ALT-PU-2023-7921-3
Package kernel-image-std-def updated to version 5.10.203-alt1 for branch p10 in task 336106.
Closed vulnerabilities
BDU:2024-06906
Уязвимость компонента drm/amdgpu ядра операционной системы Linux, связанная с ошибками разыменования указателя, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2024-06908
Уязвимость функций fc_lport_ptp_setup() fc_lport_ptp_setup(), fc_rport_create(), fc_rport_create(), fc_rport_create() ядра операционной системы Linux, связанная с ошибками разыменования указателя, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2024-06910
Уязвимость компонента drm/amd/display ядра операционной системы Linux, связанная с ошибками разыменования указателя, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2024-06978
Уязвимость функции компонента ALSA ядра операционной системы Linux, связанная с ошибками разыменования указателя, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2024-06986
Уязвимость ядра операционной системы Linux, связанная с ошибками разыменования указателя, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2023-52753
In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Avoid NULL dereference of timing generator [Why & How] Check whether assigned timing generator is NULL or not before accessing its funcs to prevent NULL dereference.
- https://git.kernel.org/stable/c/09909f515032fa80b921fd3118efe66b185d10fd
- https://git.kernel.org/stable/c/09909f515032fa80b921fd3118efe66b185d10fd
- https://git.kernel.org/stable/c/4e497f1acd99075b13605b2e7fa0cba721a2cfd9
- https://git.kernel.org/stable/c/4e497f1acd99075b13605b2e7fa0cba721a2cfd9
- https://git.kernel.org/stable/c/6d8653b1a7a8dc938b566ae8c4f373b36e792c68
- https://git.kernel.org/stable/c/6d8653b1a7a8dc938b566ae8c4f373b36e792c68
- https://git.kernel.org/stable/c/79b6a90f4f2433312154cd68452b0ba501fa74db
- https://git.kernel.org/stable/c/79b6a90f4f2433312154cd68452b0ba501fa74db
- https://git.kernel.org/stable/c/8a06894666e0b462c9316b26ab615cefdd0d676c
- https://git.kernel.org/stable/c/8a06894666e0b462c9316b26ab615cefdd0d676c
- https://git.kernel.org/stable/c/b1904ed480cee3f9f4036ea0e36d139cb5fee2d6
- https://git.kernel.org/stable/c/b1904ed480cee3f9f4036ea0e36d139cb5fee2d6
- https://git.kernel.org/stable/c/df8bc953eed72371e43ca407bd063507f760cf89
- https://git.kernel.org/stable/c/df8bc953eed72371e43ca407bd063507f760cf89
- https://git.kernel.org/stable/c/eac3e4760aa12159f7f5475d55a67b7933abc195
- https://git.kernel.org/stable/c/eac3e4760aa12159f7f5475d55a67b7933abc195
Modified: 2024-11-21
CVE-2023-52806
In the Linux kernel, the following vulnerability has been resolved: ALSA: hda: Fix possible null-ptr-deref when assigning a stream While AudioDSP drivers assign streams exclusively of HOST or LINK type, nothing blocks a user to attempt to assign a COUPLED stream. As supplied substream instance may be a stub, what is the case when code-loading, such scenario ends with null-ptr-deref.
- https://git.kernel.org/stable/c/2527775616f3638f4fd54649eba8c7b84d5e4250
- https://git.kernel.org/stable/c/2527775616f3638f4fd54649eba8c7b84d5e4250
- https://git.kernel.org/stable/c/25354bae4fc310c3928e8a42fda2d486f67745d7
- https://git.kernel.org/stable/c/25354bae4fc310c3928e8a42fda2d486f67745d7
- https://git.kernel.org/stable/c/43b91df291c8802268ab3cfd8fccfdf135800ed4
- https://git.kernel.org/stable/c/43b91df291c8802268ab3cfd8fccfdf135800ed4
- https://git.kernel.org/stable/c/4a320da7f7cbdab2098b103c47f45d5061f42edd
- https://git.kernel.org/stable/c/4a320da7f7cbdab2098b103c47f45d5061f42edd
- https://git.kernel.org/stable/c/631a96e9eb4228ff75fce7e72d133ca81194797e
- https://git.kernel.org/stable/c/631a96e9eb4228ff75fce7e72d133ca81194797e
- https://git.kernel.org/stable/c/758c7733cb821041f5fd403b7b97c0b95d319323
- https://git.kernel.org/stable/c/758c7733cb821041f5fd403b7b97c0b95d319323
- https://git.kernel.org/stable/c/7de25112de8222fd20564769e6c99dc9f9738a0b
- https://git.kernel.org/stable/c/7de25112de8222fd20564769e6c99dc9f9738a0b
- https://git.kernel.org/stable/c/f93dc90c2e8ed664985e366aa6459ac83cdab236
- https://git.kernel.org/stable/c/f93dc90c2e8ed664985e366aa6459ac83cdab236
- https://git.kernel.org/stable/c/fe7c1a0c2b25c82807cb46fc3aadbf2664a682b0
- https://git.kernel.org/stable/c/fe7c1a0c2b25c82807cb46fc3aadbf2664a682b0
Modified: 2024-11-21
CVE-2023-52809
In the Linux kernel, the following vulnerability has been resolved: scsi: libfc: Fix potential NULL pointer dereference in fc_lport_ptp_setup() fc_lport_ptp_setup() did not check the return value of fc_rport_create() which can return NULL and would cause a NULL pointer dereference. Address this issue by checking return value of fc_rport_create() and log error message on fc_rport_create() failed.
- https://git.kernel.org/stable/c/442fd24d7b6b29e4a9cd9225afba4142d5f522ba
- https://git.kernel.org/stable/c/442fd24d7b6b29e4a9cd9225afba4142d5f522ba
- https://git.kernel.org/stable/c/4df105f0ce9f6f30cda4e99f577150d23f0c9c5f
- https://git.kernel.org/stable/c/4df105f0ce9f6f30cda4e99f577150d23f0c9c5f
- https://git.kernel.org/stable/c/56d78b5495ebecbb9395101f3be177cd0a52450b
- https://git.kernel.org/stable/c/56d78b5495ebecbb9395101f3be177cd0a52450b
- https://git.kernel.org/stable/c/6b9ecf4e1032e645873933e5b43cbb84cac19106
- https://git.kernel.org/stable/c/6b9ecf4e1032e645873933e5b43cbb84cac19106
- https://git.kernel.org/stable/c/77072ec41d6ab3718c3fc639bc149b8037caedfa
- https://git.kernel.org/stable/c/77072ec41d6ab3718c3fc639bc149b8037caedfa
- https://git.kernel.org/stable/c/930f0aaba4820d6362de4e6ed569eaf444f1ea4e
- https://git.kernel.org/stable/c/930f0aaba4820d6362de4e6ed569eaf444f1ea4e
- https://git.kernel.org/stable/c/b549acf999824d4f751ca57965700372f2f3ad00
- https://git.kernel.org/stable/c/b549acf999824d4f751ca57965700372f2f3ad00
- https://git.kernel.org/stable/c/bb83f79f90e92f46466adcfd4fd264a7ae0f0f01
- https://git.kernel.org/stable/c/bb83f79f90e92f46466adcfd4fd264a7ae0f0f01
- https://git.kernel.org/stable/c/f6fe7261b92b21109678747f36df9fdab1e30c34
- https://git.kernel.org/stable/c/f6fe7261b92b21109678747f36df9fdab1e30c34
Modified: 2025-01-14
CVE-2023-52814
In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Fix potential null pointer derefernce The amdgpu_ras_get_context may return NULL if device not support ras feature, so add check before using.
- https://git.kernel.org/stable/c/80285ae1ec8717b597b20de38866c29d84d321a1
- https://git.kernel.org/stable/c/80285ae1ec8717b597b20de38866c29d84d321a1
- https://git.kernel.org/stable/c/9b70fc7d70e8ef7c4a65034c9487f58609e708a1
- https://git.kernel.org/stable/c/9b70fc7d70e8ef7c4a65034c9487f58609e708a1
- https://git.kernel.org/stable/c/b0702ee4d811708251cdf54d4a1d3e888d365111
- https://git.kernel.org/stable/c/b0702ee4d811708251cdf54d4a1d3e888d365111
- https://git.kernel.org/stable/c/b93a25de28af153312f0fc979b0663fc4bd3442b
- https://git.kernel.org/stable/c/b93a25de28af153312f0fc979b0663fc4bd3442b
- https://git.kernel.org/stable/c/c11cf5e117f50f5a767054600885acd981449afe
- https://git.kernel.org/stable/c/c11cf5e117f50f5a767054600885acd981449afe
- https://git.kernel.org/stable/c/da46e63482fdc5e35c008865c22ac64027f6f0c2
- https://git.kernel.org/stable/c/da46e63482fdc5e35c008865c22ac64027f6f0c2
Modified: 2024-11-21
CVE-2023-52817
In the Linux kernel, the following vulnerability has been resolved:
drm/amdgpu: Fix a null pointer access when the smc_rreg pointer is NULL
In certain types of chips, such as VEGA20, reading the amdgpu_regs_smc file could result in an abnormal null pointer access when the smc_rreg pointer is NULL. Below are the steps to reproduce this issue and the corresponding exception log:
1. Navigate to the directory: /sys/kernel/debug/dri/0
2. Execute command: cat amdgpu_regs_smc
3. Exception Log::
[4005007.702554] BUG: kernel NULL pointer dereference, address: 0000000000000000
[4005007.702562] #PF: supervisor instruction fetch in kernel mode
[4005007.702567] #PF: error_code(0x0010) - not-present page
[4005007.702570] PGD 0 P4D 0
[4005007.702576] Oops: 0010 [#1] SMP NOPTI
[4005007.702581] CPU: 4 PID: 62563 Comm: cat Tainted: G OE 5.15.0-43-generic #46-Ubunt u
[4005007.702590] RIP: 0010:0x0
[4005007.702598] Code: Unable to access opcode bytes at RIP 0xffffffffffffffd6.
[4005007.702600] RSP: 0018:ffffa82b46d27da0 EFLAGS: 00010206
[4005007.702605] RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffa82b46d27e68
[4005007.702609] RDX: 0000000000000001 RSI: 0000000000000000 RDI: ffff9940656e0000
[4005007.702612] RBP: ffffa82b46d27dd8 R08: 0000000000000000 R09: ffff994060c07980
[4005007.702615] R10: 0000000000020000 R11: 0000000000000000 R12: 00007f5e06753000
[4005007.702618] R13: ffff9940656e0000 R14: ffffa82b46d27e68 R15: 00007f5e06753000
[4005007.702622] FS: 00007f5e0755b740(0000) GS:ffff99479d300000(0000) knlGS:0000000000000000
[4005007.702626] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[4005007.702629] CR2: ffffffffffffffd6 CR3: 00000003253fc000 CR4: 00000000003506e0
[4005007.702633] Call Trace:
[4005007.702636]
- https://git.kernel.org/stable/c/174f62a0aa15c211e60208b41ee9e7cdfb73d455
- https://git.kernel.org/stable/c/174f62a0aa15c211e60208b41ee9e7cdfb73d455
- https://git.kernel.org/stable/c/437e0fa907ba39b4d7eda863c03ea9cf48bd93a9
- https://git.kernel.org/stable/c/437e0fa907ba39b4d7eda863c03ea9cf48bd93a9
- https://git.kernel.org/stable/c/5104fdf50d326db2c1a994f8b35dcd46e63ae4ad
- https://git.kernel.org/stable/c/5104fdf50d326db2c1a994f8b35dcd46e63ae4ad
- https://git.kernel.org/stable/c/6c1b3d89a2dda79881726bb6e37af19c0936d736
- https://git.kernel.org/stable/c/6c1b3d89a2dda79881726bb6e37af19c0936d736
- https://git.kernel.org/stable/c/820daf9ffe2b0afb804567b10983fb38bc5ae288
- https://git.kernel.org/stable/c/820daf9ffe2b0afb804567b10983fb38bc5ae288
- https://git.kernel.org/stable/c/ba3c0796d292de84f2932cc5bbb0f771fc720996
- https://git.kernel.org/stable/c/ba3c0796d292de84f2932cc5bbb0f771fc720996
- https://git.kernel.org/stable/c/bf2d51eedf03bd61e3556e35d74d49e2e6112398
- https://git.kernel.org/stable/c/bf2d51eedf03bd61e3556e35d74d49e2e6112398
- https://git.kernel.org/stable/c/f475d5502f33a6c5b149b0afe96316ad1962a64a
- https://git.kernel.org/stable/c/f475d5502f33a6c5b149b0afe96316ad1962a64a
Modified: 2024-11-21
CVE-2023-52821
In the Linux kernel, the following vulnerability has been resolved: drm/panel: fix a possible null pointer dereference In versatile_panel_get_modes(), the return value of drm_mode_duplicate() is assigned to mode, which will lead to a NULL pointer dereference on failure of drm_mode_duplicate(). Add a check to avoid npd.
- https://git.kernel.org/stable/c/2381f6b628b3214f07375e0adf5ce17093c31190
- https://git.kernel.org/stable/c/2381f6b628b3214f07375e0adf5ce17093c31190
- https://git.kernel.org/stable/c/4fa930ba046d20fc1899770396ee11e905fa96e4
- https://git.kernel.org/stable/c/4fa930ba046d20fc1899770396ee11e905fa96e4
- https://git.kernel.org/stable/c/79813cd59398015867d51e6d7dcc14d287d4c402
- https://git.kernel.org/stable/c/79813cd59398015867d51e6d7dcc14d287d4c402
- https://git.kernel.org/stable/c/8a9dd36fcb4f3906982b82593393578db4479992
- https://git.kernel.org/stable/c/8a9dd36fcb4f3906982b82593393578db4479992
- https://git.kernel.org/stable/c/924e5814d1f84e6fa5cb19c6eceb69f066225229
- https://git.kernel.org/stable/c/924e5814d1f84e6fa5cb19c6eceb69f066225229
- https://git.kernel.org/stable/c/c7dc0aca5962fb37dbea9769dd26ec37813faae1
- https://git.kernel.org/stable/c/c7dc0aca5962fb37dbea9769dd26ec37813faae1
Closed bugs
Не правильно определяются кнопки ctrl, win, alt для клавиатур redragon asura