ALT-PU-2023-8701-1
Package kernel-image-pine updated to version 6.6.4-alt1 for branch sisyphus in task 335806.
Closed vulnerabilities
Modified: 2025-04-29
BDU:2024-10224
Уязвимость функции wx_sw_init() компонента wangxun ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2025-07713
Уязвимость компонента s390/dasd ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2025-07714
Уязвимость компонента net/smc ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на целостность данных
BDU:2025-07715
Уязвимость функции vfs_getattr() компонента overlayfs ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2025-07716
Уязвимость функции usb_get_bos_descriptor() компонента drivers/usb/core/config.c ядра операционной системы Linux, позволяющая нарушителю получить доступ к конфиденциальным данным
BDU:2025-15391
Уязвимость функции tls_sw_splice_eof() модуля net/tls/tls_sw.c реализации протокола TLS ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-01-06
CVE-2023-52767
In the Linux kernel, the following vulnerability has been resolved: tls: fix NULL deref on tls_sw_splice_eof() with empty record syzkaller discovered that if tls_sw_splice_eof() is executed as part of sendfile() when the plaintext/ciphertext sk_msg are empty, the send path gets confused because the empty ciphertext buffer does not have enough space for the encryption overhead. This causes tls_push_record() to go on the `split = true` path (which is only supposed to be used when interacting with an attached BPF program), and then get further confused and hit the tls_merge_open_record() path, which then assumes that there must be at least one populated buffer element, leading to a NULL deref. It is possible to have empty plaintext/ciphertext buffers if we previously bailed from tls_sw_sendmsg_locked() via the tls_trim_both_msgs() path. tls_sw_push_pending_record() already handles this case correctly; let's do the same check in tls_sw_splice_eof().
- https://git.kernel.org/stable/c/2214e2bb5489145aba944874d0ee1652a0a63dc8
- https://git.kernel.org/stable/c/53f2cb491b500897a619ff6abd72f565933760f0
- https://git.kernel.org/stable/c/944900fe2736c07288efe2d9394db4d3ca23f2c9
- https://git.kernel.org/stable/c/2214e2bb5489145aba944874d0ee1652a0a63dc8
- https://git.kernel.org/stable/c/53f2cb491b500897a619ff6abd72f565933760f0
- https://git.kernel.org/stable/c/944900fe2736c07288efe2d9394db4d3ca23f2c9
Modified: 2025-09-23
CVE-2023-52774
In the Linux kernel, the following vulnerability has been resolved: s390/dasd: protect device queue against concurrent access In dasd_profile_start() the amount of requests on the device queue are counted. The access to the device queue is unprotected against concurrent access. With a lot of parallel I/O, especially with alias devices enabled, the device queue can change while dasd_profile_start() is accessing the queue. In the worst case this leads to a kernel panic due to incorrect pointer accesses. Fix this by taking the device lock before accessing the queue and counting the requests. Additionally the check for a valid profile data pointer can be done earlier to avoid unnecessary locking in a hot path.
- https://git.kernel.org/stable/c/6062c527d0403cef27c54b91ac8390c3a497b250
- https://git.kernel.org/stable/c/9372aab5d0ff621ea203c8c603e7e5f75e888240
- https://git.kernel.org/stable/c/c841de6247e94e07566d57163d3c0d8b29278f7a
- https://git.kernel.org/stable/c/db46cd1e0426f52999d50fa72cfa97fa39952885
- https://git.kernel.org/stable/c/dc96fde8fcb2b896fd6c64802a7f4ece2e69b0be
- https://git.kernel.org/stable/c/ebdc569a07a3e8dbe66b4184922ad6f88ac0b96f
- https://git.kernel.org/stable/c/f1ac7789406e2ca9ac51c41ad2daa597f47bdd4d
- https://git.kernel.org/stable/c/f75617cc8df4155374132f0b500b0b3ebb967458
- https://git.kernel.org/stable/c/6062c527d0403cef27c54b91ac8390c3a497b250
- https://git.kernel.org/stable/c/9372aab5d0ff621ea203c8c603e7e5f75e888240
- https://git.kernel.org/stable/c/c841de6247e94e07566d57163d3c0d8b29278f7a
- https://git.kernel.org/stable/c/db46cd1e0426f52999d50fa72cfa97fa39952885
- https://git.kernel.org/stable/c/dc96fde8fcb2b896fd6c64802a7f4ece2e69b0be
- https://git.kernel.org/stable/c/ebdc569a07a3e8dbe66b4184922ad6f88ac0b96f
- https://git.kernel.org/stable/c/f1ac7789406e2ca9ac51c41ad2daa597f47bdd4d
- https://git.kernel.org/stable/c/f75617cc8df4155374132f0b500b0b3ebb967458
Modified: 2025-09-23
CVE-2023-52775
In the Linux kernel, the following vulnerability has been resolved: net/smc: avoid data corruption caused by decline We found a data corruption issue during testing of SMC-R on Redis applications. The benchmark has a low probability of reporting a strange error as shown below. "Error: Protocol error, got "\xe2" as reply type byte" Finally, we found that the retrieved error data was as follows: 0xE2 0xD4 0xC3 0xD9 0x04 0x00 0x2C 0x20 0xA6 0x56 0x00 0x16 0x3E 0x0C 0xCB 0x04 0x02 0x01 0x00 0x00 0x20 0x00 0x00 0x00 0x00 0x00 0x00 0x00 0x00 0x00 0x00 0x00 0x00 0x00 0x00 0x00 0x00 0x00 0xE2 It is quite obvious that this is a SMC DECLINE message, which means that the applications received SMC protocol message. We found that this was caused by the following situations: client server ¦ clc proposal -------------> ¦ clc accept <------------- ¦ clc confirm -------------> wait llc confirm send llc confirm ¦failed llc confirm ¦ x------ (after 2s)timeout wait llc confirm rsp wait decline (after 1s) timeout (after 2s) timeout ¦ decline --------------> ¦ decline <-------------- As a result, a decline message was sent in the implementation, and this message was read from TCP by the already-fallback connection. This patch double the client timeout as 2x of the server value, With this simple change, the Decline messages should never cross or collide (during Confirm link timeout). This issue requires an immediate solution, since the protocol updates involve a more long-term solution.
- https://git.kernel.org/stable/c/5ada292b5c504720a0acef8cae9acc62a694d19c
- https://git.kernel.org/stable/c/7234d2b5dffa5af77fd4e0deaebab509e130c6b1
- https://git.kernel.org/stable/c/90072af9efe8c7bd7d086709014ddd44cebd5e7c
- https://git.kernel.org/stable/c/94a0ae698b4d5d5bb598e23228002a1491c50add
- https://git.kernel.org/stable/c/e6d71b437abc2f249e3b6a1ae1a7228e09c6e563
- https://git.kernel.org/stable/c/5ada292b5c504720a0acef8cae9acc62a694d19c
- https://git.kernel.org/stable/c/7234d2b5dffa5af77fd4e0deaebab509e130c6b1
- https://git.kernel.org/stable/c/90072af9efe8c7bd7d086709014ddd44cebd5e7c
- https://git.kernel.org/stable/c/94a0ae698b4d5d5bb598e23228002a1491c50add
- https://git.kernel.org/stable/c/e6d71b437abc2f249e3b6a1ae1a7228e09c6e563
Modified: 2025-04-02
CVE-2023-52779
In the Linux kernel, the following vulnerability has been resolved: fs: Pass AT_GETATTR_NOSEC flag to getattr interface function When vfs_getattr_nosec() calls a filesystem's getattr interface function then the 'nosec' should propagate into this function so that vfs_getattr_nosec() can again be called from the filesystem's gettattr rather than vfs_getattr(). The latter would add unnecessary security checks that the initial vfs_getattr_nosec() call wanted to avoid. Therefore, introduce the getattr flag GETATTR_NOSEC and allow to pass with the new getattr_flags parameter to the getattr interface function. In overlayfs and ecryptfs use this flag to determine which one of the two functions to call. In a recent code change introduced to IMA vfs_getattr_nosec() ended up calling vfs_getattr() in overlayfs, which in turn called security_inode_getattr() on an exiting process that did not have current->fs set anymore, which then caused a kernel NULL pointer dereference. With this change the call to security_inode_getattr() can be avoided, thus avoiding the NULL pointer dereference.
Modified: 2025-09-25
CVE-2023-52781
In the Linux kernel, the following vulnerability has been resolved: usb: config: fix iteration issue in 'usb_get_bos_descriptor()' The BOS descriptor defines a root descriptor and is the base descriptor for accessing a family of related descriptors. Function 'usb_get_bos_descriptor()' encounters an iteration issue when skipping the 'USB_DT_DEVICE_CAPABILITY' descriptor type. This results in the same descriptor being read repeatedly. To address this issue, a 'goto' statement is introduced to ensure that the pointer and the amount read is updated correctly. This ensures that the function iterates to the next descriptor instead of reading the same descriptor repeatedly.
- https://git.kernel.org/stable/c/64c27b7b2357ddb38b6afebaf46d5bff4d250702
- https://git.kernel.org/stable/c/7c0244cc311a4038505b73682b7c8ceaa5c7a8c8
- https://git.kernel.org/stable/c/974bba5c118f4c2baf00de0356e3e4f7928b4cbc
- https://git.kernel.org/stable/c/9ef94ec8e52eaf7b9abc5b5f8f5b911751112223
- https://git.kernel.org/stable/c/f89fef7710b2ba0f7a1e46594e530dcf2f77be91
- https://git.kernel.org/stable/c/64c27b7b2357ddb38b6afebaf46d5bff4d250702
- https://git.kernel.org/stable/c/7c0244cc311a4038505b73682b7c8ceaa5c7a8c8
- https://git.kernel.org/stable/c/974bba5c118f4c2baf00de0356e3e4f7928b4cbc
- https://git.kernel.org/stable/c/9ef94ec8e52eaf7b9abc5b5f8f5b911751112223
- https://git.kernel.org/stable/c/f89fef7710b2ba0f7a1e46594e530dcf2f77be91
Modified: 2024-11-21
CVE-2023-52783
In the Linux kernel, the following vulnerability has been resolved: net: wangxun: fix kernel panic due to null pointer When the device uses a custom subsystem vendor ID, the function wx_sw_init() returns before the memory of 'wx->mac_table' is allocated. The null pointer will causes the kernel panic.
