e0 [ 22.041207] d_alloc+0x44/0x1f0 [ 22.041514] __rpc_lookup_create_exclusive+0x11c/0x140 [ 22.041987] rpc_mkdir_populate.constprop.0+0x5f/0x110 [ 22.042459] rpc_create_client_dir+0x34/0x150 [ 22.042874] rpc_setup_pipedir_sb+0x102/0x1c0 [ 22.043284] rpc_client_register+0x136/0x4e0 [ 22.043689] rpc_new_client+0x911/0x1020 [ 22.044057] rpc_create_xprt+0xcb/0x370 [ 22.044417] rpc_create+0x36b/0x6c0 ... [ 22.049524] Freed by task 0: [ 22.049803] kasan_save_stack+0x22/0x50 [ 22.050165] kasan_set_track+0x25/0x30 [ 22.050520] kasan_save_free_info+0x2b/0x50 [ 22.050921] __kasan_slab_free+0x10e/0x1a0 [ 22.051306] kmem_cache_free+0xa5/0x390 [ 22.051667] rcu_core+0x62c/0x1930 [ 22.051995] __do_softirq+0x165/0x52a [ 22.052347] [ 22.052503] Last potentially related work creation: [ 22.052952] kasan_save_stack+0x22/0x50 [ 22.053313] __kasan_record_aux_stack+0x8e/0xa0 [ 22.053739] __call_rcu_common.constprop.0+0x6b/0x8b0 [ 22.054209] dentry_free+0xb2/0x140 [ 22.054540] __dentry_kill+0x3be/0x540 [ 22.054900] shrink_dentry_list+0x199/0x510 [ 22.055293] shrink_dcache_parent+0x190/0x240 [ 22.055703] do_one_tree+0x11/0x40 [ 22.056028] shrink_dcache_for_umount+0x61/0x140 [ 22.056461] generic_shutdown_super+0x70/0x590 [ 22.056879] kill_anon_super+0x3a/0x60 [ 22.057234] rpc_kill_sb+0x121/0x200
- https://git.kernel.org/stable/c/17866066b8ac1cc38fb449670bc15dc9fee4b40a
- https://git.kernel.org/stable/c/194454afa6aa9d6ed74f0c57127bc8beb27c20df
- https://git.kernel.org/stable/c/1cdb52ffd6600a37bd355d8dce58ecd03e55e618
- https://git.kernel.org/stable/c/7749fd2dbef72a52b5c9ffdbf877691950ed4680
- https://git.kernel.org/stable/c/7d61d1da2ed1f682c41cae0c8d4719cdaccee5c5
- https://git.kernel.org/stable/c/bfca5fb4e97c46503ddfc582335917b0cc228264
- https://git.kernel.org/stable/c/cc2e7ebbeb1d0601f7f3c8d93b78fcc03a95e44a
- https://git.kernel.org/stable/c/dedf2a0eb9448ae73b270743e6ea9b108189df46
- https://git.kernel.org/stable/c/17866066b8ac1cc38fb449670bc15dc9fee4b40a
- https://git.kernel.org/stable/c/194454afa6aa9d6ed74f0c57127bc8beb27c20df
- https://git.kernel.org/stable/c/1cdb52ffd6600a37bd355d8dce58ecd03e55e618
- https://git.kernel.org/stable/c/7749fd2dbef72a52b5c9ffdbf877691950ed4680
- https://git.kernel.org/stable/c/7d61d1da2ed1f682c41cae0c8d4719cdaccee5c5
- https://git.kernel.org/stable/c/bfca5fb4e97c46503ddfc582335917b0cc228264
- https://git.kernel.org/stable/c/cc2e7ebbeb1d0601f7f3c8d93b78fcc03a95e44a
- https://git.kernel.org/stable/c/dedf2a0eb9448ae73b270743e6ea9b108189df46
Modified: 2025-09-23
CVE-2023-52804
In the Linux kernel, the following vulnerability has been resolved: fs/jfs: Add validity check for db_maxag and db_agpref Both db_maxag and db_agpref are used as the index of the db_agfree array, but there is currently no validity check for db_maxag and db_agpref, which can lead to errors. The following is related bug reported by Syzbot: UBSAN: array-index-out-of-bounds in fs/jfs/jfs_dmap.c:639:20 index 7936 is out of range for type 'atomic_t[128]' Add checking that the values of db_maxag and db_agpref are valid indexes for the db_agfree array.
- https://git.kernel.org/stable/c/1f74d336990f37703a8eee77153463d65b67f70e
- https://git.kernel.org/stable/c/2323de34a3ae61a9f9b544c18583f71cea86721f
- https://git.kernel.org/stable/c/32bd8f1cbcf8b663e29dd1f908ba3a129541a11b
- https://git.kernel.org/stable/c/5013f8269887642cca784adc8db9b5f0b771533f
- https://git.kernel.org/stable/c/64933ab7b04881c6c18b21ff206c12278341c72e
- https://git.kernel.org/stable/c/a0649e2dd4a3595b5595a29d0064d047c2fae2fb
- https://git.kernel.org/stable/c/c6c8863fb3f57700ab583d875adda04caaf2278a
- https://git.kernel.org/stable/c/ce15b0f1a431168f07b1cc6c9f71206a2db5c809
- https://git.kernel.org/stable/c/dca403bb035a565bb98ecc1dda5d30f676feda40
- https://git.kernel.org/stable/c/1f74d336990f37703a8eee77153463d65b67f70e
- https://git.kernel.org/stable/c/2323de34a3ae61a9f9b544c18583f71cea86721f
- https://git.kernel.org/stable/c/32bd8f1cbcf8b663e29dd1f908ba3a129541a11b
- https://git.kernel.org/stable/c/5013f8269887642cca784adc8db9b5f0b771533f
- https://git.kernel.org/stable/c/64933ab7b04881c6c18b21ff206c12278341c72e
- https://git.kernel.org/stable/c/a0649e2dd4a3595b5595a29d0064d047c2fae2fb
- https://git.kernel.org/stable/c/c6c8863fb3f57700ab583d875adda04caaf2278a
- https://git.kernel.org/stable/c/ce15b0f1a431168f07b1cc6c9f71206a2db5c809
- https://git.kernel.org/stable/c/dca403bb035a565bb98ecc1dda5d30f676feda40
Modified: 2025-10-01
CVE-2023-52805
In the Linux kernel, the following vulnerability has been resolved: jfs: fix array-index-out-of-bounds in diAlloc Currently there is not check against the agno of the iag while allocating new inodes to avoid fragmentation problem. Added the check which is required.
- https://git.kernel.org/stable/c/05d9ea1ceb62a55af6727a69269a4fd310edf483
- https://git.kernel.org/stable/c/1708d0a9917fea579cc9da3d87b154285abd2cd8
- https://git.kernel.org/stable/c/1ba7df5457dc1c1071c5f92ac11323533a6430e1
- https://git.kernel.org/stable/c/2308d0fb0dc32446b4e6ca37cd09c30374bb64e9
- https://git.kernel.org/stable/c/64f062baf202b82f54987a3f614a6c8f3e466641
- https://git.kernel.org/stable/c/665b44e55c2767a4f899c3b18f49e9e1c9983777
- https://git.kernel.org/stable/c/7467ca10a5ff09b0e87edf6c4d2a4bfdee69cf2c
- https://git.kernel.org/stable/c/8c68af2af697ba2ba3b138be0c6d72e2ce3a3d6d
- https://git.kernel.org/stable/c/cf7e3e84df36a9953796c737f080712f631d7083
- https://git.kernel.org/stable/c/05d9ea1ceb62a55af6727a69269a4fd310edf483
- https://git.kernel.org/stable/c/1708d0a9917fea579cc9da3d87b154285abd2cd8
- https://git.kernel.org/stable/c/1ba7df5457dc1c1071c5f92ac11323533a6430e1
- https://git.kernel.org/stable/c/2308d0fb0dc32446b4e6ca37cd09c30374bb64e9
- https://git.kernel.org/stable/c/64f062baf202b82f54987a3f614a6c8f3e466641
- https://git.kernel.org/stable/c/665b44e55c2767a4f899c3b18f49e9e1c9983777
- https://git.kernel.org/stable/c/7467ca10a5ff09b0e87edf6c4d2a4bfdee69cf2c
- https://git.kernel.org/stable/c/8c68af2af697ba2ba3b138be0c6d72e2ce3a3d6d
- https://git.kernel.org/stable/c/cf7e3e84df36a9953796c737f080712f631d7083
Modified: 2024-11-21
CVE-2023-52806
In the Linux kernel, the following vulnerability has been resolved: ALSA: hda: Fix possible null-ptr-deref when assigning a stream While AudioDSP drivers assign streams exclusively of HOST or LINK type, nothing blocks a user to attempt to assign a COUPLED stream. As supplied substream instance may be a stub, what is the case when code-loading, such scenario ends with null-ptr-deref.
- https://git.kernel.org/stable/c/2527775616f3638f4fd54649eba8c7b84d5e4250
- https://git.kernel.org/stable/c/25354bae4fc310c3928e8a42fda2d486f67745d7
- https://git.kernel.org/stable/c/43b91df291c8802268ab3cfd8fccfdf135800ed4
- https://git.kernel.org/stable/c/4a320da7f7cbdab2098b103c47f45d5061f42edd
- https://git.kernel.org/stable/c/631a96e9eb4228ff75fce7e72d133ca81194797e
- https://git.kernel.org/stable/c/758c7733cb821041f5fd403b7b97c0b95d319323
- https://git.kernel.org/stable/c/7de25112de8222fd20564769e6c99dc9f9738a0b
- https://git.kernel.org/stable/c/f93dc90c2e8ed664985e366aa6459ac83cdab236
- https://git.kernel.org/stable/c/fe7c1a0c2b25c82807cb46fc3aadbf2664a682b0
- https://git.kernel.org/stable/c/2527775616f3638f4fd54649eba8c7b84d5e4250
- https://git.kernel.org/stable/c/25354bae4fc310c3928e8a42fda2d486f67745d7
- https://git.kernel.org/stable/c/43b91df291c8802268ab3cfd8fccfdf135800ed4
- https://git.kernel.org/stable/c/4a320da7f7cbdab2098b103c47f45d5061f42edd
- https://git.kernel.org/stable/c/631a96e9eb4228ff75fce7e72d133ca81194797e
- https://git.kernel.org/stable/c/758c7733cb821041f5fd403b7b97c0b95d319323
- https://git.kernel.org/stable/c/7de25112de8222fd20564769e6c99dc9f9738a0b
- https://git.kernel.org/stable/c/f93dc90c2e8ed664985e366aa6459ac83cdab236
- https://git.kernel.org/stable/c/fe7c1a0c2b25c82807cb46fc3aadbf2664a682b0
Modified: 2024-11-21
CVE-2023-52809
In the Linux kernel, the following vulnerability has been resolved: scsi: libfc: Fix potential NULL pointer dereference in fc_lport_ptp_setup() fc_lport_ptp_setup() did not check the return value of fc_rport_create() which can return NULL and would cause a NULL pointer dereference. Address this issue by checking return value of fc_rport_create() and log error message on fc_rport_create() failed.
- https://git.kernel.org/stable/c/442fd24d7b6b29e4a9cd9225afba4142d5f522ba
- https://git.kernel.org/stable/c/4df105f0ce9f6f30cda4e99f577150d23f0c9c5f
- https://git.kernel.org/stable/c/56d78b5495ebecbb9395101f3be177cd0a52450b
- https://git.kernel.org/stable/c/6b9ecf4e1032e645873933e5b43cbb84cac19106
- https://git.kernel.org/stable/c/77072ec41d6ab3718c3fc639bc149b8037caedfa
- https://git.kernel.org/stable/c/930f0aaba4820d6362de4e6ed569eaf444f1ea4e
- https://git.kernel.org/stable/c/b549acf999824d4f751ca57965700372f2f3ad00
- https://git.kernel.org/stable/c/bb83f79f90e92f46466adcfd4fd264a7ae0f0f01
- https://git.kernel.org/stable/c/f6fe7261b92b21109678747f36df9fdab1e30c34
- https://git.kernel.org/stable/c/442fd24d7b6b29e4a9cd9225afba4142d5f522ba
- https://git.kernel.org/stable/c/4df105f0ce9f6f30cda4e99f577150d23f0c9c5f
- https://git.kernel.org/stable/c/56d78b5495ebecbb9395101f3be177cd0a52450b
- https://git.kernel.org/stable/c/6b9ecf4e1032e645873933e5b43cbb84cac19106
- https://git.kernel.org/stable/c/77072ec41d6ab3718c3fc639bc149b8037caedfa
- https://git.kernel.org/stable/c/930f0aaba4820d6362de4e6ed569eaf444f1ea4e
- https://git.kernel.org/stable/c/b549acf999824d4f751ca57965700372f2f3ad00
- https://git.kernel.org/stable/c/bb83f79f90e92f46466adcfd4fd264a7ae0f0f01
- https://git.kernel.org/stable/c/f6fe7261b92b21109678747f36df9fdab1e30c34
Modified: 2025-04-02
CVE-2023-52810
In the Linux kernel, the following vulnerability has been resolved: fs/jfs: Add check for negative db_l2nbperpage l2nbperpage is log2(number of blks per page), and the minimum legal value should be 0, not negative. In the case of l2nbperpage being negative, an error will occur when subsequently used as shift exponent. Syzbot reported this bug: UBSAN: shift-out-of-bounds in fs/jfs/jfs_dmap.c:799:12 shift exponent -16777216 is negative
- https://git.kernel.org/stable/c/0cb567e727339a192f9fd0db00781d73a91d15a6
- https://git.kernel.org/stable/c/1a7c53fdea1d189087544d9a606d249e93c4934b
- https://git.kernel.org/stable/c/491085258185ffc4fb91555b0dba895fe7656a45
- https://git.kernel.org/stable/c/524b4f203afcf87accfe387e846f33f916f0c907
- https://git.kernel.org/stable/c/525b861a008143048535011f3816d407940f4bfa
- https://git.kernel.org/stable/c/5f148b16972e5f4592629b244d5109b15135f53f
- https://git.kernel.org/stable/c/8f2964df6bfce9d92d81ca552010b8677af8d9dc
- https://git.kernel.org/stable/c/a81a56b4cbe3142cc99f6b98e8f9b3a631c768e1
- https://git.kernel.org/stable/c/cc61fcf7d1c99f148fe8ddfb5c6ed0bb75861f01
- https://git.kernel.org/stable/c/0cb567e727339a192f9fd0db00781d73a91d15a6
- https://git.kernel.org/stable/c/1a7c53fdea1d189087544d9a606d249e93c4934b
- https://git.kernel.org/stable/c/491085258185ffc4fb91555b0dba895fe7656a45
- https://git.kernel.org/stable/c/524b4f203afcf87accfe387e846f33f916f0c907
- https://git.kernel.org/stable/c/525b861a008143048535011f3816d407940f4bfa
- https://git.kernel.org/stable/c/5f148b16972e5f4592629b244d5109b15135f53f
- https://git.kernel.org/stable/c/8f2964df6bfce9d92d81ca552010b8677af8d9dc
- https://git.kernel.org/stable/c/a81a56b4cbe3142cc99f6b98e8f9b3a631c768e1
- https://git.kernel.org/stable/c/cc61fcf7d1c99f148fe8ddfb5c6ed0bb75861f01
Modified: 2025-09-26
CVE-2023-52813
In the Linux kernel, the following vulnerability has been resolved: crypto: pcrypt - Fix hungtask for PADATA_RESET We found a hungtask bug in test_aead_vec_cfg as follows: INFO: task cryptomgr_test:391009 blocked for more than 120 seconds. "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Call trace: __switch_to+0x98/0xe0 __schedule+0x6c4/0xf40 schedule+0xd8/0x1b4 schedule_timeout+0x474/0x560 wait_for_common+0x368/0x4e0 wait_for_completion+0x20/0x30 wait_for_completion+0x20/0x30 test_aead_vec_cfg+0xab4/0xd50 test_aead+0x144/0x1f0 alg_test_aead+0xd8/0x1e0 alg_test+0x634/0x890 cryptomgr_test+0x40/0x70 kthread+0x1e0/0x220 ret_from_fork+0x10/0x18 Kernel panic - not syncing: hung_task: blocked tasks For padata_do_parallel, when the return err is 0 or -EBUSY, it will call wait_for_completion(&wait->completion) in test_aead_vec_cfg. In normal case, aead_request_complete() will be called in pcrypt_aead_serial and the return err is 0 for padata_do_parallel. But, when pinst->flags is PADATA_RESET, the return err is -EBUSY for padata_do_parallel, and it won't call aead_request_complete(). Therefore, test_aead_vec_cfg will hung at wait_for_completion(&wait->completion), which will cause hungtask. The problem comes as following: (padata_do_parallel) | rcu_read_lock_bh(); | err = -EINVAL; | (padata_replace) | pinst->flags |= PADATA_RESET; err = -EBUSY | if (pinst->flags & PADATA_RESET) | rcu_read_unlock_bh() | return err In order to resolve the problem, we replace the return err -EBUSY with -EAGAIN, which means parallel_data is changing, and the caller should call it again. v3: remove retry and just change the return err. v2: introduce padata_try_do_parallel() in pcrypt_aead_encrypt and pcrypt_aead_decrypt to solve the hungtask.
- https://git.kernel.org/stable/c/039fec48e062504f14845124a1a25eb199b2ddc0
- https://git.kernel.org/stable/c/372636debe852913529b1716f44addd94fff2d28
- https://git.kernel.org/stable/c/546c1796ad1ed0d87dab3c4b5156d75819be2316
- https://git.kernel.org/stable/c/8f4f68e788c3a7a696546291258bfa5fdb215523
- https://git.kernel.org/stable/c/c55fc098fd9d2dca475b82d00ffbcaf97879d77e
- https://git.kernel.org/stable/c/c9c1334697301c10e6918d747ed38abfbc0c96e7
- https://git.kernel.org/stable/c/e134f3aba98e6c801a693f540912c2d493718ddf
- https://git.kernel.org/stable/c/e97bf4ada7dddacd184c3e196bd063b0dc71b41d
- https://git.kernel.org/stable/c/fb2d3a50a8f29a3c66682bb426144f40e32ab818
- https://git.kernel.org/stable/c/039fec48e062504f14845124a1a25eb199b2ddc0
- https://git.kernel.org/stable/c/372636debe852913529b1716f44addd94fff2d28
- https://git.kernel.org/stable/c/546c1796ad1ed0d87dab3c4b5156d75819be2316
- https://git.kernel.org/stable/c/8f4f68e788c3a7a696546291258bfa5fdb215523
- https://git.kernel.org/stable/c/c55fc098fd9d2dca475b82d00ffbcaf97879d77e
- https://git.kernel.org/stable/c/c9c1334697301c10e6918d747ed38abfbc0c96e7
- https://git.kernel.org/stable/c/e134f3aba98e6c801a693f540912c2d493718ddf
- https://git.kernel.org/stable/c/e97bf4ada7dddacd184c3e196bd063b0dc71b41d
- https://git.kernel.org/stable/c/fb2d3a50a8f29a3c66682bb426144f40e32ab818
Modified: 2025-09-16
CVE-2023-52814
In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Fix potential null pointer derefernce The amdgpu_ras_get_context may return NULL if device not support ras feature, so add check before using.
- https://git.kernel.org/stable/c/80285ae1ec8717b597b20de38866c29d84d321a1
- https://git.kernel.org/stable/c/9b70fc7d70e8ef7c4a65034c9487f58609e708a1
- https://git.kernel.org/stable/c/b0702ee4d811708251cdf54d4a1d3e888d365111
- https://git.kernel.org/stable/c/b93a25de28af153312f0fc979b0663fc4bd3442b
- https://git.kernel.org/stable/c/c11cf5e117f50f5a767054600885acd981449afe
- https://git.kernel.org/stable/c/da46e63482fdc5e35c008865c22ac64027f6f0c2
- https://git.kernel.org/stable/c/80285ae1ec8717b597b20de38866c29d84d321a1
- https://git.kernel.org/stable/c/9b70fc7d70e8ef7c4a65034c9487f58609e708a1
- https://git.kernel.org/stable/c/b0702ee4d811708251cdf54d4a1d3e888d365111
- https://git.kernel.org/stable/c/b93a25de28af153312f0fc979b0663fc4bd3442b
- https://git.kernel.org/stable/c/c11cf5e117f50f5a767054600885acd981449afe
- https://git.kernel.org/stable/c/da46e63482fdc5e35c008865c22ac64027f6f0c2
Modified: 2025-09-16
CVE-2023-52817
In the Linux kernel, the following vulnerability has been resolved:
drm/amdgpu: Fix a null pointer access when the smc_rreg pointer is NULL
In certain types of chips, such as VEGA20, reading the amdgpu_regs_smc file could result in an abnormal null pointer access when the smc_rreg pointer is NULL. Below are the steps to reproduce this issue and the corresponding exception log:
1. Navigate to the directory: /sys/kernel/debug/dri/0
2. Execute command: cat amdgpu_regs_smc
3. Exception Log::
[4005007.702554] BUG: kernel NULL pointer dereference, address: 0000000000000000
[4005007.702562] #PF: supervisor instruction fetch in kernel mode
[4005007.702567] #PF: error_code(0x0010) - not-present page
[4005007.702570] PGD 0 P4D 0
[4005007.702576] Oops: 0010 [#1] SMP NOPTI
[4005007.702581] CPU: 4 PID: 62563 Comm: cat Tainted: G OE 5.15.0-43-generic #46-Ubunt u
[4005007.702590] RIP: 0010:0x0
[4005007.702598] Code: Unable to access opcode bytes at RIP 0xffffffffffffffd6.
[4005007.702600] RSP: 0018:ffffa82b46d27da0 EFLAGS: 00010206
[4005007.702605] RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffa82b46d27e68
[4005007.702609] RDX: 0000000000000001 RSI: 0000000000000000 RDI: ffff9940656e0000
[4005007.702612] RBP: ffffa82b46d27dd8 R08: 0000000000000000 R09: ffff994060c07980
[4005007.702615] R10: 0000000000020000 R11: 0000000000000000 R12: 00007f5e06753000
[4005007.702618] R13: ffff9940656e0000 R14: ffffa82b46d27e68 R15: 00007f5e06753000
[4005007.702622] FS: 00007f5e0755b740(0000) GS:ffff99479d300000(0000) knlGS:0000000000000000
[4005007.702626] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[4005007.702629] CR2: ffffffffffffffd6 CR3: 00000003253fc000 CR4: 00000000003506e0
[4005007.702633] Call Trace:
[4005007.702636]
- https://git.kernel.org/stable/c/174f62a0aa15c211e60208b41ee9e7cdfb73d455
- https://git.kernel.org/stable/c/437e0fa907ba39b4d7eda863c03ea9cf48bd93a9
- https://git.kernel.org/stable/c/5104fdf50d326db2c1a994f8b35dcd46e63ae4ad
- https://git.kernel.org/stable/c/6c1b3d89a2dda79881726bb6e37af19c0936d736
- https://git.kernel.org/stable/c/820daf9ffe2b0afb804567b10983fb38bc5ae288
- https://git.kernel.org/stable/c/ba3c0796d292de84f2932cc5bbb0f771fc720996
- https://git.kernel.org/stable/c/bf2d51eedf03bd61e3556e35d74d49e2e6112398
- https://git.kernel.org/stable/c/f475d5502f33a6c5b149b0afe96316ad1962a64a
- https://git.kernel.org/stable/c/174f62a0aa15c211e60208b41ee9e7cdfb73d455
- https://git.kernel.org/stable/c/437e0fa907ba39b4d7eda863c03ea9cf48bd93a9
- https://git.kernel.org/stable/c/5104fdf50d326db2c1a994f8b35dcd46e63ae4ad
- https://git.kernel.org/stable/c/6c1b3d89a2dda79881726bb6e37af19c0936d736
- https://git.kernel.org/stable/c/820daf9ffe2b0afb804567b10983fb38bc5ae288
- https://git.kernel.org/stable/c/ba3c0796d292de84f2932cc5bbb0f771fc720996
- https://git.kernel.org/stable/c/bf2d51eedf03bd61e3556e35d74d49e2e6112398
- https://git.kernel.org/stable/c/f475d5502f33a6c5b149b0afe96316ad1962a64a
Modified: 2024-12-30
CVE-2023-52818
In the Linux kernel, the following vulnerability has been resolved: drm/amd: Fix UBSAN array-index-out-of-bounds for SMU7 For pptable structs that use flexible array sizes, use flexible arrays.
- https://git.kernel.org/stable/c/6dffdddfca818c02a42b6caa1d9845995f0a1f94
- https://git.kernel.org/stable/c/760efbca74a405dc439a013a5efaa9fadc95a8c3
- https://git.kernel.org/stable/c/8af28ae3acb736ada4ce3457662fa446cc913bb4
- https://git.kernel.org/stable/c/92a775e7c9707aed28782bafe636bf87675f5a97
- https://git.kernel.org/stable/c/acdb6830de02cf2873aeaccdf2d9bca4aee50e47
- https://git.kernel.org/stable/c/c847379a5d00078ad6fcb1c24230e72c5609342f
- https://git.kernel.org/stable/c/cfd8cd907fd94538561479a43aea455f5cf16928
- https://git.kernel.org/stable/c/e52e324a21341c97350d5f11de14721c1c609498
- https://git.kernel.org/stable/c/fc9ac0e8e0bcb3740c6eaad3a1a50c20016d422b
- https://git.kernel.org/stable/c/6dffdddfca818c02a42b6caa1d9845995f0a1f94
- https://git.kernel.org/stable/c/760efbca74a405dc439a013a5efaa9fadc95a8c3
- https://git.kernel.org/stable/c/8af28ae3acb736ada4ce3457662fa446cc913bb4
- https://git.kernel.org/stable/c/92a775e7c9707aed28782bafe636bf87675f5a97
- https://git.kernel.org/stable/c/acdb6830de02cf2873aeaccdf2d9bca4aee50e47
- https://git.kernel.org/stable/c/c847379a5d00078ad6fcb1c24230e72c5609342f
- https://git.kernel.org/stable/c/cfd8cd907fd94538561479a43aea455f5cf16928
- https://git.kernel.org/stable/c/e52e324a21341c97350d5f11de14721c1c609498
- https://git.kernel.org/stable/c/fc9ac0e8e0bcb3740c6eaad3a1a50c20016d422b
Modified: 2025-04-02
CVE-2023-52819
In the Linux kernel, the following vulnerability has been resolved: drm/amd: Fix UBSAN array-index-out-of-bounds for Polaris and Tonga For pptable structs that use flexible array sizes, use flexible arrays.
- https://git.kernel.org/stable/c/0f0e59075b5c22f1e871fbd508d6e4f495048356
- https://git.kernel.org/stable/c/60a00dfc7c5deafd1dd393beaf53224f7256dad6
- https://git.kernel.org/stable/c/7c68283f3166221af3df5791f0e13d3137a72216
- https://git.kernel.org/stable/c/8c1dbddbfcb051e82cea0c197c620f9dcdc38e92
- https://git.kernel.org/stable/c/a237675aa1e62bbfaa341c535331c8656a508fa1
- https://git.kernel.org/stable/c/a63fd579e7b1c3a9ebd6e6c494d49b1b6cf5515e
- https://git.kernel.org/stable/c/b3b8b7c040cf069da7afe11c5bd73b870b8f3d18
- https://git.kernel.org/stable/c/d0725232da777840703f5f1e22f2e3081d712aa4
- https://git.kernel.org/stable/c/d50a56749e5afdc63491b88f5153c1aae00d4679
- https://git.kernel.org/stable/c/0f0e59075b5c22f1e871fbd508d6e4f495048356
- https://git.kernel.org/stable/c/60a00dfc7c5deafd1dd393beaf53224f7256dad6
- https://git.kernel.org/stable/c/7c68283f3166221af3df5791f0e13d3137a72216
- https://git.kernel.org/stable/c/8c1dbddbfcb051e82cea0c197c620f9dcdc38e92
- https://git.kernel.org/stable/c/a237675aa1e62bbfaa341c535331c8656a508fa1
- https://git.kernel.org/stable/c/a63fd579e7b1c3a9ebd6e6c494d49b1b6cf5515e
- https://git.kernel.org/stable/c/b3b8b7c040cf069da7afe11c5bd73b870b8f3d18
- https://git.kernel.org/stable/c/d0725232da777840703f5f1e22f2e3081d712aa4
- https://git.kernel.org/stable/c/d50a56749e5afdc63491b88f5153c1aae00d4679
Modified: 2024-11-21
CVE-2023-52821
In the Linux kernel, the following vulnerability has been resolved: drm/panel: fix a possible null pointer dereference In versatile_panel_get_modes(), the return value of drm_mode_duplicate() is assigned to mode, which will lead to a NULL pointer dereference on failure of drm_mode_duplicate(). Add a check to avoid npd.
- https://git.kernel.org/stable/c/2381f6b628b3214f07375e0adf5ce17093c31190
- https://git.kernel.org/stable/c/4fa930ba046d20fc1899770396ee11e905fa96e4
- https://git.kernel.org/stable/c/79813cd59398015867d51e6d7dcc14d287d4c402
- https://git.kernel.org/stable/c/8a9dd36fcb4f3906982b82593393578db4479992
- https://git.kernel.org/stable/c/924e5814d1f84e6fa5cb19c6eceb69f066225229
- https://git.kernel.org/stable/c/c7dc0aca5962fb37dbea9769dd26ec37813faae1
- https://git.kernel.org/stable/c/2381f6b628b3214f07375e0adf5ce17093c31190
- https://git.kernel.org/stable/c/4fa930ba046d20fc1899770396ee11e905fa96e4
- https://git.kernel.org/stable/c/79813cd59398015867d51e6d7dcc14d287d4c402
- https://git.kernel.org/stable/c/8a9dd36fcb4f3906982b82593393578db4479992
- https://git.kernel.org/stable/c/924e5814d1f84e6fa5cb19c6eceb69f066225229
- https://git.kernel.org/stable/c/c7dc0aca5962fb37dbea9769dd26ec37813faae1
Modified: 2024-12-30
CVE-2023-52826
In the Linux kernel, the following vulnerability has been resolved: drm/panel/panel-tpo-tpg110: fix a possible null pointer dereference In tpg110_get_modes(), the return value of drm_mode_duplicate() is assigned to mode, which will lead to a NULL pointer dereference on failure of drm_mode_duplicate(). Add a check to avoid npd.
- https://git.kernel.org/stable/c/84c923d898905187ebfd4c0ef38cd1450af7e0ea
- https://git.kernel.org/stable/c/9268bfd76bebc85ff221691b61498cc16d75451c
- https://git.kernel.org/stable/c/9acc2bc00135e9ecd13a70ce1140e2673e504cdc
- https://git.kernel.org/stable/c/d0bc9ab0a161a9745273f5bf723733a8e6c57aca
- https://git.kernel.org/stable/c/eaede6900c0961b072669d6bd97fe8f90ed1900f
- https://git.kernel.org/stable/c/f22def5970c423ea7f87d5247bd0ef91416b0658
- https://git.kernel.org/stable/c/84c923d898905187ebfd4c0ef38cd1450af7e0ea
- https://git.kernel.org/stable/c/9268bfd76bebc85ff221691b61498cc16d75451c
- https://git.kernel.org/stable/c/9acc2bc00135e9ecd13a70ce1140e2673e504cdc
- https://git.kernel.org/stable/c/d0bc9ab0a161a9745273f5bf723733a8e6c57aca
- https://git.kernel.org/stable/c/eaede6900c0961b072669d6bd97fe8f90ed1900f
- https://git.kernel.org/stable/c/f22def5970c423ea7f87d5247bd0ef91416b0658
Modified: 2025-09-26
CVE-2023-52828
In the Linux kernel, the following vulnerability has been resolved: bpf: Detect IP == ksym.end as part of BPF program Now that bpf_throw kfunc is the first such call instruction that has noreturn semantics within the verifier, this also kicks in dead code elimination in unprecedented ways. For one, any instruction following a bpf_throw call will never be marked as seen. Moreover, if a callchain ends up throwing, any instructions after the call instruction to the eventually throwing subprog in callers will also never be marked as seen. The tempting way to fix this would be to emit extra 'int3' instructions which bump the jited_len of a program, and ensure that during runtime when a program throws, we can discover its boundaries even if the call instruction to bpf_throw (or to subprogs that always throw) is emitted as the final instruction in the program. An example of such a program would be this: do_something(): ... r0 = 0 exit foo(): r1 = 0 call bpf_throw r0 = 0 exit bar(cond): if r1 != 0 goto pc+2 call do_something exit call foo r0 = 0 // Never seen by verifier exit // main(ctx): r1 = ... call bar r0 = 0 exit Here, if we do end up throwing, the stacktrace would be the following: bpf_throw foo bar main In bar, the final instruction emitted will be the call to foo, as such, the return address will be the subsequent instruction (which the JIT emits as int3 on x86). This will end up lying outside the jited_len of the program, thus, when unwinding, we will fail to discover the return address as belonging to any program and end up in a panic due to the unreliable stack unwinding of BPF programs that we never expect. To remedy this case, make bpf_prog_ksym_find treat IP == ksym.end as part of the BPF program, so that is_bpf_text_address returns true when such a case occurs, and we are able to unwind reliably when the final instruction ends up being a call instruction.
- https://git.kernel.org/stable/c/327b92e8cb527ae097961ffd1610c720481947f5
- https://git.kernel.org/stable/c/6058e4829696412457729a00734969acc6fd1d18
- https://git.kernel.org/stable/c/66d9111f3517f85ef2af0337ece02683ce0faf21
- https://git.kernel.org/stable/c/821a7e4143af115b840ec199eb179537e18af922
- https://git.kernel.org/stable/c/aa42a7cb92647786719fe9608685da345883878f
- https://git.kernel.org/stable/c/cf353904a82873e952633fcac4385c2fcd3a46e1
- https://git.kernel.org/stable/c/327b92e8cb527ae097961ffd1610c720481947f5
- https://git.kernel.org/stable/c/6058e4829696412457729a00734969acc6fd1d18
- https://git.kernel.org/stable/c/66d9111f3517f85ef2af0337ece02683ce0faf21
- https://git.kernel.org/stable/c/821a7e4143af115b840ec199eb179537e18af922
- https://git.kernel.org/stable/c/aa42a7cb92647786719fe9608685da345883878f
- https://git.kernel.org/stable/c/cf353904a82873e952633fcac4385c2fcd3a46e1
Modified: 2026-01-05
CVE-2023-52832
In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: don't return unset power in ieee80211_get_tx_power() We can get a UBSAN warning if ieee80211_get_tx_power() returns the INT_MIN value mac80211 internally uses for "unset power level". UBSAN: signed-integer-overflow in net/wireless/nl80211.c:3816:5 -2147483648 * 100 cannot be represented in type 'int' CPU: 0 PID: 20433 Comm: insmod Tainted: G WC OE Call Trace: dump_stack+0x74/0x92 ubsan_epilogue+0x9/0x50 handle_overflow+0x8d/0xd0 __ubsan_handle_mul_overflow+0xe/0x10 nl80211_send_iface+0x688/0x6b0 [cfg80211] [...] cfg80211_register_wdev+0x78/0xb0 [cfg80211] cfg80211_netdev_notifier_call+0x200/0x620 [cfg80211] [...] ieee80211_if_add+0x60e/0x8f0 [mac80211] ieee80211_register_hw+0xda5/0x1170 [mac80211] In this case, simply return an error instead, to indicate that no data is available.
- https://git.kernel.org/stable/c/21a0f310a9f3bfd2b4cf4f382430e638607db846
- https://git.kernel.org/stable/c/2be24c47ac19bf639c48c082486c08888bd603c6
- https://git.kernel.org/stable/c/5a94cffe90e20e8fade0b9abd4370bd671fe87c7
- https://git.kernel.org/stable/c/717de20abdcd1d4993fa450e28b8086a352620ea
- https://git.kernel.org/stable/c/adc2474d823fe81d8da759207f4f1d3691aa775a
- https://git.kernel.org/stable/c/e160ab85166e77347d0cbe5149045cb25e83937f
- https://git.kernel.org/stable/c/1571120c44dbe5757aee1612c5b6097cdc42710f
- https://git.kernel.org/stable/c/21a0f310a9f3bfd2b4cf4f382430e638607db846
- https://git.kernel.org/stable/c/298e767362cade639b7121ecb3cc5345b6529f62
- https://git.kernel.org/stable/c/2be24c47ac19bf639c48c082486c08888bd603c6
- https://git.kernel.org/stable/c/5a94cffe90e20e8fade0b9abd4370bd671fe87c7
- https://git.kernel.org/stable/c/717de20abdcd1d4993fa450e28b8086a352620ea
- https://git.kernel.org/stable/c/adc2474d823fe81d8da759207f4f1d3691aa775a
- https://git.kernel.org/stable/c/e160ab85166e77347d0cbe5149045cb25e83937f
- https://git.kernel.org/stable/c/efeae5f4972f75d50002bc50eb112ab9e7069b18
Modified: 2024-12-31
CVE-2023-52833
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: btusb: Add date->evt_skb is NULL check fix crash because of null pointers [ 6104.969662] BUG: kernel NULL pointer dereference, address: 00000000000000c8 [ 6104.969667] #PF: supervisor read access in kernel mode [ 6104.969668] #PF: error_code(0x0000) - not-present page [ 6104.969670] PGD 0 P4D 0 [ 6104.969673] Oops: 0000 [#1] SMP NOPTI [ 6104.969684] RIP: 0010:btusb_mtk_hci_wmt_sync+0x144/0x220 [btusb] [ 6104.969688] RSP: 0018:ffffb8d681533d48 EFLAGS: 00010246 [ 6104.969689] RAX: 0000000000000000 RBX: ffff8ad560bb2000 RCX: 0000000000000006 [ 6104.969691] RDX: 0000000000000000 RSI: ffffb8d681533d08 RDI: 0000000000000000 [ 6104.969692] RBP: ffffb8d681533d70 R08: 0000000000000001 R09: 0000000000000001 [ 6104.969694] R10: 0000000000000001 R11: 00000000fa83b2da R12: ffff8ad461d1d7c0 [ 6104.969695] R13: 0000000000000000 R14: ffff8ad459618c18 R15: ffffb8d681533d90 [ 6104.969697] FS: 00007f5a1cab9d40(0000) GS:ffff8ad578200000(0000) knlGS:00000 [ 6104.969699] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 6104.969700] CR2: 00000000000000c8 CR3: 000000018620c001 CR4: 0000000000760ef0 [ 6104.969701] PKRU: 55555554 [ 6104.969702] Call Trace: [ 6104.969708] btusb_mtk_shutdown+0x44/0x80 [btusb] [ 6104.969732] hci_dev_do_close+0x470/0x5c0 [bluetooth] [ 6104.969748] hci_rfkill_set_block+0x56/0xa0 [bluetooth] [ 6104.969753] rfkill_set_block+0x92/0x160 [ 6104.969755] rfkill_fop_write+0x136/0x1e0 [ 6104.969759] __vfs_write+0x18/0x40 [ 6104.969761] vfs_write+0xdf/0x1c0 [ 6104.969763] ksys_write+0xb1/0xe0 [ 6104.969765] __x64_sys_write+0x1a/0x20 [ 6104.969769] do_syscall_64+0x51/0x180 [ 6104.969771] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 6104.969773] RIP: 0033:0x7f5a21f18fef [ 6104.9] RSP: 002b:00007ffeefe39010 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 6104.969780] RAX: ffffffffffffffda RBX: 000055c10a7560a0 RCX: 00007f5a21f18fef [ 6104.969781] RDX: 0000000000000008 RSI: 00007ffeefe39060 RDI: 0000000000000012 [ 6104.969782] RBP: 00007ffeefe39060 R08: 0000000000000000 R09: 0000000000000017 [ 6104.969784] R10: 00007ffeefe38d97 R11: 0000000000000293 R12: 0000000000000002 [ 6104.969785] R13: 00007ffeefe39220 R14: 00007ffeefe391a0 R15: 000055c10a72acf0
- https://git.kernel.org/stable/c/0048ddf045bddc4dacb3e783fd869a2f8fb5be30
- https://git.kernel.org/stable/c/13b1ebad4c175e6a9b0748acbf133c21a15d282a
- https://git.kernel.org/stable/c/624820f7c8826dd010e8b1963303c145f99816e9
- https://git.kernel.org/stable/c/9f8e4d1a4ca1179aaeb43f91f3e2a386e7e616b3
- https://git.kernel.org/stable/c/a556f2ef556a04790f67f2fa272f1a77336d15a0
- https://git.kernel.org/stable/c/f9de14bde56dcbb0765284c6dfc35842b021733c
- https://git.kernel.org/stable/c/0048ddf045bddc4dacb3e783fd869a2f8fb5be30
- https://git.kernel.org/stable/c/13b1ebad4c175e6a9b0748acbf133c21a15d282a
- https://git.kernel.org/stable/c/624820f7c8826dd010e8b1963303c145f99816e9
- https://git.kernel.org/stable/c/9f8e4d1a4ca1179aaeb43f91f3e2a386e7e616b3
- https://git.kernel.org/stable/c/a556f2ef556a04790f67f2fa272f1a77336d15a0
- https://git.kernel.org/stable/c/f9de14bde56dcbb0765284c6dfc35842b021733c
Modified: 2025-09-23
CVE-2023-52835
In the Linux kernel, the following vulnerability has been resolved: perf/core: Bail out early if the request AUX area is out of bound When perf-record with a large AUX area, e.g 4GB, it fails with: #perf record -C 0 -m ,4G -e arm_spe_0// -- sleep 1 failed to mmap with 12 (Cannot allocate memory) and it reveals a WARNING with __alloc_pages(): ------------[ cut here ]------------ WARNING: CPU: 44 PID: 17573 at mm/page_alloc.c:5568 __alloc_pages+0x1ec/0x248 Call trace: __alloc_pages+0x1ec/0x248 __kmalloc_large_node+0xc0/0x1f8 __kmalloc_node+0x134/0x1e8 rb_alloc_aux+0xe0/0x298 perf_mmap+0x440/0x660 mmap_region+0x308/0x8a8 do_mmap+0x3c0/0x528 vm_mmap_pgoff+0xf4/0x1b8 ksys_mmap_pgoff+0x18c/0x218 __arm64_sys_mmap+0x38/0x58 invoke_syscall+0x50/0x128 el0_svc_common.constprop.0+0x58/0x188 do_el0_svc+0x34/0x50 el0_svc+0x34/0x108 el0t_64_sync_handler+0xb8/0xc0 el0t_64_sync+0x1a4/0x1a8 'rb->aux_pages' allocated by kcalloc() is a pointer array which is used to maintains AUX trace pages. The allocated page for this array is physically contiguous (and virtually contiguous) with an order of 0..MAX_ORDER. If the size of pointer array crosses the limitation set by MAX_ORDER, it reveals a WARNING. So bail out early with -ENOMEM if the request AUX area is out of bound, e.g.: #perf record -C 0 -m ,4G -e arm_spe_0// -- sleep 1 failed to mmap with 12 (Cannot allocate memory)
- https://git.kernel.org/stable/c/1a2a4202c60fcdffbf04f259002ce9bff39edece
- https://git.kernel.org/stable/c/2424410f94a94d91230ced094062d859714c984a
- https://git.kernel.org/stable/c/2e905e608e38cf7f8dcddcf8a6036e91a78444cb
- https://git.kernel.org/stable/c/54aee5f15b83437f23b2b2469bcf21bdd9823916
- https://git.kernel.org/stable/c/788c0b3442ead737008934947730a6d1ff703734
- https://git.kernel.org/stable/c/8c504f615d7ed60ae035c51d0c789137ced6797f
- https://git.kernel.org/stable/c/9ce4e87a8efd37c85766ec08b15e885cab08553a
- https://git.kernel.org/stable/c/fd0df3f8719201dbe61a4d39083d5aecd705399a
- https://git.kernel.org/stable/c/1a2a4202c60fcdffbf04f259002ce9bff39edece
- https://git.kernel.org/stable/c/2424410f94a94d91230ced094062d859714c984a
- https://git.kernel.org/stable/c/2e905e608e38cf7f8dcddcf8a6036e91a78444cb
- https://git.kernel.org/stable/c/54aee5f15b83437f23b2b2469bcf21bdd9823916
- https://git.kernel.org/stable/c/788c0b3442ead737008934947730a6d1ff703734
- https://git.kernel.org/stable/c/8c504f615d7ed60ae035c51d0c789137ced6797f
- https://git.kernel.org/stable/c/9ce4e87a8efd37c85766ec08b15e885cab08553a
- https://git.kernel.org/stable/c/fd0df3f8719201dbe61a4d39083d5aecd705399a
Modified: 2025-09-23
CVE-2023-52836
In the Linux kernel, the following vulnerability has been resolved: locking/ww_mutex/test: Fix potential workqueue corruption In some cases running with the test-ww_mutex code, I was seeing odd behavior where sometimes it seemed flush_workqueue was returning before all the work threads were finished. Often this would cause strange crashes as the mutexes would be freed while they were being used. Looking at the code, there is a lifetime problem as the controlling thread that spawns the work allocates the "struct stress" structures that are passed to the workqueue threads. Then when the workqueue threads are finished, they free the stress struct that was passed to them. Unfortunately the workqueue work_struct node is in the stress struct. Which means the work_struct is freed before the work thread returns and while flush_workqueue is waiting. It seems like a better idea to have the controlling thread both allocate and free the stress structures, so that we can be sure we don't corrupt the workqueue by freeing the structure prematurely. So this patch reworks the test to do so, and with this change I no longer see the early flush_workqueue returns.
- https://git.kernel.org/stable/c/304a2c4aad0fff887ce493e4197bf9cbaf394479
- https://git.kernel.org/stable/c/9ed2d68b3925145f5f51c46559484881d6082f75
- https://git.kernel.org/stable/c/bccdd808902f8c677317cec47c306e42b93b849e
- https://git.kernel.org/stable/c/c56df79d68677cf062da1b6e3b33e74299a92dfc
- https://git.kernel.org/stable/c/d4d37c9e6a4dbcca958dabd99216550525c7e389
- https://git.kernel.org/stable/c/d8267cabbe1bed15ccf8b0e684c528bf8eeef715
- https://git.kernel.org/stable/c/dcd85e3c929368076a7592b27f541e0da8b427f5
- https://git.kernel.org/stable/c/e36407713163363e65566e7af0abe207d5f59a0c
- https://git.kernel.org/stable/c/e89d0ed45a419c485bae999426ecf92697cbdda3
- https://git.kernel.org/stable/c/304a2c4aad0fff887ce493e4197bf9cbaf394479
- https://git.kernel.org/stable/c/9ed2d68b3925145f5f51c46559484881d6082f75
- https://git.kernel.org/stable/c/bccdd808902f8c677317cec47c306e42b93b849e
- https://git.kernel.org/stable/c/c56df79d68677cf062da1b6e3b33e74299a92dfc
- https://git.kernel.org/stable/c/d4d37c9e6a4dbcca958dabd99216550525c7e389
- https://git.kernel.org/stable/c/d8267cabbe1bed15ccf8b0e684c528bf8eeef715
- https://git.kernel.org/stable/c/dcd85e3c929368076a7592b27f541e0da8b427f5
- https://git.kernel.org/stable/c/e36407713163363e65566e7af0abe207d5f59a0c
- https://git.kernel.org/stable/c/e89d0ed45a419c485bae999426ecf92697cbdda3
Modified: 2025-04-02
CVE-2023-52838
In the Linux kernel, the following vulnerability has been resolved: fbdev: imsttfb: fix a resource leak in probe I've re-written the error handling but the bug is that if init_imstt() fails we need to call iounmap(par->cmap_regs).
- https://git.kernel.org/stable/c/18d26f9baca7d0d309303e3074a2252b8310884a
- https://git.kernel.org/stable/c/382e1931e0c9cd58a5a8519cdc6cd9dc4d82b485
- https://git.kernel.org/stable/c/6c66d737b2726ac7784269ddf32a31634f8f269d
- https://git.kernel.org/stable/c/7bc7b82fb2191b0d50a80ee4e27030918767dd1d
- https://git.kernel.org/stable/c/8e4b510fe91782522b7ca0ca881b663b5d35e513
- https://git.kernel.org/stable/c/a4dfebec32ec6d420a5506dd56a7834c91be28e4
- https://git.kernel.org/stable/c/aba6ab57a910ad4b940c2024d15f2cdbf5b7f76b
- https://git.kernel.org/stable/c/b346a531159d08c564a312a9eaeea691704f3c00
- https://git.kernel.org/stable/c/18d26f9baca7d0d309303e3074a2252b8310884a
- https://git.kernel.org/stable/c/382e1931e0c9cd58a5a8519cdc6cd9dc4d82b485
- https://git.kernel.org/stable/c/6c66d737b2726ac7784269ddf32a31634f8f269d
- https://git.kernel.org/stable/c/7bc7b82fb2191b0d50a80ee4e27030918767dd1d
- https://git.kernel.org/stable/c/8e4b510fe91782522b7ca0ca881b663b5d35e513
- https://git.kernel.org/stable/c/a4dfebec32ec6d420a5506dd56a7834c91be28e4
- https://git.kernel.org/stable/c/aba6ab57a910ad4b940c2024d15f2cdbf5b7f76b
- https://git.kernel.org/stable/c/b346a531159d08c564a312a9eaeea691704f3c00
Modified: 2024-12-31
CVE-2023-52840
In the Linux kernel, the following vulnerability has been resolved: Input: synaptics-rmi4 - fix use after free in rmi_unregister_function() The put_device() calls rmi_release_function() which frees "fn" so the dereference on the next line "fn->num_of_irqs" is a use after free. Move the put_device() to the end to fix this.
- https://git.kernel.org/stable/c/2f236d8638f5b43e0c72919a6a27fe286c32053f
- https://git.kernel.org/stable/c/303766bb92c5c225cf40f9bbbe7e29749406e2f2
- https://git.kernel.org/stable/c/50d12253666195a14c6cd2b81c376e2dbeedbdff
- https://git.kernel.org/stable/c/6c71e065befb2fae8f1461559b940c04e1071bd5
- https://git.kernel.org/stable/c/7082b1fb5321037bc11ba1cf2d7ed23c6b2b521f
- https://git.kernel.org/stable/c/c8e639f5743cf4b01f8c65e0df075fe4d782b585
- https://git.kernel.org/stable/c/cc56c4d17721dcb10ad4e9c9266e449be1462683
- https://git.kernel.org/stable/c/eb988e46da2e4eae89f5337e047ce372fe33d5b1
- https://git.kernel.org/stable/c/2f236d8638f5b43e0c72919a6a27fe286c32053f
- https://git.kernel.org/stable/c/303766bb92c5c225cf40f9bbbe7e29749406e2f2
- https://git.kernel.org/stable/c/50d12253666195a14c6cd2b81c376e2dbeedbdff
- https://git.kernel.org/stable/c/6c71e065befb2fae8f1461559b940c04e1071bd5
- https://git.kernel.org/stable/c/7082b1fb5321037bc11ba1cf2d7ed23c6b2b521f
- https://git.kernel.org/stable/c/c8e639f5743cf4b01f8c65e0df075fe4d782b585
- https://git.kernel.org/stable/c/cc56c4d17721dcb10ad4e9c9266e449be1462683
- https://git.kernel.org/stable/c/eb988e46da2e4eae89f5337e047ce372fe33d5b1
Modified: 2024-12-31
CVE-2023-52841
In the Linux kernel, the following vulnerability has been resolved: media: vidtv: mux: Add check and kfree for kstrdup Add check for the return value of kstrdup() and return the error if it fails in order to avoid NULL pointer dereference. Moreover, use kfree() in the later error handling in order to avoid memory leak.
- https://git.kernel.org/stable/c/1fd6eb12642e0c32692924ff359c07de4b781d78
- https://git.kernel.org/stable/c/64863ba8e6b7651d994c6e6d506cc8aa2ac45edb
- https://git.kernel.org/stable/c/980be4c3b0d51c0f873fd750117774561c66cf68
- https://git.kernel.org/stable/c/a254ee1ddc592ae1efcce96b8c014e1bd2d5a2b4
- https://git.kernel.org/stable/c/aae7598aff291d4d140be1355aa20930af948785
- https://git.kernel.org/stable/c/cb13001411999adb158b39e76d94705eb2da100d
- https://git.kernel.org/stable/c/1fd6eb12642e0c32692924ff359c07de4b781d78
- https://git.kernel.org/stable/c/64863ba8e6b7651d994c6e6d506cc8aa2ac45edb
- https://git.kernel.org/stable/c/980be4c3b0d51c0f873fd750117774561c66cf68
- https://git.kernel.org/stable/c/a254ee1ddc592ae1efcce96b8c014e1bd2d5a2b4
- https://git.kernel.org/stable/c/aae7598aff291d4d140be1355aa20930af948785
- https://git.kernel.org/stable/c/cb13001411999adb158b39e76d94705eb2da100d
Modified: 2025-09-24
CVE-2023-52843
In the Linux kernel, the following vulnerability has been resolved: llc: verify mac len before reading mac header LLC reads the mac header with eth_hdr without verifying that the skb has an Ethernet header. Syzbot was able to enter llc_rcv on a tun device. Tun can insert packets without mac len and with user configurable skb->protocol (passing a tun_pi header when not configuring IFF_NO_PI). BUG: KMSAN: uninit-value in llc_station_ac_send_test_r net/llc/llc_station.c:81 [inline] BUG: KMSAN: uninit-value in llc_station_rcv+0x6fb/0x1290 net/llc/llc_station.c:111 llc_station_ac_send_test_r net/llc/llc_station.c:81 [inline] llc_station_rcv+0x6fb/0x1290 net/llc/llc_station.c:111 llc_rcv+0xc5d/0x14a0 net/llc/llc_input.c:218 __netif_receive_skb_one_core net/core/dev.c:5523 [inline] __netif_receive_skb+0x1a6/0x5a0 net/core/dev.c:5637 netif_receive_skb_internal net/core/dev.c:5723 [inline] netif_receive_skb+0x58/0x660 net/core/dev.c:5782 tun_rx_batched+0x3ee/0x980 drivers/net/tun.c:1555 tun_get_user+0x54c5/0x69c0 drivers/net/tun.c:2002 Add a mac_len test before all three eth_hdr(skb) calls under net/llc. There are further uses in include/net/llc_pdu.h. All these are protected by a test skb->protocol == ETH_P_802_2. Which does not protect against this tun scenario. But the mac_len test added in this patch in llc_fixup_skb will indirectly protect those too. That is called from llc_rcv before any other LLC code. It is tempting to just add a blanket mac_len check in llc_rcv, but not sure whether that could break valid LLC paths that do not assume an Ethernet header. 802.2 LLC may be used on top of non-802.3 protocols in principle. The below referenced commit shows that used to, on top of Token Ring. At least one of the three eth_hdr uses goes back to before the start of git history. But the one that syzbot exercises is introduced in this commit. That commit is old enough (2008), that effectively all stable kernels should receive this.
- https://git.kernel.org/stable/c/0a720d0259ad3521ec6c9e4199f9f6fc75bac77a
- https://git.kernel.org/stable/c/352887b3edd007cf9b0abc30fe9d98622acd859b
- https://git.kernel.org/stable/c/3a2653828ffc6101aef80bf58d5b77484239f779
- https://git.kernel.org/stable/c/7b3ba18703a63f6fd487183b9262b08e5632da1b
- https://git.kernel.org/stable/c/900a4418e3f66a32db6baaf23f92b99c20ae6535
- https://git.kernel.org/stable/c/9a3f9054a5227d7567cba1fb821df48ccecad10c
- https://git.kernel.org/stable/c/cbdcdf42d15dac74c7287679fb2a9d955f8feb1f
- https://git.kernel.org/stable/c/f980e9a57dfb9530f1f4ee41a2420f2a256d7b29
- https://git.kernel.org/stable/c/ff5cb6a4f0c6d7fbdc84858323fb4b7af32cfd79
- https://git.kernel.org/stable/c/0a720d0259ad3521ec6c9e4199f9f6fc75bac77a
- https://git.kernel.org/stable/c/352887b3edd007cf9b0abc30fe9d98622acd859b
- https://git.kernel.org/stable/c/3a2653828ffc6101aef80bf58d5b77484239f779
- https://git.kernel.org/stable/c/7b3ba18703a63f6fd487183b9262b08e5632da1b
- https://git.kernel.org/stable/c/900a4418e3f66a32db6baaf23f92b99c20ae6535
- https://git.kernel.org/stable/c/9a3f9054a5227d7567cba1fb821df48ccecad10c
- https://git.kernel.org/stable/c/cbdcdf42d15dac74c7287679fb2a9d955f8feb1f
- https://git.kernel.org/stable/c/f980e9a57dfb9530f1f4ee41a2420f2a256d7b29
- https://git.kernel.org/stable/c/ff5cb6a4f0c6d7fbdc84858323fb4b7af32cfd79
Modified: 2025-04-02
CVE-2023-52844
In the Linux kernel, the following vulnerability has been resolved: media: vidtv: psi: Add check for kstrdup Add check for the return value of kstrdup() and return the error if it fails in order to avoid NULL pointer dereference.
- https://git.kernel.org/stable/c/3387490c89b10aeb4e71d78b65dbc9ba4b2385b9
- https://git.kernel.org/stable/c/5c26aae3723965c291c65dd2ecad6a3240d422b0
- https://git.kernel.org/stable/c/5cfcc8de7d733a1137b86954cc28ce99972311ad
- https://git.kernel.org/stable/c/76a2c5df6ca8bd8ada45e953b8c72b746f42918d
- https://git.kernel.org/stable/c/a51335704a3f90eaf23a6864faefca34b382490a
- https://git.kernel.org/stable/c/d17269fb9161995303985ab2fe6f16cfb72152f9
- https://git.kernel.org/stable/c/3387490c89b10aeb4e71d78b65dbc9ba4b2385b9
- https://git.kernel.org/stable/c/5c26aae3723965c291c65dd2ecad6a3240d422b0
- https://git.kernel.org/stable/c/5cfcc8de7d733a1137b86954cc28ce99972311ad
- https://git.kernel.org/stable/c/76a2c5df6ca8bd8ada45e953b8c72b746f42918d
- https://git.kernel.org/stable/c/a51335704a3f90eaf23a6864faefca34b382490a
- https://git.kernel.org/stable/c/d17269fb9161995303985ab2fe6f16cfb72152f9
Modified: 2025-01-31
CVE-2023-52845
In the Linux kernel, the following vulnerability has been resolved: tipc: Change nla_policy for bearer-related names to NLA_NUL_STRING syzbot reported the following uninit-value access issue [1]: ===================================================== BUG: KMSAN: uninit-value in strlen lib/string.c:418 [inline] BUG: KMSAN: uninit-value in strstr+0xb8/0x2f0 lib/string.c:756 strlen lib/string.c:418 [inline] strstr+0xb8/0x2f0 lib/string.c:756 tipc_nl_node_reset_link_stats+0x3ea/0xb50 net/tipc/node.c:2595 genl_family_rcv_msg_doit net/netlink/genetlink.c:971 [inline] genl_family_rcv_msg net/netlink/genetlink.c:1051 [inline] genl_rcv_msg+0x11ec/0x1290 net/netlink/genetlink.c:1066 netlink_rcv_skb+0x371/0x650 net/netlink/af_netlink.c:2545 genl_rcv+0x40/0x60 net/netlink/genetlink.c:1075 netlink_unicast_kernel net/netlink/af_netlink.c:1342 [inline] netlink_unicast+0xf47/0x1250 net/netlink/af_netlink.c:1368 netlink_sendmsg+0x1238/0x13d0 net/netlink/af_netlink.c:1910 sock_sendmsg_nosec net/socket.c:730 [inline] sock_sendmsg net/socket.c:753 [inline] ____sys_sendmsg+0x9c2/0xd60 net/socket.c:2541 ___sys_sendmsg+0x28d/0x3c0 net/socket.c:2595 __sys_sendmsg net/socket.c:2624 [inline] __do_sys_sendmsg net/socket.c:2633 [inline] __se_sys_sendmsg net/socket.c:2631 [inline] __x64_sys_sendmsg+0x307/0x490 net/socket.c:2631 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x41/0xc0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x63/0xcd Uninit was created at: slab_post_alloc_hook+0x12f/0xb70 mm/slab.h:767 slab_alloc_node mm/slub.c:3478 [inline] kmem_cache_alloc_node+0x577/0xa80 mm/slub.c:3523 kmalloc_reserve+0x13d/0x4a0 net/core/skbuff.c:559 __alloc_skb+0x318/0x740 net/core/skbuff.c:650 alloc_skb include/linux/skbuff.h:1286 [inline] netlink_alloc_large_skb net/netlink/af_netlink.c:1214 [inline] netlink_sendmsg+0xb34/0x13d0 net/netlink/af_netlink.c:1885 sock_sendmsg_nosec net/socket.c:730 [inline] sock_sendmsg net/socket.c:753 [inline] ____sys_sendmsg+0x9c2/0xd60 net/socket.c:2541 ___sys_sendmsg+0x28d/0x3c0 net/socket.c:2595 __sys_sendmsg net/socket.c:2624 [inline] __do_sys_sendmsg net/socket.c:2633 [inline] __se_sys_sendmsg net/socket.c:2631 [inline] __x64_sys_sendmsg+0x307/0x490 net/socket.c:2631 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x41/0xc0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x63/0xcd TIPC bearer-related names including link names must be null-terminated strings. If a link name which is not null-terminated is passed through netlink, strstr() and similar functions can cause buffer overrun. This causes the above issue. This patch changes the nla_policy for bearer-related names from NLA_STRING to NLA_NUL_STRING. This resolves the issue by ensuring that only null-terminated strings are accepted as bearer-related names. syzbot reported similar uninit-value issue related to bearer names [2]. The root cause of this issue is that a non-null-terminated bearer name was passed. This patch also resolved this issue.
- https://git.kernel.org/stable/c/19b3f72a41a8751e26bffc093bb7e1cef29ad579
- https://git.kernel.org/stable/c/2199260c42e6fbc5af8adae3bf78e623407c91b0
- https://git.kernel.org/stable/c/2426425d686b43adbc4f2f4a367b494f06f159d6
- https://git.kernel.org/stable/c/3907b89cd17fcc23e9a80789c36856f00ece0ba8
- https://git.kernel.org/stable/c/4c731e98fe4d678e87ba3e4d45d3cf0a5a193dc4
- https://git.kernel.org/stable/c/560992f41c0cea44b7603bc9e6c73bffbf6b5709
- https://git.kernel.org/stable/c/6744008c354bca2e4686a5b6056ee6b535d9f67d
- https://git.kernel.org/stable/c/abc1582119e8c4af14cedb0db6541fd603f45a04
- https://git.kernel.org/stable/c/b33d130f07f1decd756b849ab03c23d11d4dd294
- https://git.kernel.org/stable/c/19b3f72a41a8751e26bffc093bb7e1cef29ad579
- https://git.kernel.org/stable/c/2199260c42e6fbc5af8adae3bf78e623407c91b0
- https://git.kernel.org/stable/c/2426425d686b43adbc4f2f4a367b494f06f159d6
- https://git.kernel.org/stable/c/3907b89cd17fcc23e9a80789c36856f00ece0ba8
- https://git.kernel.org/stable/c/4c731e98fe4d678e87ba3e4d45d3cf0a5a193dc4
- https://git.kernel.org/stable/c/560992f41c0cea44b7603bc9e6c73bffbf6b5709
- https://git.kernel.org/stable/c/6744008c354bca2e4686a5b6056ee6b535d9f67d
- https://git.kernel.org/stable/c/abc1582119e8c4af14cedb0db6541fd603f45a04
- https://git.kernel.org/stable/c/b33d130f07f1decd756b849ab03c23d11d4dd294
Modified: 2024-12-31
CVE-2023-52846
In the Linux kernel, the following vulnerability has been resolved: hsr: Prevent use after free in prp_create_tagged_frame() The prp_fill_rct() function can fail. In that situation, it frees the skb and returns NULL. Meanwhile on the success path, it returns the original skb. So it's straight forward to fix bug by using the returned value.
- https://git.kernel.org/stable/c/1787b9f0729d318d67cf7c5a95f0c3dba9a7cc18
- https://git.kernel.org/stable/c/6086258bd5ea7b5c706ff62da42b8e271b2401db
- https://git.kernel.org/stable/c/876f8ab52363f649bcc74072157dfd7adfbabc0d
- https://git.kernel.org/stable/c/a1a485e45d24b1cd8fe834fd6f1b06e2903827da
- https://git.kernel.org/stable/c/d103fb6726904e353b4773188ee3d3acb4078363
- https://git.kernel.org/stable/c/ddf4e04e946aaa6c458b8b6829617cc44af2bffd
- https://git.kernel.org/stable/c/1787b9f0729d318d67cf7c5a95f0c3dba9a7cc18
- https://git.kernel.org/stable/c/6086258bd5ea7b5c706ff62da42b8e271b2401db
- https://git.kernel.org/stable/c/876f8ab52363f649bcc74072157dfd7adfbabc0d
- https://git.kernel.org/stable/c/a1a485e45d24b1cd8fe834fd6f1b06e2903827da
- https://git.kernel.org/stable/c/d103fb6726904e353b4773188ee3d3acb4078363
- https://git.kernel.org/stable/c/ddf4e04e946aaa6c458b8b6829617cc44af2bffd
Modified: 2025-03-04
CVE-2023-52847
In the Linux kernel, the following vulnerability has been resolved: media: bttv: fix use after free error due to btv->timeout timer There may be some a race condition between timer function bttv_irq_timeout and bttv_remove. The timer is setup in probe and there is no timer_delete operation in remove function. When it hit kfree btv, the function might still be invoked, which will cause use after free bug. This bug is found by static analysis, it may be false positive. Fix it by adding del_timer_sync invoking to the remove function. cpu0 cpu1 bttv_probe ->timer_setup ->bttv_set_dma ->mod_timer; bttv_remove ->kfree(btv); ->bttv_irq_timeout ->USE btv
- https://git.kernel.org/stable/c/1871014d6ef4812ad11ef7d838d73ce09d632267
- https://git.kernel.org/stable/c/20568d06f6069cb835e05eed432edf962645d226
- https://git.kernel.org/stable/c/2f3d9198cdae1cb079ec8652f4defacd481eab2b
- https://git.kernel.org/stable/c/51c94256a83fe4e17406c66ff3e1ad7d242d8574
- https://git.kernel.org/stable/c/847599fffa528b2cdec4e21b6bf7586dad982132
- https://git.kernel.org/stable/c/b35fdade92c5058a5e727e233fe263b828de2c9a
- https://git.kernel.org/stable/c/bbc3b8dd2cb7817e703f112d988e4f4728f0f2a9
- https://git.kernel.org/stable/c/bd5b50b329e850d467e7bcc07b2b6bde3752fbda
- https://git.kernel.org/stable/c/1871014d6ef4812ad11ef7d838d73ce09d632267
- https://git.kernel.org/stable/c/20568d06f6069cb835e05eed432edf962645d226
- https://git.kernel.org/stable/c/2f3d9198cdae1cb079ec8652f4defacd481eab2b
- https://git.kernel.org/stable/c/51c94256a83fe4e17406c66ff3e1ad7d242d8574
- https://git.kernel.org/stable/c/847599fffa528b2cdec4e21b6bf7586dad982132
- https://git.kernel.org/stable/c/b35fdade92c5058a5e727e233fe263b828de2c9a
- https://git.kernel.org/stable/c/bbc3b8dd2cb7817e703f112d988e4f4728f0f2a9
- https://git.kernel.org/stable/c/bd5b50b329e850d467e7bcc07b2b6bde3752fbda
Modified: 2025-09-26
CVE-2023-52853
In the Linux kernel, the following vulnerability has been resolved: hid: cp2112: Fix duplicate workqueue initialization Previously the cp2112 driver called INIT_DELAYED_WORK within cp2112_gpio_irq_startup, resulting in duplicate initilizations of the workqueue on subsequent IRQ startups following an initial request. This resulted in a warning in set_work_data in workqueue.c, as well as a rare NULL dereference within process_one_work in workqueue.c. Initialize the workqueue within _probe instead.
- https://git.kernel.org/stable/c/012d0c66f9392a99232ac28217229f32dd3a70cf
- https://git.kernel.org/stable/c/3d959406c8fff2334d83d0c352d54fd6f5b2e7cd
- https://git.kernel.org/stable/c/727203e6e7e7020e1246fc1628cbdb8d90177819
- https://git.kernel.org/stable/c/bafb12b629b7c3ad59812dd1ac1b0618062e0e38
- https://git.kernel.org/stable/c/df0daac2709473531d6a3472997cc65301ac06d6
- https://git.kernel.org/stable/c/e3c2d2d144c082dd71596953193adf9891491f42
- https://git.kernel.org/stable/c/eb1121fac7986b30915ba20c5a04cc01fdcf160c
- https://git.kernel.org/stable/c/fb5718bc67337dde1528661f419ffcf275757592
- https://git.kernel.org/stable/c/012d0c66f9392a99232ac28217229f32dd3a70cf
- https://git.kernel.org/stable/c/3d959406c8fff2334d83d0c352d54fd6f5b2e7cd
- https://git.kernel.org/stable/c/727203e6e7e7020e1246fc1628cbdb8d90177819
- https://git.kernel.org/stable/c/bafb12b629b7c3ad59812dd1ac1b0618062e0e38
- https://git.kernel.org/stable/c/df0daac2709473531d6a3472997cc65301ac06d6
- https://git.kernel.org/stable/c/e3c2d2d144c082dd71596953193adf9891491f42
- https://git.kernel.org/stable/c/eb1121fac7986b30915ba20c5a04cc01fdcf160c
- https://git.kernel.org/stable/c/fb5718bc67337dde1528661f419ffcf275757592
Modified: 2025-02-03
CVE-2023-52854
In the Linux kernel, the following vulnerability has been resolved: padata: Fix refcnt handling in padata_free_shell() In a high-load arm64 environment, the pcrypt_aead01 test in LTP can lead to system UAF (Use-After-Free) issues. Due to the lengthy analysis of the pcrypt_aead01 function call, I'll describe the problem scenario using a simplified model: Suppose there's a user of padata named `user_function` that adheres to the padata requirement of calling `padata_free_shell` after `serial()` has been invoked, as demonstrated in the following code: ```c struct request { struct padata_priv padata; struct completion *done; }; void parallel(struct padata_priv *padata) { do_something(); } void serial(struct padata_priv *padata) { struct request *request = container_of(padata, struct request, padata); complete(request->done); } void user_function() { DECLARE_COMPLETION(done) padata->parallel = parallel; padata->serial = serial; padata_do_parallel(); wait_for_completion(&done); padata_free_shell(); } ``` In the corresponding padata.c file, there's the following code: ```c static void padata_serial_worker(struct work_struct *serial_work) { ... cnt = 0; while (!list_empty(&local_list)) { ... padata->serial(padata); cnt++; } local_bh_enable(); if (refcount_sub_and_test(cnt, &pd->refcnt)) padata_free_pd(pd); } ``` Because of the high system load and the accumulation of unexecuted softirq at this moment, `local_bh_enable()` in padata takes longer to execute than usual. Subsequently, when accessing `pd->refcnt`, `pd` has already been released by `padata_free_shell()`, resulting in a UAF issue with `pd->refcnt`. The fix is straightforward: add `refcount_dec_and_test` before calling `padata_free_pd` in `padata_free_shell`.
- https://git.kernel.org/stable/c/0dd34a7ad395dbcf6ae60e48e9786050e25b9bc5
- https://git.kernel.org/stable/c/1734a79e951914f1db2c65e635012a35db1c674b
- https://git.kernel.org/stable/c/1e901bcb8af19416b65f5063a4af7996e5a51d7f
- https://git.kernel.org/stable/c/41aad9d6953984d134fc50f631f24ef476875d4d
- https://git.kernel.org/stable/c/7ddc21e317b360c3444de3023bcc83b85fabae2f
- https://git.kernel.org/stable/c/c7c26d0ef5d20f00dbb2ae3befcabbe0efa77275
- https://git.kernel.org/stable/c/0dd34a7ad395dbcf6ae60e48e9786050e25b9bc5
- https://git.kernel.org/stable/c/1734a79e951914f1db2c65e635012a35db1c674b
- https://git.kernel.org/stable/c/1e901bcb8af19416b65f5063a4af7996e5a51d7f
- https://git.kernel.org/stable/c/41aad9d6953984d134fc50f631f24ef476875d4d
- https://git.kernel.org/stable/c/7ddc21e317b360c3444de3023bcc83b85fabae2f
- https://git.kernel.org/stable/c/c7c26d0ef5d20f00dbb2ae3befcabbe0efa77275
Modified: 2025-04-02
CVE-2023-52855
In the Linux kernel, the following vulnerability has been resolved: usb: dwc2: fix possible NULL pointer dereference caused by driver concurrency In _dwc2_hcd_urb_enqueue(), "urb->hcpriv = NULL" is executed without holding the lock "hsotg->lock". In _dwc2_hcd_urb_dequeue(): spin_lock_irqsave(&hsotg->lock, flags); ... if (!urb->hcpriv) { dev_dbg(hsotg->dev, "## urb->hcpriv is NULL ##\n"); goto out; } rc = dwc2_hcd_urb_dequeue(hsotg, urb->hcpriv); // Use urb->hcpriv ... out: spin_unlock_irqrestore(&hsotg->lock, flags); When _dwc2_hcd_urb_enqueue() and _dwc2_hcd_urb_dequeue() are concurrently executed, the NULL check of "urb->hcpriv" can be executed before "urb->hcpriv = NULL". After urb->hcpriv is NULL, it can be used in the function call to dwc2_hcd_urb_dequeue(), which can cause a NULL pointer dereference. This possible bug is found by an experimental static analysis tool developed by myself. This tool analyzes the locking APIs to extract function pairs that can be concurrently executed, and then analyzes the instructions in the paired functions to identify possible concurrency bugs including data races and atomicity violations. The above possible bug is reported, when my tool analyzes the source code of Linux 6.5. To fix this possible bug, "urb->hcpriv = NULL" should be executed with holding the lock "hsotg->lock". After using this patch, my tool never reports the possible bug, with the kernelconfiguration allyesconfig for x86_64. Because I have no associated hardware, I cannot test the patch in runtime testing, and just verify it according to the code logic.
- https://git.kernel.org/stable/c/14c9ec34e8118fbffd7f5431814d767726323e72
- https://git.kernel.org/stable/c/3e851a77a13ce944d703721793f49ee82622986d
- https://git.kernel.org/stable/c/64c47749fc7507ed732e155c958253968c1d275e
- https://git.kernel.org/stable/c/6b21a22728852d020a6658d39cd7bb7e14b07790
- https://git.kernel.org/stable/c/a7bee9598afb38004841a41dd8fe68c1faff4e90
- https://git.kernel.org/stable/c/bdb3dd4096302d6b87441fdc528439f171b04be6
- https://git.kernel.org/stable/c/ef307bc6ef04e8c1ea843231db58e3afaafa9fa6
- https://git.kernel.org/stable/c/fcaafb574fc88a52dce817f039f7ff2f9da38001
- https://git.kernel.org/stable/c/fed492aa6493a91a77ebd51da6fb939c98d94a0d
- https://git.kernel.org/stable/c/14c9ec34e8118fbffd7f5431814d767726323e72
- https://git.kernel.org/stable/c/3e851a77a13ce944d703721793f49ee82622986d
- https://git.kernel.org/stable/c/64c47749fc7507ed732e155c958253968c1d275e
- https://git.kernel.org/stable/c/6b21a22728852d020a6658d39cd7bb7e14b07790
- https://git.kernel.org/stable/c/a7bee9598afb38004841a41dd8fe68c1faff4e90
- https://git.kernel.org/stable/c/bdb3dd4096302d6b87441fdc528439f171b04be6
- https://git.kernel.org/stable/c/ef307bc6ef04e8c1ea843231db58e3afaafa9fa6
- https://git.kernel.org/stable/c/fcaafb574fc88a52dce817f039f7ff2f9da38001
- https://git.kernel.org/stable/c/fed492aa6493a91a77ebd51da6fb939c98d94a0d
Modified: 2025-04-02
CVE-2023-52858
In the Linux kernel, the following vulnerability has been resolved: clk: mediatek: clk-mt7629: Add check for mtk_alloc_clk_data Add the check for the return value of mtk_alloc_clk_data() in order to avoid NULL pointer dereference.
- https://git.kernel.org/stable/c/1d89430fc3158f872d492f1b88d07262f48290c0
- https://git.kernel.org/stable/c/2befa515c1bb6cdd33c262b909d93d1973a219aa
- https://git.kernel.org/stable/c/4f861b63945e076f9f003a5fad958174096df1ee
- https://git.kernel.org/stable/c/5fbea47eebff5daeca7d918c99289bcd3ae4dc8d
- https://git.kernel.org/stable/c/a836efc21ef04608333d6d05753e558ebd1f85d0
- https://git.kernel.org/stable/c/e8ae4b49dd9cfde69d8de8c0c0cd7cf1b004482e
- https://git.kernel.org/stable/c/e964d21dc034b650d719c4ea39564bec72b42f94
- https://git.kernel.org/stable/c/1d89430fc3158f872d492f1b88d07262f48290c0
- https://git.kernel.org/stable/c/2befa515c1bb6cdd33c262b909d93d1973a219aa
- https://git.kernel.org/stable/c/4f861b63945e076f9f003a5fad958174096df1ee
- https://git.kernel.org/stable/c/5fbea47eebff5daeca7d918c99289bcd3ae4dc8d
- https://git.kernel.org/stable/c/a836efc21ef04608333d6d05753e558ebd1f85d0
- https://git.kernel.org/stable/c/e8ae4b49dd9cfde69d8de8c0c0cd7cf1b004482e
- https://git.kernel.org/stable/c/e964d21dc034b650d719c4ea39564bec72b42f94
Modified: 2025-01-14
CVE-2023-52863
In the Linux kernel, the following vulnerability has been resolved: hwmon: (axi-fan-control) Fix possible NULL pointer dereference axi_fan_control_irq_handler(), dependent on the private axi_fan_control_data structure, might be called before the hwmon device is registered. That will cause an "Unable to handle kernel NULL pointer dereference" error.
- https://git.kernel.org/stable/c/2a5b3370a1d9750eca325292e291c8c7cb8cf2e0
- https://git.kernel.org/stable/c/33de53a2706066d526173dc743faf43d92c62105
- https://git.kernel.org/stable/c/7d870088db4863c514a7f8751cd593751983029a
- https://git.kernel.org/stable/c/b3e7eb23a6e97642ff3190431c06475d9ca1e062
- https://git.kernel.org/stable/c/c49f14cc1bb12c625a1c572e8a95b6adefd4d8eb
- https://git.kernel.org/stable/c/f62b8969847850ba7596cb145cc47c65ea57dae0
- https://git.kernel.org/stable/c/2a5b3370a1d9750eca325292e291c8c7cb8cf2e0
- https://git.kernel.org/stable/c/33de53a2706066d526173dc743faf43d92c62105
- https://git.kernel.org/stable/c/7d870088db4863c514a7f8751cd593751983029a
- https://git.kernel.org/stable/c/b3e7eb23a6e97642ff3190431c06475d9ca1e062
- https://git.kernel.org/stable/c/c49f14cc1bb12c625a1c572e8a95b6adefd4d8eb
- https://git.kernel.org/stable/c/f62b8969847850ba7596cb145cc47c65ea57dae0
Modified: 2025-09-24
CVE-2023-52864
In the Linux kernel, the following vulnerability has been resolved: platform/x86: wmi: Fix opening of char device Since commit fa1f68db6ca7 ("drivers: misc: pass miscdevice pointer via file private data"), the miscdevice stores a pointer to itself inside filp->private_data, which means that private_data will not be NULL when wmi_char_open() is called. This might cause memory corruption should wmi_char_open() be unable to find its driver, something which can happen when the associated WMI device is deleted in wmi_free_devices(). Fix the problem by using the miscdevice pointer to retrieve the WMI device data associated with a char device using container_of(). This also avoids wmi_char_open() picking a wrong WMI device bound to a driver with the same name as the original driver.
- https://git.kernel.org/stable/c/36d85fa7ae0d6be651c1a745191fa7ef055db43e
- https://git.kernel.org/stable/c/44a96796d25809502c75771d40ee693c2e44724e
- https://git.kernel.org/stable/c/9fb0eed09e1470cd4021ff52b2b9dfcbcee4c203
- https://git.kernel.org/stable/c/cf098e937dd125c0317a0d6f261ac2a950a233d6
- https://git.kernel.org/stable/c/d426a2955e45a95b2282764105fcfb110a540453
- https://git.kernel.org/stable/c/e0bf076b734a2fab92d8fddc2b8b03462eee7097
- https://git.kernel.org/stable/c/eba9ac7abab91c8f6d351460239108bef5e7a0b6
- https://git.kernel.org/stable/c/fb7b06b59c6887659c6ed0ecd3110835eecbb6a3
- https://git.kernel.org/stable/c/36d85fa7ae0d6be651c1a745191fa7ef055db43e
- https://git.kernel.org/stable/c/44a96796d25809502c75771d40ee693c2e44724e
- https://git.kernel.org/stable/c/9fb0eed09e1470cd4021ff52b2b9dfcbcee4c203
- https://git.kernel.org/stable/c/cf098e937dd125c0317a0d6f261ac2a950a233d6
- https://git.kernel.org/stable/c/d426a2955e45a95b2282764105fcfb110a540453
- https://git.kernel.org/stable/c/e0bf076b734a2fab92d8fddc2b8b03462eee7097
- https://git.kernel.org/stable/c/eba9ac7abab91c8f6d351460239108bef5e7a0b6
- https://git.kernel.org/stable/c/fb7b06b59c6887659c6ed0ecd3110835eecbb6a3
Modified: 2025-01-14
CVE-2023-52865
In the Linux kernel, the following vulnerability has been resolved: clk: mediatek: clk-mt6797: Add check for mtk_alloc_clk_data Add the check for the return value of mtk_alloc_clk_data() in order to avoid NULL pointer dereference.
- https://git.kernel.org/stable/c/122ac6496e4975ddd7ec1edba4f6fc1e15e39478
- https://git.kernel.org/stable/c/2705c5b97f504e831ae1935c05f0e44f80dfa6b3
- https://git.kernel.org/stable/c/357df1c2f6ace96defd557fad709ed1f9f70e16c
- https://git.kernel.org/stable/c/3aefc6fcfbada57fac27f470602d5565e5b76cb4
- https://git.kernel.org/stable/c/4c79cbfb8e9e2311be77182893fda5ea4068c836
- https://git.kernel.org/stable/c/606f6366a35a3329545e38129804d65ef26ed7d2
- https://git.kernel.org/stable/c/81b16286110728674dcf81137be0687c5055e7bf
- https://git.kernel.org/stable/c/be3f12f16038a558f08fa93cc32fa715746a5235
- https://git.kernel.org/stable/c/c26feedbc561f2a3cee1a4f717e61bdbdfb4fa92
- https://git.kernel.org/stable/c/122ac6496e4975ddd7ec1edba4f6fc1e15e39478
- https://git.kernel.org/stable/c/2705c5b97f504e831ae1935c05f0e44f80dfa6b3
- https://git.kernel.org/stable/c/357df1c2f6ace96defd557fad709ed1f9f70e16c
- https://git.kernel.org/stable/c/3aefc6fcfbada57fac27f470602d5565e5b76cb4
- https://git.kernel.org/stable/c/4c79cbfb8e9e2311be77182893fda5ea4068c836
- https://git.kernel.org/stable/c/606f6366a35a3329545e38129804d65ef26ed7d2
- https://git.kernel.org/stable/c/81b16286110728674dcf81137be0687c5055e7bf
- https://git.kernel.org/stable/c/be3f12f16038a558f08fa93cc32fa715746a5235
- https://git.kernel.org/stable/c/c26feedbc561f2a3cee1a4f717e61bdbdfb4fa92
Modified: 2025-09-24
CVE-2023-52867
In the Linux kernel, the following vulnerability has been resolved: drm/radeon: possible buffer overflow Buffer 'afmt_status' of size 6 could overflow, since index 'afmt_idx' is checked after access.
- https://git.kernel.org/stable/c/112d4b02d94bf9fa4f1d3376587878400dd74783
- https://git.kernel.org/stable/c/19534a7a225f1bf2da70a9a90d41d0215f8f6b45
- https://git.kernel.org/stable/c/341e79f8aec6af6b0061b8171d77b085835c6a58
- https://git.kernel.org/stable/c/347f025a02b3a5d715a0b471fc3b1439c338ad94
- https://git.kernel.org/stable/c/7b063c93bece827fde237fae1c101bceeee4e896
- https://git.kernel.org/stable/c/caaa74541459c4c9e2c10046cf66ad2890483d0f
- https://git.kernel.org/stable/c/d9b4fa249deaae1145d6fc2b64dae718e5c7a855
- https://git.kernel.org/stable/c/dd05484f99d16715a88eedfca363828ef9a4c2d4
- https://git.kernel.org/stable/c/ddc42881f170f1f518496f5a70447501335fc783
- https://git.kernel.org/stable/c/112d4b02d94bf9fa4f1d3376587878400dd74783
- https://git.kernel.org/stable/c/19534a7a225f1bf2da70a9a90d41d0215f8f6b45
- https://git.kernel.org/stable/c/341e79f8aec6af6b0061b8171d77b085835c6a58
- https://git.kernel.org/stable/c/347f025a02b3a5d715a0b471fc3b1439c338ad94
- https://git.kernel.org/stable/c/7b063c93bece827fde237fae1c101bceeee4e896
- https://git.kernel.org/stable/c/caaa74541459c4c9e2c10046cf66ad2890483d0f
- https://git.kernel.org/stable/c/d9b4fa249deaae1145d6fc2b64dae718e5c7a855
- https://git.kernel.org/stable/c/dd05484f99d16715a88eedfca363828ef9a4c2d4
- https://git.kernel.org/stable/c/ddc42881f170f1f518496f5a70447501335fc783
Modified: 2025-09-26
CVE-2023-52868
In the Linux kernel, the following vulnerability has been resolved: thermal: core: prevent potential string overflow The dev->id value comes from ida_alloc() so it's a number between zero and INT_MAX. If it's too high then these sprintf()s will overflow.
- https://git.kernel.org/stable/c/0f6b3be28c4d62ef6498133959c72266629bea97
- https://git.kernel.org/stable/c/3091ab943dfc7b2578599b0fe203350286fab5bb
- https://git.kernel.org/stable/c/3a8f4e58e1ee707b4f46a1000b40b86ea3dd509c
- https://git.kernel.org/stable/c/3f795fb35c2d8a637efe76b4518216c9319b998c
- https://git.kernel.org/stable/c/6ad1bf47fbe5750c4d5d8e41337665e193e2c521
- https://git.kernel.org/stable/c/77ff34a56b695e228e6daf30ee30be747973d6e8
- https://git.kernel.org/stable/c/b55f0a9f865be75ca1019aad331f3225f7b50ce8
- https://git.kernel.org/stable/c/c99626092efca3061b387043d4a7399bf75fbdd5
- https://git.kernel.org/stable/c/edbd6bbe40ac524a8f2273ffacc53edf14f3c686
- https://git.kernel.org/stable/c/0f6b3be28c4d62ef6498133959c72266629bea97
- https://git.kernel.org/stable/c/3091ab943dfc7b2578599b0fe203350286fab5bb
- https://git.kernel.org/stable/c/3a8f4e58e1ee707b4f46a1000b40b86ea3dd509c
- https://git.kernel.org/stable/c/3f795fb35c2d8a637efe76b4518216c9319b998c
- https://git.kernel.org/stable/c/6ad1bf47fbe5750c4d5d8e41337665e193e2c521
- https://git.kernel.org/stable/c/77ff34a56b695e228e6daf30ee30be747973d6e8
- https://git.kernel.org/stable/c/b55f0a9f865be75ca1019aad331f3225f7b50ce8
- https://git.kernel.org/stable/c/c99626092efca3061b387043d4a7399bf75fbdd5
- https://git.kernel.org/stable/c/edbd6bbe40ac524a8f2273ffacc53edf14f3c686
Modified: 2025-04-02
CVE-2023-52869
In the Linux kernel, the following vulnerability has been resolved: pstore/platform: Add check for kstrdup Add check for the return value of kstrdup() and return the error if it fails in order to avoid NULL pointer dereference.
- https://git.kernel.org/stable/c/1c426da79f9fc7b761021b5eb44185ba119cd44a
- https://git.kernel.org/stable/c/379b120e4f27fd1cf636a5f85570c4d240a3f688
- https://git.kernel.org/stable/c/63f637309baadf81a095f2653e3b807d4b5814b9
- https://git.kernel.org/stable/c/a19d48f7c5d57c0f0405a7d4334d1d38fe9d3c1c
- https://git.kernel.org/stable/c/ad5cb6deb41417ef41b9d6ff54f789212108606f
- https://git.kernel.org/stable/c/bb166bdae1a7d7db30e9be7e6ccaba606debc05f
- https://git.kernel.org/stable/c/1c426da79f9fc7b761021b5eb44185ba119cd44a
- https://git.kernel.org/stable/c/379b120e4f27fd1cf636a5f85570c4d240a3f688
- https://git.kernel.org/stable/c/63f637309baadf81a095f2653e3b807d4b5814b9
- https://git.kernel.org/stable/c/a19d48f7c5d57c0f0405a7d4334d1d38fe9d3c1c
- https://git.kernel.org/stable/c/ad5cb6deb41417ef41b9d6ff54f789212108606f
- https://git.kernel.org/stable/c/bb166bdae1a7d7db30e9be7e6ccaba606debc05f
Modified: 2025-04-02
CVE-2023-52870
In the Linux kernel, the following vulnerability has been resolved: clk: mediatek: clk-mt6765: Add check for mtk_alloc_clk_data Add the check for the return value of mtk_alloc_clk_data() in order to avoid NULL pointer dereference.
- https://git.kernel.org/stable/c/10cc81124407d862f0f747db4baa9c006510b480
- https://git.kernel.org/stable/c/2617aa8ceaf30e41d3eb7f5fef3445542bef193a
- https://git.kernel.org/stable/c/533ca5153ad6c7b7d47ae0114b14d0333964b946
- https://git.kernel.org/stable/c/b5ff3e89b4e7f46ad2aa0de7e08d18e6f87d71bc
- https://git.kernel.org/stable/c/b82681042724924ae3ba0f2f2eeec217fa31e830
- https://git.kernel.org/stable/c/dd1f30d68fa98eb672c0a259297b761656a9025f
- https://git.kernel.org/stable/c/10cc81124407d862f0f747db4baa9c006510b480
- https://git.kernel.org/stable/c/2617aa8ceaf30e41d3eb7f5fef3445542bef193a
- https://git.kernel.org/stable/c/533ca5153ad6c7b7d47ae0114b14d0333964b946
- https://git.kernel.org/stable/c/b5ff3e89b4e7f46ad2aa0de7e08d18e6f87d71bc
- https://git.kernel.org/stable/c/b82681042724924ae3ba0f2f2eeec217fa31e830
- https://git.kernel.org/stable/c/dd1f30d68fa98eb672c0a259297b761656a9025f
Modified: 2025-09-26
CVE-2023-52871
In the Linux kernel, the following vulnerability has been resolved: soc: qcom: llcc: Handle a second device without data corruption Usually there is only one llcc device. But if there were a second, even a failed probe call would modify the global drv_data pointer. So check if drv_data is valid before overwriting it.
- https://git.kernel.org/stable/c/1143bfb9b055897975aeaea254da148e19524493
- https://git.kernel.org/stable/c/3565684309e54fa998ea27f37028d67cc3e1dff2
- https://git.kernel.org/stable/c/5e5b85ea0f4bc484bfe4cc73ead51fa48d2366a0
- https://git.kernel.org/stable/c/995ee1e84e8db7fa5dcdde7dfe0bd7bb6f9bbb8c
- https://git.kernel.org/stable/c/cc1a1dcb411fe224f48553cfdcdfe6e61395b69c
- https://git.kernel.org/stable/c/f0ef883cae309bc5e8cdfcdbc1b4822732ce20a8
- https://git.kernel.org/stable/c/f1a1bc8775b26345aba2be278118999e7f661d3d
- https://git.kernel.org/stable/c/1143bfb9b055897975aeaea254da148e19524493
- https://git.kernel.org/stable/c/3565684309e54fa998ea27f37028d67cc3e1dff2
- https://git.kernel.org/stable/c/5e5b85ea0f4bc484bfe4cc73ead51fa48d2366a0
- https://git.kernel.org/stable/c/995ee1e84e8db7fa5dcdde7dfe0bd7bb6f9bbb8c
- https://git.kernel.org/stable/c/cc1a1dcb411fe224f48553cfdcdfe6e61395b69c
- https://git.kernel.org/stable/c/f0ef883cae309bc5e8cdfcdbc1b4822732ce20a8
- https://git.kernel.org/stable/c/f1a1bc8775b26345aba2be278118999e7f661d3d
Modified: 2025-01-06
CVE-2023-52873
In the Linux kernel, the following vulnerability has been resolved: clk: mediatek: clk-mt6779: Add check for mtk_alloc_clk_data Add the check for the return value of mtk_alloc_clk_data() in order to avoid NULL pointer dereference.
- https://git.kernel.org/stable/c/1f57f78fbacf630430bf954e5a84caafdfea30c0
- https://git.kernel.org/stable/c/3994387ba3564976731179c4d4a6d7850ddda71a
- https://git.kernel.org/stable/c/a90239551abc181687f8c0ba60b276f7d75c141e
- https://git.kernel.org/stable/c/ca6d565a2319d69d9766e6ecbb5af827fc4afb2b
- https://git.kernel.org/stable/c/df1c4a9efa3f5b6fb5e0ae63890230dbe2190b7e
- https://git.kernel.org/stable/c/f6a7c51cf07a399ec067d39f0a22f1817c5c7d2b
- https://git.kernel.org/stable/c/fbe466f06d4ea18745da0d57540539b7b36936ae
- https://git.kernel.org/stable/c/1f57f78fbacf630430bf954e5a84caafdfea30c0
- https://git.kernel.org/stable/c/3994387ba3564976731179c4d4a6d7850ddda71a
- https://git.kernel.org/stable/c/a90239551abc181687f8c0ba60b276f7d75c141e
- https://git.kernel.org/stable/c/ca6d565a2319d69d9766e6ecbb5af827fc4afb2b
- https://git.kernel.org/stable/c/df1c4a9efa3f5b6fb5e0ae63890230dbe2190b7e
- https://git.kernel.org/stable/c/f6a7c51cf07a399ec067d39f0a22f1817c5c7d2b
- https://git.kernel.org/stable/c/fbe466f06d4ea18745da0d57540539b7b36936ae
Modified: 2025-01-06
CVE-2023-52875
In the Linux kernel, the following vulnerability has been resolved: clk: mediatek: clk-mt2701: Add check for mtk_alloc_clk_data Add the check for the return value of mtk_alloc_clk_data() in order to avoid NULL pointer dereference.
- https://git.kernel.org/stable/c/001e5def774fa1a8f2b29567c0b0cd3e3a859a96
- https://git.kernel.org/stable/c/0d6e24b422a2166a9297a8286ff2e6ab9a5e8cd3
- https://git.kernel.org/stable/c/1953e62366da5460dc712e045f94fb0d8918999d
- https://git.kernel.org/stable/c/1bf9c204aef4cc55ce46a7ff2d4dc7e5f86551a7
- https://git.kernel.org/stable/c/2a18dd653284550900b02107c3c7b3ac5e0eb802
- https://git.kernel.org/stable/c/6fccee2af400edaed9cf349d506c5971d4762739
- https://git.kernel.org/stable/c/d1175cf4bd2b4c5f7c43f677ea1ce9ad2c18d055
- https://git.kernel.org/stable/c/d1461f0c9ca0827c03730fe9652ebbf6316a2a95
- https://git.kernel.org/stable/c/e61934720af4a58ffd43a63ffdd6f3a0bd7d7b47
- https://git.kernel.org/stable/c/001e5def774fa1a8f2b29567c0b0cd3e3a859a96
- https://git.kernel.org/stable/c/0d6e24b422a2166a9297a8286ff2e6ab9a5e8cd3
- https://git.kernel.org/stable/c/1953e62366da5460dc712e045f94fb0d8918999d
- https://git.kernel.org/stable/c/1bf9c204aef4cc55ce46a7ff2d4dc7e5f86551a7
- https://git.kernel.org/stable/c/2a18dd653284550900b02107c3c7b3ac5e0eb802
- https://git.kernel.org/stable/c/6fccee2af400edaed9cf349d506c5971d4762739
- https://git.kernel.org/stable/c/d1175cf4bd2b4c5f7c43f677ea1ce9ad2c18d055
- https://git.kernel.org/stable/c/d1461f0c9ca0827c03730fe9652ebbf6316a2a95
- https://git.kernel.org/stable/c/e61934720af4a58ffd43a63ffdd6f3a0bd7d7b47
Modified: 2025-01-06
CVE-2023-52876
In the Linux kernel, the following vulnerability has been resolved: clk: mediatek: clk-mt7629-eth: Add check for mtk_alloc_clk_data Add the check for the return value of mtk_alloc_clk_data() in order to avoid NULL pointer dereference.
- https://git.kernel.org/stable/c/0884393c63cc9a1772f7121a6645ba7bd76feeb9
- https://git.kernel.org/stable/c/1639072f6260babd017556e9f236ca2ad589d1e7
- https://git.kernel.org/stable/c/96e9544a0c4faca616b3f9f4034dcd83a14e7f22
- https://git.kernel.org/stable/c/a540ca0aeae83c2f3964bcb4e383f64ce2ec1783
- https://git.kernel.org/stable/c/b20cfe007a46f8c165d42a05c50a8d3d893e6592
- https://git.kernel.org/stable/c/c4070ada5d5155c8d4d17ea64bd246949889f25b
- https://git.kernel.org/stable/c/cfa68e0ac5dcde43577adadf6f0f26f3b365ad68
- https://git.kernel.org/stable/c/0884393c63cc9a1772f7121a6645ba7bd76feeb9
- https://git.kernel.org/stable/c/1639072f6260babd017556e9f236ca2ad589d1e7
- https://git.kernel.org/stable/c/96e9544a0c4faca616b3f9f4034dcd83a14e7f22
- https://git.kernel.org/stable/c/a540ca0aeae83c2f3964bcb4e383f64ce2ec1783
- https://git.kernel.org/stable/c/b20cfe007a46f8c165d42a05c50a8d3d893e6592
- https://git.kernel.org/stable/c/c4070ada5d5155c8d4d17ea64bd246949889f25b
- https://git.kernel.org/stable/c/cfa68e0ac5dcde43577adadf6f0f26f3b365ad68
Modified: 2025-02-03
CVE-2023-52879
In the Linux kernel, the following vulnerability has been resolved: tracing: Have trace_event_file have ref counters The following can crash the kernel: # cd /sys/kernel/tracing # echo 'p:sched schedule' > kprobe_events # exec 5>>events/kprobes/sched/enable # > kprobe_events # exec 5>&- The above commands: 1. Change directory to the tracefs directory 2. Create a kprobe event (doesn't matter what one) 3. Open bash file descriptor 5 on the enable file of the kprobe event 4. Delete the kprobe event (removes the files too) 5. Close the bash file descriptor 5 The above causes a crash! BUG: kernel NULL pointer dereference, address: 0000000000000028 #PF: supervisor read access in kernel mode #PF: error_code(0x0000) - not-present page PGD 0 P4D 0 Oops: 0000 [#1] PREEMPT SMP PTI CPU: 6 PID: 877 Comm: bash Not tainted 6.5.0-rc4-test-00008-g2c6b6b1029d4-dirty #186 Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.2-debian-1.16.2-1 04/01/2014 RIP: 0010:tracing_release_file_tr+0xc/0x50 What happens here is that the kprobe event creates a trace_event_file "file" descriptor that represents the file in tracefs to the event. It maintains state of the event (is it enabled for the given instance?). Opening the "enable" file gets a reference to the event "file" descriptor via the open file descriptor. When the kprobe event is deleted, the file is also deleted from the tracefs system which also frees the event "file" descriptor. But as the tracefs file is still opened by user space, it will not be totally removed until the final dput() is called on it. But this is not true with the event "file" descriptor that is already freed. If the user does a write to or simply closes the file descriptor it will reference the event "file" descriptor that was just freed, causing a use-after-free bug. To solve this, add a ref count to the event "file" descriptor as well as a new flag called "FREED". The "file" will not be freed until the last reference is released. But the FREE flag will be set when the event is removed to prevent any more modifications to that event from happening, even if there's still a reference to the event "file" descriptor.
- https://git.kernel.org/stable/c/2c9de867ca285c397cd71af703763fe416265706
- https://git.kernel.org/stable/c/2fa74d29fc1899c237d51bf9a6e132ea5c488976
- https://git.kernel.org/stable/c/9034c87d61be8cff989017740a91701ac8195a1d
- https://git.kernel.org/stable/c/961c4511c7578d6b8f39118be919016ec3db1c1e
- https://git.kernel.org/stable/c/a98172e36e5f1b3d29ad71fade2d611cfcc2fe6f
- https://git.kernel.org/stable/c/bb32500fb9b78215e4ef6ee8b4345c5f5d7eafb4
- https://git.kernel.org/stable/c/cbc7c29dff0fa18162f2a3889d82eeefd67305e0
- https://git.kernel.org/stable/c/2c9de867ca285c397cd71af703763fe416265706
- https://git.kernel.org/stable/c/2fa74d29fc1899c237d51bf9a6e132ea5c488976
- https://git.kernel.org/stable/c/9034c87d61be8cff989017740a91701ac8195a1d
- https://git.kernel.org/stable/c/961c4511c7578d6b8f39118be919016ec3db1c1e
- https://git.kernel.org/stable/c/a98172e36e5f1b3d29ad71fade2d611cfcc2fe6f
- https://git.kernel.org/stable/c/bb32500fb9b78215e4ef6ee8b4345c5f5d7eafb4
- https://git.kernel.org/stable/c/cbc7c29dff0fa18162f2a3889d82eeefd67305e0
Modified: 2025-09-27
CVE-2023-52881
In the Linux kernel, the following vulnerability has been resolved:
tcp: do not accept ACK of bytes we never sent
This patch is based on a detailed report and ideas from Yepeng Pan
and Christian Rossow.
ACK seq validation is currently following RFC 5961 5.2 guidelines:
The ACK value is considered acceptable only if
it is in the range of ((SND.UNA - MAX.SND.WND) <= SEG.ACK <=
SND.NXT). All incoming segments whose ACK value doesn't satisfy the
above condition MUST be discarded and an ACK sent back. It needs to
be noted that RFC 793 on page 72 (fifth check) says: "If the ACK is a
duplicate (SEG.ACK < SND.UNA), it can be ignored. If the ACK
acknowledges something not yet sent (SEG.ACK > SND.NXT) then send an
ACK, drop the segment, and return". The "ignored" above implies that
the processing of the incoming data segment continues, which means
the ACK value is treated as acceptable. This mitigation makes the
ACK check more stringent since any ACK < SND.UNA wouldn't be
accepted, instead only ACKs that are in the range ((SND.UNA -
MAX.SND.WND) <= SEG.ACK <= SND.NXT) get through.
This can be refined for new (and possibly spoofed) flows,
by not accepting ACK for bytes that were never sent.
This greatly improves TCP security at a little cost.
I added a Fixes: tag to make sure this patch will reach stable trees,
even if the 'blamed' patch was adhering to the RFC.
tp->bytes_acked was added in linux-4.2
Following packetdrill test (courtesy of Yepeng Pan) shows
the issue at hand:
0 socket(..., SOCK_STREAM, IPPROTO_TCP) = 3
+0 setsockopt(3, SOL_SOCKET, SO_REUSEADDR, [1], 4) = 0
+0 bind(3, ..., ...) = 0
+0 listen(3, 1024) = 0
// ---------------- Handshake ------------------- //
// when window scale is set to 14 the window size can be extended to
// 65535 * (2^14) = 1073725440. Linux would accept an ACK packet
// with ack number in (Server_ISN+1-1073725440. Server_ISN+1)
// ,though this ack number acknowledges some data never
// sent by the server.
+0 < S 0:0(0) win 65535
- https://git.kernel.org/stable/c/008b807fe487e0b15a3a6c39add4eb477f73e440
- https://git.kernel.org/stable/c/0d4e0afdd6658cd21dd5be61880411a2553fd1fc
- https://git.kernel.org/stable/c/2087d53a66e97a5eb5d1bf558d5bef9e5f891757
- https://git.kernel.org/stable/c/3d501dd326fb1c73f1b8206d4c6e1d7b15c07e27
- https://git.kernel.org/stable/c/458f07ffeccd17f99942311e09ef574ddf4a414a
- https://git.kernel.org/stable/c/69eae75ca5255e876628ac5cee9eaab31f644b57
- https://git.kernel.org/stable/c/7ffff0cc929fdfc62a74b384c4903d6496c910f0
- https://git.kernel.org/stable/c/b17a886ed29f3b70b78ccf632dad03e0c69e3c1a
- https://git.kernel.org/stable/c/008b807fe487e0b15a3a6c39add4eb477f73e440
- https://git.kernel.org/stable/c/0d4e0afdd6658cd21dd5be61880411a2553fd1fc
- https://git.kernel.org/stable/c/2087d53a66e97a5eb5d1bf558d5bef9e5f891757
- https://git.kernel.org/stable/c/3d501dd326fb1c73f1b8206d4c6e1d7b15c07e27
- https://git.kernel.org/stable/c/458f07ffeccd17f99942311e09ef574ddf4a414a
- https://git.kernel.org/stable/c/69eae75ca5255e876628ac5cee9eaab31f644b57
- https://git.kernel.org/stable/c/7ffff0cc929fdfc62a74b384c4903d6496c910f0
- https://git.kernel.org/stable/c/b17a886ed29f3b70b78ccf632dad03e0c69e3c1a
Modified: 2025-02-13
CVE-2023-6817
A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. The function nft_pipapo_walk did not skip inactive elements during set walk which could lead double deactivations of PIPAPO (Pile Packet Policies) elements, leading to use-after-free. We recommend upgrading past commit 317eb9685095678f2c9f5a8189de698c5354316a.
- http://packetstormsecurity.com/files/177029/Kernel-Live-Patch-Security-Notice-LSN-0100-1.html
- http://www.openwall.com/lists/oss-security/2023/12/22/13
- http://www.openwall.com/lists/oss-security/2023/12/22/6
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=317eb9685095678f2c9f5a8189de698c5354316a
- https://kernel.dance/317eb9685095678f2c9f5a8189de698c5354316a
- https://lists.debian.org/debian-lts-announce/2024/01/msg00005.html
- http://packetstormsecurity.com/files/177029/Kernel-Live-Patch-Security-Notice-LSN-0100-1.html
- http://www.openwall.com/lists/oss-security/2023/12/22/13
- http://www.openwall.com/lists/oss-security/2023/12/22/6
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=317eb9685095678f2c9f5a8189de698c5354316a
- https://kernel.dance/317eb9685095678f2c9f5a8189de698c5354316a
- https://lists.debian.org/debian-lts-announce/2024/01/msg00005.html
Modified: 2025-11-25
CVE-2023-6932
A use-after-free vulnerability in the Linux kernel's ipv4: igmp component can be exploited to achieve local privilege escalation. A race condition can be exploited to cause a timer be mistakenly registered on a RCU read locked object which is freed by another thread. We recommend upgrading past commit e2b706c691905fe78468c361aaabc719d0a496f1.
- http://packetstormsecurity.com/files/177029/Kernel-Live-Patch-Security-Notice-LSN-0100-1.html
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=e2b706c691905fe78468c361aaabc719d0a496f1
- https://kernel.dance/e2b706c691905fe78468c361aaabc719d0a496f1
- https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
- https://lists.debian.org/debian-lts-announce/2024/01/msg00005.html
- http://packetstormsecurity.com/files/177029/Kernel-Live-Patch-Security-Notice-LSN-0100-1.html
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=e2b706c691905fe78468c361aaabc719d0a496f1
- https://kernel.dance/e2b706c691905fe78468c361aaabc719d0a496f1
- https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
- https://lists.debian.org/debian-lts-announce/2024/01/msg00005.html
