CVE List
| cve编号 | 漏洞描述 | 危险等级 | 包名 | 是否影响lns23-2 | 修复状态 | 发现时间 | 修复时间 |
|---|---|---|---|---|---|---|---|
| CVE-2025-38607 | No description is available for this CVE. |
Moderate | kernel:5.10, kernel:4.19, kernel:6.6 | 否 | 完成修复 | 2025-08-20 | 2026-01-30 |
| CVE-2025-38606 | No description is available for this CVE. |
Moderate | kernel:5.10, kernel:4.19, kernel:6.6 | 否 | 完成修复 | 2025-08-20 | 2026-01-30 |
| CVE-2025-38604 | No description is available for this CVE. |
Important | kernel:5.10, kernel:4.18, kernel:4.19, kernel:6.6 | 是 | 完成修复 | 2025-08-20 | 2025-12-31 |
| CVE-2025-38603 | No description is available for this CVE. |
Moderate | kernel:5.10, kernel:4.19, kernel:6.6 | 是 | 完成修复 | 2025-08-20 | 2026-01-23 |
| CVE-2025-38600 | No description is available for this CVE. |
Moderate | kernel:5.10, kernel:4.19, kernel:6.6 | 否 | 完成修复 | 2025-08-20 | 2026-01-30 |
| CVE-2025-38599 | In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mt76: mt7996: Fix possible OOB access in mt7996_tx()\n\nFis possible Out-Of-Boundary access in mt7996_tx routine if link_id is\nset to IEEE80211_LINK_UNSPECIFIED |
Moderate | kernel:5.10, kernel:4.19, kernel:6.6 | 否 | 完成修复 | 2025-08-20 | 2026-01-30 |
| CVE-2025-38598 | No description is available for this CVE. |
Moderate | kernel:5.10, kernel:4.19, kernel:6.6 | 否 | 完成修复 | 2025-08-20 | 2026-01-30 |
| CVE-2025-38596 | No description is available for this CVE. |
Moderate | kernel:5.10, kernel:4.19, kernel:6.6 | 否 | 完成修复 | 2025-08-20 | 2026-01-30 |
| CVE-2025-38594 | In the Linux kernel, the following vulnerability has been resolved:\n\niommu/vt-d: Fix UAF on sva unbind with pending IOPFs\n\nCommit 17fce9d2336d ("iommu/vt-d: Put iopf enablement in domain attach\npath") disables IOPF on device by removing the device from its IOMMU's\nIOPF queue when the last IOPF-capable domain is detached from the device.\nUnfortunately, it did this in a wrong place where there are still pending\nIOPFs. As a result, a use-after-free error is potentially triggered and\neventually a kernel panic with a kernel trace similar to the following:\n\n refcount_t: underflow; use-after-free.\n WARNING: CPU: 3 PID: 313 at lib/refcount.c:28 refcount_warn_saturate+0xd8/0xe0\n Workqueue: iopf_queue/dmar0-iopfq iommu_sva_handle_iopf\n Call Trace:\n |
Moderate | kernel:5.10, kernel:4.19, kernel:6.6 | 否 | 完成修复 | 2025-08-20 | 2026-01-30 |
| CVE-2025-38592 | In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: hci_devcd_dump: fix out-of-bounds via dev_coredumpv\n\nCurrently both dev_coredumpv and skb_put_data in hci_devcd_dump use\nhdev->dump.head. However, dev_coredumpv can free the buffer. From\ndev_coredumpm_timeout documentation, which is used by dev_coredumpv:\n\n > Creates a new device coredump for the given device. If a previous one hasn't\n > been read yet, the new coredump is discarded. The data lifetime is determined\n > by the device coredump framework and when it is no longer needed the @free\n > function will be called to free the data.\n\nIf the data has not been read by the userspace yet, dev_coredumpv will\ndiscard new buffer, freeing hdev->dump.head. This leads to\nvmalloc-out-of-bounds error when skb_put_data tries to access\nhdev->dump.head.\n\nA crash report from syzbot illustrates this:\n\n ==================================================================\n BUG: KASAN: vmalloc-out-of-bounds in skb_put_data\n include/linux/skbuff.h:2752 [inline]\n BUG: KASAN: vmalloc-out-of-bounds in hci_devcd_dump+0x142/0x240\n net/bluetooth/coredump.c:258\n Read of size 140 at addr ffffc90004ed5000 by task kworker/u9:2/5844\n\n CPU: 1 UID: 0 PID: 5844 Comm: kworker/u9:2 Not tainted\n 6.14.0-syzkaller-10892-g4e82c87058f4 #0 PREEMPT(full)\n Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS\n Google 02/12/2025\n Workqueue: hci0 hci_devcd_timeout\n Call Trace:\n |
Moderate | kernel:5.10, kernel:4.19, kernel:6.6 | 否 | 完成修复 | 2025-08-20 | 2026-01-30 |
| CVE-2025-38589 | No description is available for this CVE. |
Moderate | kernel:5.10, kernel:4.19, kernel:6.6 | 否 | 完成修复 | 2025-08-20 | 2026-01-30 |
| CVE-2025-38588 | No description is available for this CVE. |
Moderate | kernel:5.10, kernel:4.19, kernel:6.6 | 否 | 完成修复 | 2025-08-20 | 2026-01-30 |
| CVE-2025-38587 | No description is available for this CVE. |
Moderate | kernel:5.10, kernel:4.19, kernel:6.6 | 否 | 完成修复 | 2025-08-20 | 2026-01-30 |
| CVE-2025-38586 | No description is available for this CVE. |
Low | kernel:5.10, kernel:4.19, kernel:6.6 | 否 | 完成修复 | 2025-08-20 | 2026-01-24 |
| CVE-2025-38585 | No description is available for this CVE. |
Moderate | kernel:5.10, kernel:4.19, kernel:6.6 | 否 | 完成修复 | 2025-08-20 | 2026-01-31 |
| CVE-2025-38584 | No description is available for this CVE. |
Important | kernel:5.10, kernel:4.19, kernel:6.6 | 是 | 完成修复 | 2025-08-20 | 2026-01-04 |
| CVE-2025-38582 | No description is available for this CVE. |
Moderate | kernel:5.10, kernel:4.19, kernel:6.6 | 否 | 完成修复 | 2025-08-20 | 2026-01-30 |
| CVE-2025-38573 | No description is available for this CVE. |
Moderate | kernel:5.10, kernel:4.19, kernel:6.6 | 否 | 完成修复 | 2025-08-20 | 2026-01-30 |
| CVE-2025-38570 | No description is available for this CVE. |
Moderate | kernel:5.10, kernel:4.19, kernel:6.6 | 否 | 完成修复 | 2025-08-20 | 2026-01-30 |
| CVE-2025-38569 | In the Linux kernel, the following vulnerability has been resolved:\n\nbenet: fix BUG when creating VFs\n\nbenet crashes as soon as SRIOV VFs are created:\n\n kernel BUG at mm/vmalloc.c:3457!\n Oops: invalid opcode: 0000 [#1] SMP KASAN NOPTI\n CPU: 4 UID: 0 PID: 7408 Comm: test.sh Kdump: loaded Not tainted 6.16.0+ #1 PREEMPT(voluntary)\n [...]\n RIP: 0010:vunmap+0x5f/0x70\n [...]\n Call Trace:\n |
Moderate | kernel:5.10, kernel:4.18, kernel:4.19, kernel:6.6 | 否 | 完成修复 | 2025-08-20 | 2026-01-30 |
| CVE-2025-38568 | No description is available for this CVE. |
Important | kernel:5.10, kernel:4.19, kernel:6.6 | 是 | 完成修复 | 2025-08-20 | 2025-12-31 |
| CVE-2025-38564 | In the Linux kernel, the following vulnerability has been resolved:\n\nperf/core: Handle buffer mapping fail correctly in perf_mmap()\n\nAfter successful allocation of a buffer or a successful attachment to an\nexisting buffer perf_mmap() tries to map the buffer read only into the page\ntable. If that fails, the already set up page table entries are zapped, but\nthe other perf specific side effects of that failure are not handled. The\ncalling code just cleans up the VMA and does not invoke perf_mmap_close().\n\nThis leaks reference counts, corrupts user->vm accounting and also results\nin an unbalanced invocation of event::event_mapped().\n\nCure this by moving the event::event_mapped() invocation before the\nmap_range() call so that on map_range() failure perf_mmap_close() can be\ninvoked without causing an unbalanced event::event_unmapped() call.\n\nperf_mmap_close() undoes the reference counts and eventually frees buffers. |
Low | kernel:5.10, kernel:4.19, kernel:6.6 | 是 | 完成修复 | 2025-08-20 | 2026-01-25 |
| CVE-2025-38559 | No description is available for this CVE. |
Moderate | kernel:5.10, kernel:4.19, kernel:6.6 | 否 | 完成修复 | 2025-08-20 | 2026-01-30 |
| CVE-2025-38558 | No description is available for this CVE. |
Moderate | kernel:5.10, kernel:4.19, kernel:6.6 | 否 | 完成修复 | 2025-08-20 | 2026-01-30 |
| CVE-2025-38557 | No description is available for this CVE. |
Moderate | kernel:5.10, kernel:4.19, kernel:6.6 | 否 | 完成修复 | 2025-08-20 | 2026-01-30 |
| CVE-2025-38556 | In the Linux kernel, the following vulnerability has been resolved:\n\nHID: core: Harden s32ton() against conversion to 0 bits\n\nTesting by the syzbot fuzzer showed that the HID core gets a\nshift-out-of-bounds exception when it tries to convert a 32-bit\nquantity to a 0-bit quantity. Ideally this should never occur, but\nthere are buggy devices and some might have a report field with size\nset to zero; we shouldn't reject the report or the device just because\nof that.\n\nInstead, harden the s32ton() routine so that it returns a reasonable\nresult instead of crashing when it is called with the number of bits\nset to 0 -- the same as what snto32() does. |
Important | kernel:5.10, kernel:4.18, kernel:4.19, kernel:6.6 | 是 | 完成修复 | 2025-08-20 | 2025-12-31 |
| CVE-2025-38554 | In the Linux kernel, the following vulnerability has been resolved:\n\nmm: fix a UAF when vma->mm is freed after vma->vm_refcnt got dropped\n\nBy inducing delays in the right places, Jann Horn created a reproducer for\na hard to hit UAF issue that became possible after VMAs were allowed to be\nrecycled by adding SLAB_TYPESAFE_BY_RCU to their cache.\n\nRace description is borrowed from Jann's discovery report:\nlock_vma_under_rcu() looks up a VMA locklessly with mas_walk() under\nrcu_read_lock(). At that point, the VMA may be concurrently freed, and it\ncan be recycled by another process. vma_start_read() then increments the\nvma->vm_refcnt (if it is in an acceptable range), and if this succeeds,\nvma_start_read() can return a recycled VMA.\n\nIn this scenario where the VMA has been recycled, lock_vma_under_rcu()\nwill then detect the mismatching ->vm_mm pointer and drop the VMA through\nvma_end_read(), which calls vma_refcount_put(). vma_refcount_put() drops\nthe refcount and then calls rcuwait_wake_up() using a copy of vma->vm_mm. \nThis is wrong: It implicitly assumes that the caller is keeping the VMA's\nmm alive, but in this scenario the caller has no relation to the VMA's mm,\nso the rcuwait_wake_up() can cause UAF.\n\nThe diagram depicting the race:\nT1 T2 T3\n== == ==\nlock_vma_under_rcu\n mas_walk\n |
Important | kernel:5.10, kernel:4.19, kernel:6.6 | 否 | 完成修复 | 2025-08-20 | 2025-12-08 |
| CVE-2025-38553 | No description is available for this CVE. |
Important | kernel:5.10, kernel:4.18, kernel:4.19, kernel:6.6 | 是 | 完成修复 | 2025-08-20 | 2025-12-31 |
| CVE-2024-50149 | In the Linux kernel, the following vulnerability has been resolved:drm/xe: Don't free job in TDRFreeing job in TDR is not safe as TDR can pass the run_job threadresulting in UAF. It is only safe for free job to naturally be called bythe scheduler. Rather free job in TDR, add to pending list.(cherry picked from commit ea2f6a77d0c40d97f4a4dc93fee4afe15d94926d) |
Moderate | kernel:5.10, kernel:4.19, kernel:6.6 | 否 | 完成修复 | 2025-08-20 | 2026-01-30 |
| CVE-2024-50139 | In the Linux kernel, the following vulnerability has been resolved:KVM: arm64: Fix shift-out-of-bounds bugFix a shift-out-of-bounds bug reported by UBSAN when runningVM with MTE enabled host kernel.UBSAN: shift-out-of-bounds in arch/arm64/kvm/sys_regs.c:1988:14shift exponent 33 is too large for 32-bit type 'int'CPU: 26 UID: 0 PID: 7629 Comm: qemu-kvm Not tainted 6.12.0-rc2 #34Hardware name: IEI NF5280R7/Mitchell MB, BIOS 00.00. 2024-10-12 09:28:54 10/14/2024Call trace:dump_backtrace+0xa0/0x128show_stack+0x20/0x38dump_stack_lvl+0x74/0x90dump_stack+0x18/0x28__ubsan_handle_shift_out_of_bounds+0xf8/0x1e0reset_clidr+0x10c/0x1c8kvm_reset_sys_regs+0x50/0x1c8kvm_reset_vcpu+0xec/0x2b0__kvm_vcpu_set_target+0x84/0x158kvm_vcpu_set_target+0x138/0x168kvm_arch_vcpu_ioctl_vcpu_init+0x40/0x2b0kvm_arch_vcpu_ioctl+0x28c/0x4b8kvm_vcpu_ioctl+0x4bc/0x7a8__arm64_sys_ioctl+0xb4/0x100invoke_syscall+0x70/0x100el0_svc_common.constprop.0+0x48/0xf0do_el0_svc+0x24/0x38el0_svc+0x3c/0x158el0t_64_sync_handler+0x120/0x130el0t_64_sync+0x194/0x198 |
Moderate | kernel:5.10, kernel:4.19, kernel:6.6 | 否 | 完成修复 | 2025-08-20 | 2025-12-18 |
| CVE-2024-50132 | In the Linux kernel, the following vulnerability has been resolved:tracing/probes: Fix MAX_TRACE_ARGS limit handlingWhen creating a trace_probe we would set nr_args prior to truncating thearguments to MAX_TRACE_ARGS. However, we would only initialize argumentsup to the limit.This caused invalid memory access when attempting to set up probes withmore than 128 fetchargs.BUG: kernel NULL pointer dereference, address: 0000000000000020#PF: supervisor read access in kernel mode#PF: error_code(0x0000) - not-present pagePGD 0 P4D 0Oops: Oops: 0000 [#1] PREEMPT SMP PTICPU: 0 UID: 0 PID: 1769 Comm: cat Not tainted 6.11.0-rc7+ #8Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-1.fc39 04/01/2014RIP: 0010:__set_print_fmt+0x134/0x330Resolve the issue by applying the MAX_TRACE_ARGS limit earlier. Returnan error when there are too many arguments instead of silentlytruncating. |
Moderate | kernel:5.10, kernel:4.19, kernel:6.6 | 否 | 完成修复 | 2025-08-20 | 2026-01-30 |
| CVE-2024-50129 | In the Linux kernel, the following vulnerability has been resolved:net: pse-pd: Fix out of bound for loopAdjust the loop limit to prevent out-of-bounds access when iterating overPI structures. The loop should not reach the index pcdev->nr_lines sincewe allocate exactly pcdev->nr_lines number of PI structures. This fixensures proper bounds are maintained during iterations. |
Moderate | kernel:5.10, kernel:4.19, kernel:6.6 | 否 | 完成修复 | 2025-08-20 | 2026-01-30 |
| CVE-2024-50123 | In the Linux kernel, the following vulnerability has been resolved:bpf: Add the missing BPF_LINK_TYPE invocation for sockmapThere is an out-of-bounds read in bpf_link_show_fdinfo() for the sockmaplink fd. Fix it by adding the missing BPF_LINK_TYPE invocation forsockmap linkAlso add comments for bpf_link_type to prevent missing updates in thefuture. |
Moderate | kernel:5.10, kernel:4.19, kernel:6.6 | 否 | 完成修复 | 2025-08-20 | 2026-01-30 |
| CVE-2024-50122 | In the Linux kernel, the following vulnerability has been resolved:PCI: Hold rescan lock while adding devices during host probeSince adding the PCI power control code, we may end up with a race betweenthe pwrctl platform device rescanning the bus and host controller probefunctions. The latter need to take the rescan lock when adding devices orwe may end up in an undefined state having two incompletely added devicesand hit the following crash when trying to remove the device over sysfs:Unable to handle kernel NULL pointer dereference at virtual address 0000000000000000Internal error: Oops: 0000000096000004 [#1] SMPCall trace:__pi_strlen+0x14/0x150kernfs_find_ns+0x80/0x13ckernfs_remove_by_name_ns+0x54/0xf0sysfs_remove_bin_file+0x24/0x34pci_remove_resource_files+0x3c/0x84pci_remove_sysfs_dev_files+0x28/0x38pci_stop_bus_device+0x8c/0xd8pci_stop_bus_device+0x40/0xd8pci_stop_and_remove_bus_device_locked+0x28/0x48remove_store+0x70/0xb0dev_attr_store+0x20/0x38sysfs_kf_write+0x58/0x78kernfs_fop_write_iter+0xe8/0x184vfs_write+0x2dc/0x308ksys_write+0x7c/0xec |
Moderate | kernel:5.10, kernel:4.19, kernel:6.6 | 否 | 完成修复 | 2025-08-20 | 2026-01-30 |
| CVE-2024-50119 | In the Linux kernel, the following vulnerability has been resolved:cifs: fix warning when destroy 'cifs_io_request_pool'There's a issue as follows:WARNING: CPU: 1 PID: 27826 at mm/slub.c:4698 free_large_kmalloc+0xac/0xe0RIP: 0010:free_large_kmalloc+0xac/0xe0Call Trace: |
Moderate | kernel:5.10, kernel:4.19, kernel:6.6 | 否 | 完成修复 | 2025-08-20 | 2026-01-30 |
| CVE-2024-50114 | In the Linux kernel, the following vulnerability has been resolved:KVM: arm64: Unregister redistributor for failed vCPU creationAlex reports that syzkaller has managed to trigger a use-after-free whentearing down a VM:BUG: KASAN: slab-use-after-free in kvm_put_kvm+0x300/0xe68 virt/kvm/kvm_main.c:5769Read of size 8 at addr ffffff801c6890d0 by task syz.3.2219/10758CPU: 3 UID: 0 PID: 10758 Comm: syz.3.2219 Not tainted 6.11.0-rc6-dirty #64Hardware name: linux,dummy-virt (DT)Call trace:dump_backtrace+0x17c/0x1a8 arch/arm64/kernel/stacktrace.c:317show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:324__dump_stack lib/dump_stack.c:93 [inline]dump_stack_lvl+0x94/0xc0 lib/dump_stack.c:119print_report+0x144/0x7a4 mm/kasan/report.c:377kasan_report+0xcc/0x128 mm/kasan/report.c:601__asan_report_load8_noabort+0x20/0x2c mm/kasan/report_generic.c:381kvm_put_kvm+0x300/0xe68 virt/kvm/kvm_main.c:5769kvm_vm_release+0x4c/0x60 virt/kvm/kvm_main.c:1409__fput+0x198/0x71c fs/file_table.c:422____fput+0x20/0x30 fs/file_table.c:450task_work_run+0x1cc/0x23c kernel/task_work.c:228do_notify_resume+0x144/0x1a0 include/linux/resume_user_mode.h:50el0_svc+0x64/0x68 arch/arm64/kernel/entry-common.c:169el0t_64_sync_handler+0x90/0xfc arch/arm64/kernel/entry-common.c:730el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:598Upon closer inspection, it appears that we do not properly tear down theMMIO registration for a vCPU that fails creation late in the game, e.g.a vCPU w/ the same ID already exists in the VM.It is important to consider the context of commit that introduced this bugby moving the unregistration out of __kvm_vgic_vcpu_destroy(). Thatchange correctly sought to avoid an srcu v. config_lock inversion bybreaking up the vCPU teardown into two parts, one guarded by theconfig_lock.Fix the use-after-free while avoiding lock inversion by adding aspecial-cased unregistration to __kvm_vgic_vcpu_destroy(). This is safebecause failed vCPUs are torn down outside of the config_lock. |
Moderate | kernel:5.10, kernel:4.19, kernel:6.6 | 否 | 完成修复 | 2025-08-20 | 2025-12-08 |
| CVE-2024-50113 | In the Linux kernel, the following vulnerability has been resolved:firewire: core: fix invalid port index for parent deviceIn a commit 24b7f8e5cd65 ("firewire: core: use helper functions for selfID sequence"), the enumeration over self ID sequence was refactored withsome helper functions with KUnit tests. These helper functions areguaranteed to work expectedly by the KUnit tests, however their applicationincludes a mistake to assign invalid value to the index of port connectedto parent device.This bug affects the case that any extra node devices which has three ormore ports are connected to 1394 OHCI controller. In the case, the pathto update the tree cache could hits WARN_ON(), and gets general protectionfault due to the access to invalid address computed by the invalid value.This commit fixes the bug to assign correct port index. |
Moderate | kernel:5.10, kernel:4.19, kernel:6.6 | 否 | 完成修复 | 2025-08-20 | 2026-02-02 |
| CVE-2024-50112 | In the Linux kernel, the following vulnerability has been resolved:x86/lam: Disable ADDRESS_MASKING in most casesLinear Address Masking (LAM) has a weakness related to transientexecution as described in the SLAM paper[1]. Unless Linear AddressSpace Separation (LASS) is enabled this weakness may be exploitable.Until kernel adds support for LASS[2], only allow LAM for COMPILE_TEST,or when speculation mitigations have been disabled at compile time,otherwise keep LAM disabled.There are no processors in market that support LAM yet, so currentlynobody is affected by this issue.[1] SLAM: https://download.vusec.net/papers/slam_sp24.pdf[2] LASS: https://lore.kernel.org/lkml/20230609183632.48706-1-alexander.shishkin@linux.intel.com/[ dhansen: update SPECULATION_MITIGATIONS -> CPU_MITIGATIONS ] |
Moderate | kernel:5.10, kernel:4.19, kernel:6.6 | 否 | 完成修复 | 2025-08-20 | 2026-01-31 |
| CVE-2024-50105 | In the Linux kernel, the following vulnerability has been resolved:ASoC: qcom: sc7280: Fix missing Soundwire runtime stream allocCommit 15c7fab0e047 ("ASoC: qcom: Move Soundwire runtime stream alloc tosoundcards") moved the allocation of Soundwire stream runtime from theQualcomm Soundwire driver to each individual machine sound card driver,except that it forgot to update SC7280 card.Just like for other Qualcomm sound cards using Soundwire, the carddriver should allocate and release the runtime. Otherwise soundplayback will result in a NULL pointer dereference or other effect ofuninitialized memory accesses (which was confirmed on SDM845 havingsimilar issue). |
Moderate | kernel:5.10, kernel:4.19, kernel:6.6 | 否 | 完成修复 | 2025-08-20 | 2026-02-02 |
| CVE-2024-50104 | In the Linux kernel, the following vulnerability has been resolved:ASoC: qcom: sdm845: add missing soundwire runtime stream allocDuring the migration of Soundwire runtime stream allocation fromthe Qualcomm Soundwire controller to SoC's soundcard drivers the sdm845soundcard was forgotten.At this point any playback attempt or audio daemon startup, for instanceon sdm845-db845c (Qualcomm RB3 board), will result in stream pointerNULL dereference:Unable to handle kernel NULL pointer dereference at virtualaddress 0000000000000020Mem abort info:ESR = 0x0000000096000004EC = 0x25: DABT (current EL), IL = 32 bitsSET = 0, FnV = 0EA = 0, S1PTW = 0FSC = 0x04: level 0 translation faultData abort info:ISV = 0, ISS = 0x00000004, ISS2 = 0x00000000CM = 0, WnR = 0, TnD = 0, TagAccess = 0GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0user pgtable: 4k pages, 48-bit VAs, pgdp=0000000101ecf000[0000000000000020] pgd=0000000000000000, p4d=0000000000000000Internal error: Oops: 0000000096000004 [#1] PREEMPT SMPModules linked in: ...CPU: 5 UID: 0 PID: 1198 Comm: aplayNot tainted 6.12.0-rc2-qcomlt-arm64-00059-g9d78f315a362-dirty #18Hardware name: Thundercomm Dragonboard 845c (DT)pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)pc : sdw_stream_add_slave+0x44/0x380 [soundwire_bus]lr : sdw_stream_add_slave+0x44/0x380 [soundwire_bus]sp : ffff80008a2035c0x29: ffff80008a2035c0 x28: ffff80008a203978 x27: 0000000000000000x26: 00000000000000c0 x25: 0000000000000000 x24: ffff1676025f4800x23: ffff167600ff1cb8 x22: ffff167600ff1c98 x21: 0000000000000003x20: ffff167607316000 x19: ffff167604e64e80 x18: 0000000000000000x17: 0000000000000000 x16: ffffcec265074160 x15: 0000000000000000x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000x11: 0000000000000000 x10: 0000000000000000 x9 : 0000000000000000x8 : 0000000000000000 x7 : 0000000000000000 x6 : ffff167600ff1cecx5 : ffffcec22cfa2010 x4 : 0000000000000000 x3 : 0000000000000003x2 : ffff167613f836c0 x1 : 0000000000000000 x0 : ffff16761feb60b8Call trace:sdw_stream_add_slave+0x44/0x380 [soundwire_bus]wsa881x_hw_params+0x68/0x80 [snd_soc_wsa881x]snd_soc_dai_hw_params+0x3c/0xa4__soc_pcm_hw_params+0x230/0x660dpcm_be_dai_hw_params+0x1d0/0x3f8dpcm_fe_dai_hw_params+0x98/0x268snd_pcm_hw_params+0x124/0x460snd_pcm_common_ioctl+0x998/0x16e8snd_pcm_ioctl+0x34/0x58__arm64_sys_ioctl+0xac/0xf8invoke_syscall+0x48/0x104el0_svc_common.constprop.0+0x40/0xe0do_el0_svc+0x1c/0x28el0_svc+0x34/0xe0el0t_64_sync_handler+0x120/0x12cel0t_64_sync+0x190/0x194Code: aa0403fb f9418400 9100e000 9400102f (f8420f22)---[ end trace 0000000000000000 ]---0000000000006108 |
Moderate | kernel:5.10, kernel:4.19, kernel:6.6 | 否 | 完成修复 | 2025-08-20 | 2026-02-02 |
| CVE-2024-50100 | In the Linux kernel, the following vulnerability has been resolved:USB: gadget: dummy-hcd: Fix "task hung" problemThe syzbot fuzzer has been encountering "task hung" problems eversince the dummy-hcd driver was changed to use hrtimers instead ofregular timers. It turns out that the problems are caused by a subtledifference between the timer_pending() and hrtimer_active() APIs.The changeover blindly replaced the first by the second. However,timer_pending() returns True when the timer is queued but not when itscallback is running, whereas hrtimer_active() returns True when thehrtimer is queued _or_ its callback is running. This differenceoccasionally caused dummy_urb_enqueue() to think that the callbackroutine had not yet started when in fact it was almost finished. As aresult the hrtimer was not restarted, which made it impossible for thedriver to dequeue later the URB that was just enqueued. This causedusb_kill_urb() to hang, and things got worse from there.Since hrtimers have no API for telling when they are queued and thecallback isn't running, the driver must keep track of this for itself.That's what this patch does, adding a new "timer_pending" flag andsetting or clearing it at the appropriate times. |
Moderate | kernel:5.10, kernel:4.19, kernel:6.6 | 否 | 完成修复 | 2025-08-20 | 2026-01-30 |
| CVE-2024-50097 | In the Linux kernel, the following vulnerability has been resolved:net: fec: don't save PTP state if PTP is unsupportedSome platforms (such as i.MX25 and i.MX27) do not support PTP, so onthese platforms fec_ptp_init() is not called and the related membersin fep are not initialized. However, fec_ptp_save_state() is calledunconditionally, which causes the kernel to panic. Therefore, add acondition so that fec_ptp_save_state() is not called if PTP is notsupported. |
Moderate | kernel:5.10, kernel:4.19, kernel:6.6 | 否 | 完成修复 | 2025-08-20 | 2026-01-30 |
| CVE-2024-50091 | In the Linux kernel, the following vulnerability has been resolved:dm vdo: don't refer to dedupe_context after releasing itClear the dedupe_context pointer in a data_vio whenever ownership ofthe context is lost, so that vdo can't examine it accidentally. |
Moderate | kernel:5.10, kernel:4.19, kernel:6.6 | 否 | 完成修复 | 2025-08-20 | 2026-01-30 |
| CVE-2024-50090 | In the Linux kernel, the following vulnerability has been resolved:drm/xe/oa: Fix overflow in oa batch bufferBy default xe_bb_create_job() appends a MI_BATCH_BUFFER_END to batchbuffer, this is not a problem if batch buffer is only used once butoa reuses the batch buffer for the same metric and at each callit appends a MI_BATCH_BUFFER_END, printing the warning below and thenoverflowing.[ 381.072016] ------------[ cut here ]------------[ 381.072019] xe 0000:00:02.0: [drm] Assertion `bb->len * 4 + bb_prefetch(q->gt) <= size` failed!platform: LUNARLAKE subplatform: 1graphics: Xe2_LPG / Xe2_HPG 20.04 step B0media: Xe2_LPM / Xe2_HPM 20.00 step B0tile: 0 VRAM 0 BGT: 0 type 1So here checking if batch buffer already have MI_BATCH_BUFFER_END ifnot append it.v2:- simply fix, suggestion from Ashutosh(cherry picked from commit 9ba0e0f30ca42a98af3689460063edfb6315718a) |
Moderate | kernel:5.10, kernel:4.19, kernel:6.6 | 否 | 完成修复 | 2025-08-20 | 2026-01-30 |
| CVE-2024-50084 | In the Linux kernel, the following vulnerability has been resolved:net: microchip: vcap api: Fix memory leaks in vcap_api_encode_rule_test()Commit a3c1e45156ad ("net: microchip: vcap: Fix use-after-free error inkunit test") fixed the use-after-free error, but introduced belowmemory leaks by removing necessary vcap_free_rule(), add it to fix it.unreferenced object 0xffffff80ca58b700 (size 192):comm "kunit_try_catch", pid 1215, jiffies 4294898264hex dump (first 32 bytes):00 12 7a 00 05 00 00 00 0a 00 00 00 64 00 00 00 ..z.........d...00 00 00 00 00 00 00 00 00 04 0b cc 80 ff ff ff ................backtrace (crc 9c09c3fe):[<0000000052a0be73>] kmemleak_alloc+0x34/0x40[<0000000043605459>] __kmalloc_cache_noprof+0x26c/0x2f4[<0000000040a01b8d>] vcap_alloc_rule+0x3cc/0x9c4[<000000003fe86110>] vcap_api_encode_rule_test+0x1ac/0x16b0[<00000000b3595fc4>] kunit_try_run_case+0x13c/0x3ac[<0000000010f5d2bf>] kunit_generic_run_threadfn_adapter+0x80/0xec[<00000000c5d82c9a>] kthread+0x2e8/0x374[<00000000f4287308>] ret_from_fork+0x10/0x20unreferenced object 0xffffff80cc0b0400 (size 64):comm "kunit_try_catch", pid 1215, jiffies 4294898265hex dump (first 32 bytes):80 04 0b cc 80 ff ff ff 18 b7 58 ca 80 ff ff ff ..........X.....39 00 00 00 02 00 00 00 06 05 04 03 02 01 ff ff 9...............backtrace (crc daf014e9):[<0000000052a0be73>] kmemleak_alloc+0x34/0x40[<0000000043605459>] __kmalloc_cache_noprof+0x26c/0x2f4[<000000000ff63fd4>] vcap_rule_add_key+0x2cc/0x528[<00000000dfdb1e81>] vcap_api_encode_rule_test+0x224/0x16b0[<00000000b3595fc4>] kunit_try_run_case+0x13c/0x3ac[<0000000010f5d2bf>] kunit_generic_run_threadfn_adapter+0x80/0xec[<00000000c5d82c9a>] kthread+0x2e8/0x374[<00000000f4287308>] ret_from_fork+0x10/0x20unreferenced object 0xffffff80cc0b0700 (size 64):comm "kunit_try_catch", pid 1215, jiffies 4294898265hex dump (first 32 bytes):80 07 0b cc 80 ff ff ff 28 b7 58 ca 80 ff ff ff ........(.X.....3c 00 00 00 00 00 00 00 01 2f 03 b3 ec ff ff ff <......../......backtrace (crc 8d877792):[<0000000052a0be73>] kmemleak_alloc+0x34/0x40[<0000000043605459>] __kmalloc_cache_noprof+0x26c/0x2f4[<000000006eadfab7>] vcap_rule_add_action+0x2d0/0x52c[<00000000323475d1>] vcap_api_encode_rule_test+0x4d4/0x16b0[<00000000b3595fc4>] kunit_try_run_case+0x13c/0x3ac[<0000000010f5d2bf>] kunit_generic_run_threadfn_adapter+0x80/0xec[<00000000c5d82c9a>] kthread+0x2e8/0x374[<00000000f4287308>] ret_from_fork+0x10/0x20unreferenced object 0xffffff80cc0b0900 (size 64):comm "kunit_try_catch", pid 1215, jiffies 4294898266hex dump (first 32 bytes):80 09 0b cc 80 ff ff ff 80 06 0b cc 80 ff ff ff ................7d 00 00 00 01 00 00 00 00 00 00 00 ff 00 00 00 }...............backtrace (crc 34181e56):[<0000000052a0be73>] kmemleak_alloc+0x34/0x40[<0000000043605459>] __kmalloc_cache_noprof+0x26c/0x2f4[<000000000ff63fd4>] vcap_rule_add_key+0x2cc/0x528[<00000000991e3564>] vcap_val_rule+0xcf0/0x13e8[<00000000fc9868e5>] vcap_api_encode_rule_test+0x678/0x16b0[<00000000b3595fc4>] kunit_try_run_case+0x13c/0x3ac[<0000000010f5d2bf>] kunit_generic_run_threadfn_adapter+0x80/0xec[<00000000c5d82c9a>] kthread+0x2e8/0x374[<00000000f4287308>] ret_from_fork+0x10/0x20unreferenced object 0xffffff80cc0b0980 (size 64):comm "kunit_try_catch", pid 1215, jiffies 4294898266hex dump (first 32 bytes):18 b7 58 ca 80 ff ff ff 00 09 0b cc 80 ff ff ff ..X.............67 00 00 00 00 00 00 00 01 01 74 88 c0 ff ff ff g.........t.....backtrace (crc 275fd9be):[<0000000052a0be73>] kmemleak_alloc+0x34/0x40[<0000000043605459>] __kmalloc_cache_noprof+0x26c/0x2f4[<000000000ff63fd4>] vcap_rule_add_key+0x2cc/0x528[<000000001396a1a2>] test_add_de---truncated--- |
Moderate | kernel:5.10, kernel:4.19, kernel:6.6 | 否 | 完成修复 | 2025-08-20 | 2026-01-30 |
| CVE-2024-50071 | In the Linux kernel, the following vulnerability has been resolved:pinctrl: nuvoton: fix a double free in ma35_pinctrl_dt_node_to_map_func()'new_map' is allocated using devm_* which takes care of freeing theallocated data on device removal, call to.dt_free_map = pinconf_generic_dt_free_mapdouble frees the map as pinconf_generic_dt_free_map() callspinctrl_utils_free_map().Fix this by using kcalloc() instead of auto-managed devm_kcalloc(). |
Moderate | kernel:5.10, kernel:4.19, kernel:6.6 | 否 | 完成修复 | 2025-08-20 | 2026-01-30 |
| CVE-2024-50068 | In the Linux kernel, the following vulnerability has been resolved:mm/damon/tests/sysfs-kunit.h: fix memory leak in damon_sysfs_test_add_targets()The sysfs_target->regions allocated in damon_sysfs_regions_alloc() is notfreed in damon_sysfs_test_add_targets(), which cause the following memoryleak, free it to fix it.unreferenced object 0xffffff80c2a8db80 (size 96):comm "kunit_try_catch", pid 187, jiffies 4294894363hex dump (first 32 bytes):00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................backtrace (crc 0):[<0000000001e3714d>] kmemleak_alloc+0x34/0x40[<000000008e6835c1>] __kmalloc_cache_noprof+0x26c/0x2f4[<000000001286d9f8>] damon_sysfs_test_add_targets+0x1cc/0x738[<0000000032ef8f77>] kunit_try_run_case+0x13c/0x3ac[<00000000f3edea23>] kunit_generic_run_threadfn_adapter+0x80/0xec[<00000000adf936cf>] kthread+0x2e8/0x374[<0000000041bb1628>] ret_from_fork+0x10/0x20 |
Moderate | kernel:5.10, kernel:4.19, kernel:6.6 | 否 | 完成修复 | 2025-08-20 | 2026-01-30 |
| CVE-2024-49990 | In the Linux kernel, the following vulnerability has been resolved:drm/xe/hdcp: Check GSC structure validitySometimes xe_gsc is not initialized when checked at HDCP capabilitycheck. Add gsc structure check to avoid null pointer error. |
Moderate | kernel:5.10, kernel:4.19, kernel:6.6 | 否 | 完成修复 | 2025-08-20 | 2026-01-30 |
| CVE-2024-49986 | In the Linux kernel, the following vulnerability has been resolved:platform/x86: x86-android-tablets: Fix use after free on platform_device_register() errorsx86_android_tablet_remove() frees the pdevs[] array, so it should notbe used after calling x86_android_tablet_remove().When platform_device_register() fails, store the pdevs[x] PTR_ERR() valueinto the local ret variable before calling x86_android_tablet_remove()to avoid using pdevs[] after it has been freed. |
Moderate | kernel:5.10, kernel:4.19, kernel:6.6 | 否 | 完成修复 | 2025-08-20 | 2026-01-31 |
| CVE-2024-49984 | In the Linux kernel, the following vulnerability has been resolved:drm/v3d: Prevent out of bounds access in performance query extensionsCheck that the number of perfmons userspace is passing in the copy andreset extensions is not greater than the internal kernel storage wherethe ids will be copied into. |
Moderate | kernel:5.10, kernel:4.19, kernel:6.6 | 否 | 完成修复 | 2025-08-20 | 2026-01-30 |
| CVE-2024-49979 | In the Linux kernel, the following vulnerability has been resolved:net: gso: fix tcp fraglist segmentation after pull from frag_listDetect tcp gso fraglist skbs with corrupted geometry (see below) andpass these to skb_segment instead of skb_segment_list, as the firstcan segment them correctly.Valid SKB_GSO_FRAGLIST skbs- consist of two or more segments- the head_skb holds the protocol headers plus first gso_size- one or more frag_list skbs hold exactly one segment- all but the last must be gso_sizeOptional datapath hooks such as NAT and BPF (bpf_skb_pull_data) canmodify these skbs, breaking these invariants.In extreme cases they pull all data into skb linear. For TCP, thiscauses a NULL ptr deref in __tcpv4_gso_segment_list_csum attcp_hdr(seg->next).Detect invalid geometry due to pull, by checking head_skb size.Don't just drop, as this may blackhole a destination. Convert to beable to pass to regular skb_segment.Approach and description based on a patch by Willem de Bruijn. |
Moderate | kernel:5.10, kernel:4.19, kernel:6.6 | 否 | 完成修复 | 2025-08-20 | 2026-01-30 |
| CVE-2024-49972 | In the Linux kernel, the following vulnerability has been resolved:drm/amd/display: Deallocate DML memory if allocation fails[Why]When DC state create DML memory allocation fails, memory is notdeallocated subsequently, resulting in uninitialized structurethat is not NULL.[How]Deallocate memory if DML memory allocation fails. |
Moderate | kernel:5.10, kernel:4.19, kernel:6.6 | 否 | 完成修复 | 2025-08-20 | 2026-01-30 |
| CVE-2024-49964 | In the Linux kernel, the following vulnerability has been resolved:mm/hugetlb: fix memfd_pin_folios free_huge_pages leakmemfd_pin_folios followed by unpin_folios fails to restore free_huge_pagesif the pages were not already faulted in, because the folio refcount forpages created by memfd_alloc_folio never goes to 0. memfd_pin_foliosneeds another folio_put to undo the folio_try_get below:memfd_alloc_folio()alloc_hugetlb_folio_nodemask()dequeue_hugetlb_folio_nodemask()dequeue_hugetlb_folio_node_exact()folio_ref_unfreeze(folio, 1); ; adds 1 refcountfolio_try_get() ; adds 1 refcounthugetlb_add_to_page_cache() ; adds 512 refcount (on x86)With the fix, after memfd_pin_folios + unpin_folios, the refcount for the(unfaulted) page is 512, which is correct, as the refcount for a faultedunpinned page is 513. |
Moderate | kernel:5.10, kernel:4.19, kernel:6.6 | 否 | 完成修复 | 2025-08-20 | 2026-01-30 |
| CVE-2024-49947 | In the Linux kernel, the following vulnerability has been resolved:net: test for not too small csum_start in virtio_net_hdr_to_skb()syzbot was able to trigger this warning [1], after injecting amalicious packet through af_packet, setting skb->csum_start and thusthe transport header to an incorrect value.We can at least make sure the transport header is afterthe end of the network header (with a estimated minimal size).[1][ 67.873027] skb len=4096 headroom=16 headlen=14 tailroom=0mac=(-1,-1) mac_len=0 net=(16,-6) trans=10shinfo(txflags=0 nr_frags=1 gso(size=0 type=0 segs=0))csum(0xa start=10 offset=0 ip_summed=3 complete_sw=0 valid=0 level=0)hash(0x0 sw=0 l4=0) proto=0x0800 pkttype=0 iif=0priority=0x0 mark=0x0 alloc_cpu=10 vlan_all=0x0encapsulation=0 inner(proto=0x0000, mac=0, net=0, trans=0)[ 67.877172] dev name=veth0_vlan feat=0x000061164fdd09e9[ 67.877764] sk family=17 type=3 proto=0[ 67.878279] skb linear: 00000000: 00 00 10 00 00 00 00 00 0f 00 00 00 08 00[ 67.879128] skb frag: 00000000: 0e 00 07 00 00 00 28 00 08 80 1c 00 04 00 00 02[ 67.879877] skb frag: 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00[ 67.880647] skb frag: 00000020: 00 00 02 00 00 00 08 00 1b 00 00 00 00 00 00 00[ 67.881156] skb frag: 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00[ 67.881753] skb frag: 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00[ 67.882173] skb frag: 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00[ 67.882790] skb frag: 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00[ 67.883171] skb frag: 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00[ 67.883733] skb frag: 00000080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00[ 67.884206] skb frag: 00000090: 00 00 00 00 00 00 00 00 00 00 69 70 76 6c 61 6e[ 67.884704] skb frag: 000000a0: 31 00 00 00 00 00 00 00 00 00 2b 00 00 00 00 00[ 67.885139] skb frag: 000000b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00[ 67.885677] skb frag: 000000c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00[ 67.886042] skb frag: 000000d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00[ 67.886408] skb frag: 000000e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00[ 67.887020] skb frag: 000000f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00[ 67.887384] skb frag: 00000100: 00 00[ 67.887878] ------------[ cut here ]------------[ 67.887908] offset (-6) >= skb_headlen() (14)[ 67.888445] WARNING: CPU: 10 PID: 2088 at net/core/dev.c:3332 skb_checksum_help (net/core/dev.c:3332 (discriminator 2))[ 67.889353] Modules linked in: macsec macvtap macvlan hsr wireguard curve25519_x86_64 libcurve25519_generic libchacha20poly1305 chacha_x86_64 libchacha poly1305_x86_64 dummy bridge sr_mod cdrom evdev pcspkr i2c_piix4 9pnet_virtio 9p 9pnet netfs[ 67.890111] CPU: 10 UID: 0 PID: 2088 Comm: b363492833 Not tainted 6.11.0-virtme #1011[ 67.890183] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-debian-1.16.3-2 04/01/2014[ 67.890309] RIP: 0010:skb_checksum_help (net/core/dev.c:3332 (discriminator 2))[ 67.891043] Call Trace:[ 67.891173] |
Moderate | kernel:5.10, kernel:4.19, kernel:6.6 | 否 | 完成修复 | 2025-08-20 | 2026-01-30 |
| CVE-2024-49943 | In the Linux kernel, the following vulnerability has been resolved:drm/xe/guc_submit: add missing locking in wedged_finiAny non-wedged queue can have a zero refcount here and can be runningconcurrently with an async queue destroy, therefore dereferencing thequeue ptr to check wedge status after the lookup can trigger UAF ifqueue is not wedged. Fix this by keeping the submission_state lock heldaround the check to postpone the free and make the check safe, beforedropping again around the put() to avoid the deadlock.(cherry picked from commit d28af0b6b9580b9f90c265a7da0315b0ad20bbfd) |
Moderate | kernel:5.10, kernel:4.19, kernel:6.6 | 否 | 完成修复 | 2025-08-20 | 2026-01-30 |
| CVE-2024-49941 | In the Linux kernel, the following vulnerability has been resolved:gpiolib: Fix potential NULL pointer dereference in gpiod_get_label()In `gpiod_get_label()`, it is possible that `srcu_dereference_check()` mayreturn a NULL pointer, leading to a scenario where `label->str` is accessedwithout verifying if `label` itself is NULL.This patch adds a proper NULL check for `label` before accessing`label->str`. The check for `label->str != NULL` is removed because`label->str` can never be NULL if `label` is not NULL.This fixes the issue where the label name was being printed as `(efault)`when dumping the sysfs GPIO file when `label == NULL`. |
Moderate | kernel:5.10, kernel:4.19, kernel:6.6 | 否 | 完成修复 | 2025-08-20 | 2026-01-30 |
| CVE-2024-49887 | In the Linux kernel, the following vulnerability has been resolved:f2fs: fix to don't panic system for no free segment fault injectionf2fs: fix to don't panic system for no free segment fault injectionsyzbot reports a f2fs bug as below:F2FS-fs (loop0): inject no free segment in get_new_segment of __allocate_new_segment+0x1ce/0x940 fs/f2fs/segment.c:3167F2FS-fs (loop0): Stopped filesystem due to reason: 7------------[ cut here ]------------kernel BUG at fs/f2fs/segment.c:2748!CPU: 0 UID: 0 PID: 5109 Comm: syz-executor304 Not tainted 6.11.0-rc6-syzkaller-00363-g89f5e14d05b4 #0RIP: 0010:get_new_segment fs/f2fs/segment.c:2748 [inline]RIP: 0010:new_curseg+0x1f61/0x1f70 fs/f2fs/segment.c:2836Call Trace:__allocate_new_segment+0x1ce/0x940 fs/f2fs/segment.c:3167f2fs_allocate_new_section fs/f2fs/segment.c:3181 [inline]f2fs_allocate_pinning_section+0xfa/0x4e0 fs/f2fs/segment.c:3195f2fs_expand_inode_data+0x5d6/0xbb0 fs/f2fs/file.c:1799f2fs_fallocate+0x448/0x960 fs/f2fs/file.c:1903vfs_fallocate+0x553/0x6c0 fs/open.c:334do_vfs_ioctl+0x2592/0x2e50 fs/ioctl.c:886__do_sys_ioctl fs/ioctl.c:905 [inline]__se_sys_ioctl+0x81/0x170 fs/ioctl.c:893do_syscall_x64 arch/x86/entry/common.c:52 [inline]do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83entry_SYSCALL_64_after_hwframe+0x77/0x7fRIP: 0010:get_new_segment fs/f2fs/segment.c:2748 [inline]RIP: 0010:new_curseg+0x1f61/0x1f70 fs/f2fs/segment.c:2836The root cause is when we inject no free segment fault into f2fs,we should not panic system, fix it. |
Moderate | kernel:5.10, kernel:4.19, kernel:6.6 | 否 | 完成修复 | 2025-08-20 | 2026-02-02 |
| CVE-2024-49876 | In the Linux kernel, the following vulnerability has been resolved:drm/xe: fix UAF around queue destructionWe currently do stuff like queuing the final destruction step on arandom system wq, which will outlive the driver instance. With badtiming we can teardown the driver with one or more work workqueue stillbeing alive leading to various UAF splats. Add a fini step to ensureuser queues are properly torn down. At this point GuC should already benuked so queue itself should no longer be referenced from hw pov.v2 (Matt B)- Looks much safer to use a waitqueue and then just wait for thexa_array to become empty before triggering the drain.(cherry picked from commit 861108666cc0e999cffeab6aff17b662e68774e3) |
Moderate | kernel:5.10, kernel:4.19, kernel:6.6 | 否 | 完成修复 | 2025-08-20 | 2026-02-02 |
| CVE-2024-49872 | In the Linux kernel, the following vulnerability has been resolved:mm/gup: fix memfd_pin_folios alloc race panicIf memfd_pin_folios tries to create a hugetlb page, but someone elsealready did, then folio gets the value -EEXIST here:folio = memfd_alloc_folio(memfd, start_idx);if (IS_ERR(folio)) {ret = PTR_ERR(folio);if (ret != -EEXIST)goto err;then on the next trip through the "while start_idx" loop we panic here:if (folio) {folio_put(folio);To fix, set the folio to NULL on error. |
Moderate | kernel:5.10, kernel:4.19, kernel:6.6 | 否 | 完成修复 | 2025-08-20 | 2026-02-02 |
| CVE-2024-49869 | In the Linux kernel, the following vulnerability has been resolved:btrfs: send: fix buffer overflow detection when copying path to cache entryStarting with commit c0247d289e73 ("btrfs: send: annotate structname_cache_entry with __counted_by()") we annotated the variable lengtharray "name" from the name_cache_entry structure with __counted_by() toimprove overflow detection. However that alone was not correct, becausethe length of that array does not match the "name_len" field - it matchesthat plus 1 to include the NUL string terminator, so that makes afortified kernel think there's an overflow and report a splat like this:strcpy: detected buffer overflow: 20 byte write of buffer size 19WARNING: CPU: 3 PID: 3310 at __fortify_report+0x45/0x50CPU: 3 UID: 0 PID: 3310 Comm: btrfs Not tainted 6.11.0-prnet #1Hardware name: CompuLab Ltd. sbc-ihsw/Intense-PC2 (IPC2), BIOS IPC2_3.330.7 X64 03/15/2018RIP: 0010:__fortify_report+0x45/0x50Code: 48 8b 34 (...)RSP: 0018:ffff97ebc0d6f650 EFLAGS: 00010246RAX: 7749924ef60fa600 RBX: ffff8bf5446a521a RCX: 0000000000000027RDX: 00000000ffffdfff RSI: ffff97ebc0d6f548 RDI: ffff8bf84e7a1cc8RBP: ffff8bf548574080 R08: ffffffffa8c40e10 R09: 0000000000005ffdR10: 0000000000000004 R11: ffffffffa8c70e10 R12: ffff8bf551eef400R13: 0000000000000000 R14: 0000000000000013 R15: 00000000000003a8FS: 00007fae144de8c0(0000) GS:ffff8bf84e780000(0000) knlGS:0000000000000000CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033CR2: 00007fae14691690 CR3: 00000001027a2003 CR4: 00000000001706f0Call Trace: |
Moderate | kernel:5.10, kernel:4.19, kernel:6.6 | 否 | 完成修复 | 2025-08-20 | 2026-02-02 |
| CVE-2024-49857 | Moderate | kernel:5.10, kernel:4.19, kernel:6.6 | 是 | 完成修复 | 2025-08-20 | 2026-01-23 | |
| CVE-2024-47756 | Moderate | kernel:5.10, kernel:4.19, kernel:6.6 | 否 | 完成修复 | 2025-08-20 | 2026-02-02 | |
| CVE-2024-47746 | Moderate | kernel:5.10, kernel:4.19, kernel:6.6 | 否 | 完成修复 | 2025-08-20 | 2026-02-02 | |
| CVE-2024-47733 | Moderate | kernel:5.10, kernel:4.19, kernel:6.6 | 否 | 完成修复 | 2025-08-20 | 2026-02-02 | |
| CVE-2024-47732 | Moderate | kernel:5.10, kernel:4.19, kernel:6.6 | 否 | 完成修复 | 2025-08-20 | 2026-02-02 | |
| CVE-2024-47724 | In the Linux kernel, the following vulnerability has been resolved:wifi: ath11k: use work queue to process beacon tx eventCommit 3a415daa3e8b ("wifi: ath11k: add P2P IE in beacon template")from Feb 28, 2024 (linux-next), leads to the following Smatch staticchecker warning:drivers/net/wireless/ath/ath11k/wmi.c:1742 ath11k_wmi_p2p_go_bcn_ie()warn: sleeping in atomic contextThe reason is that ath11k_bcn_tx_status_event() will directly call mightsleep function ath11k_wmi_cmd_send() during RCU read-side criticalsections. The call trace is like:ath11k_bcn_tx_status_event()-> rcu_read_lock()-> ath11k_mac_bcn_tx_event()-> ath11k_mac_setup_bcn_tmpl()â¦â¦-> ath11k_wmi_bcn_tmpl()-> ath11k_wmi_cmd_send()-> rcu_read_unlock()Commit 886433a98425 ("ath11k: add support for BSS color change") added theath11k_mac_bcn_tx_event(), commit 01e782c89108 ("ath11k: fix warningof RCU usage for ath11k_mac_get_arvif_by_vdev_id()") added the RCU lockto avoid warning but also introduced this BUG.Use work queue to avoid directly calling ath11k_mac_bcn_tx_event()during RCU critical sections. No need to worry about the deletion of vifbecause cancel_work_sync() will drop the work if it doesn't start orblock vif deletion until the running work is done.Tested-on: WCN6855 hw2.0 PCI WLAN.HSP.1.1-03125-QCAHSPSWPL_V1_V2_SILICONZ_LITE-3.6510.30 |
Moderate | kernel:5.10, kernel:4.19, kernel:6.6 | 否 | 完成修复 | 2025-08-20 | 2026-02-02 |
| CVE-2024-47721 | In the Linux kernel, the following vulnerability has been resolved:wifi: rtw89: remove unused C2H event ID RTW89_MAC_C2H_FUNC_READ_WOW_CAM to prevent out-of-bounds readingThe handler of firmware C2H event RTW89_MAC_C2H_FUNC_READ_WOW_CAM isn'timplemented, but driver expects number of handlers isNUM_OF_RTW89_MAC_C2H_FUNC_WOW causing out-of-bounds access. Fix it byremoving ID.Addresses-Coverity-ID: 1598775 ("Out-of-bounds read") |
Moderate | kernel:5.10, kernel:4.19, kernel:6.6 | 否 | 完成修复 | 2025-08-20 | 2026-02-02 |
| CVE-2024-47717 | In the Linux kernel, the following vulnerability has been resolved:RISC-V: KVM: Don't zero-out PMU snapshot area before freeing dataWith the latest Linux-6.11-rc3, the below NULL pointer crash is observedwhen SBI PMU snapshot is enabled for the guest and the guest is forcefullypowered-off.Unable to handle kernel NULL pointer dereference at virtual address 0000000000000508Oops [#1]Modules linked in: kvmCPU: 0 UID: 0 PID: 61 Comm: term-poll Not tainted 6.11.0-rc3-00018-g44d7178dd77a #3Hardware name: riscv-virtio,qemu (DT)epc : __kvm_write_guest_page+0x94/0xa6 [kvm]ra : __kvm_write_guest_page+0x54/0xa6 [kvm]epc : ffffffff01590e98 ra : ffffffff01590e58 sp : ffff8f80001f39b0gp : ffffffff81512a60 tp : ffffaf80024872c0 t0 : ffffaf800247e000t1 : 00000000000007e0 t2 : 0000000000000000 s0 : ffff8f80001f39f0s1 : 00007fff89ac4000 a0 : ffffffff015dd7e8 a1 : 0000000000000086a2 : 0000000000000000 a3 : ffffaf8000000000 a4 : ffffaf80024882c0a5 : 0000000000000000 a6 : ffffaf800328d780 a7 : 00000000000001ccs2 : ffffaf800197bd00 s3 : 00000000000828c4 s4 : ffffaf800248c000s5 : ffffaf800247d000 s6 : 0000000000001000 s7 : 0000000000001000s8 : 0000000000000000 s9 : 00007fff861fd500 s10: 0000000000000001s11: 0000000000800000 t3 : 00000000000004d3 t4 : 00000000000004d3t5 : ffffffff814126e0 t6 : ffffffff81412700status: 0000000200000120 badaddr: 0000000000000508 cause: 000000000000000d[ |
Moderate | kernel:5.10, kernel:4.19, kernel:6.6 | 否 | 完成修复 | 2025-08-20 | 2025-12-08 |
| CVE-2024-47711 | In the Linux kernel, the following vulnerability has been resolved:af_unix: Don't return OOB skb in manage_oob().syzbot reported use-after-free in unix_stream_recv_urg(). [0]The scenario is1. send(MSG_OOB)2. recv(MSG_OOB)-> The consumed OOB remains in recv queue3. send(MSG_OOB)4. recv()-> manage_oob() returns the next skb of the consumed OOB-> This is also OOB, but unix_sk(sk)->oob_skb is not cleared5. recv(MSG_OOB)-> unix_sk(sk)->oob_skb is used but already freedThe recent commit 8594d9b85c07 ("af_unix: Don't call skb_get() for OOBskb.") uncovered the issue.If the OOB skb is consumed and the next skb is peeked in manage_oob(),we still need to check if the skb is OOB.Let's do so by falling back to the following checks in manage_oob()and add the test case in selftest.Note that we need to add a similar check for SIOCATMARK.[0]:BUG: KASAN: slab-use-after-free in unix_stream_read_actor+0xa6/0xb0 net/unix/af_unix.c:2959Read of size 4 at addr ffff8880326abcc4 by task syz-executor178/5235CPU: 0 UID: 0 PID: 5235 Comm: syz-executor178 Not tainted 6.11.0-rc5-syzkaller-00742-gfbdaffe41adc #0Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024Call Trace: |
Moderate | kernel:5.10, kernel:4.19, kernel:6.6 | 否 | 完成修复 | 2025-08-20 | 2026-02-01 |
| CVE-2024-47708 | In the Linux kernel, the following vulnerability has been resolved:netkit: Assign missing bpf_net_contextDuring the introduction of struct bpf_net_context handling forXDP-redirect, the netkit driver has been missed, which also requires itbecause NETKIT_REDIRECT invokes skb_do_redirect() which is accessing theper-CPU variables. Otherwise we see the following crash:BUG: kernel NULL pointer dereference, address: 0000000000000038bpf_redirect()netkit_xmit()dev_hard_start_xmit()Set the bpf_net_context before invoking netkit_xmit() program within thenetkit driver. |
Moderate | kernel:5.10, kernel:4.19, kernel:6.6 | 否 | 完成修复 | 2025-08-20 | 2026-02-01 |
| CVE-2024-47696 | In the Linux kernel, the following vulnerability has been resolved:RDMA/iwcm: Fix WARNING:at_kernel/workqueue.c:#check_flush_dependencyIn the commit aee2424246f9 ("RDMA/iwcm: Fix a use-after-free related todestroying CM IDs"), the function flush_workqueue is invoked to flush thework queue iwcm_wq.But at that time, the work queue iwcm_wq was created via the functionalloc_ordered_workqueue without the flag WQ_MEM_RECLAIM.Because the current process is trying to flush the whole iwcm_wq, ifiwcm_wq doesn't have the flag WQ_MEM_RECLAIM, verify that the currentprocess is not reclaiming memory or running on a workqueue which doesn'thave the flag WQ_MEM_RECLAIM as that can break forward-progress guaranteeleading to a deadlock.The call trace is as below:[ 125.350876][ T1430] Call Trace:[ 125.356281][ T1430] |
Moderate | kernel:5.10, kernel:4.19, kernel:6.6 | 否 | 完成修复 | 2025-08-20 | 2026-02-01 |
| CVE-2024-47694 | In the Linux kernel, the following vulnerability has been resolved:IB/mlx5: Fix UMR pd cleanup on error flow of driver initThe cited commit moves the pd allocation from functionmlx5r_umr_resource_cleanup() to a new function mlx5r_umr_cleanup().So the fix in commit [1] is broken. In error flow, will hit panic [2].Fix it by checking pd pointer to avoid panic if it is NULL;[1] RDMA/mlx5: Fix UMR cleanup on error flow of driver init[2][ 347.567063] infiniband mlx5_0: Couldn't register device with driver model[ 347.591382] BUG: kernel NULL pointer dereference, address: 0000000000000020[ 347.593438] #PF: supervisor read access in kernel mode[ 347.595176] #PF: error_code(0x0000) - not-present page[ 347.596962] PGD 0 P4D 0[ 347.601361] RIP: 0010:ib_dealloc_pd_user+0x12/0xc0 [ib_core][ 347.604171] RSP: 0018:ffff888106293b10 EFLAGS: 00010282[ 347.604834] RAX: 0000000000000000 RBX: 000000000000000e RCX: 0000000000000000[ 347.605672] RDX: ffff888106293ad0 RSI: 0000000000000000 RDI: 0000000000000000[ 347.606529] RBP: 0000000000000000 R08: ffff888106293ae0 R09: ffff888106293ae0[ 347.607379] R10: 0000000000000a06 R11: 0000000000000000 R12: 0000000000000000[ 347.608224] R13: ffffffffa0704dc0 R14: 0000000000000001 R15: 0000000000000001[ 347.609067] FS: 00007fdc720cd9c0(0000) GS:ffff88852c880000(0000) knlGS:0000000000000000[ 347.610094] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033[ 347.610727] CR2: 0000000000000020 CR3: 0000000103012003 CR4: 0000000000370eb0[ 347.611421] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000[ 347.612113] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400[ 347.612804] Call Trace:[ 347.613130] |
Low | kernel:5.10, kernel:4.19, kernel:6.6 | 否 | 完成修复 | 2025-08-20 | 2026-01-24 |
| CVE-2024-47688 | In the Linux kernel, the following vulnerability has been resolved:driver core: Fix a potential null-ptr-deref in module_add_driver()Inject fault while probing of-fpga-region, if kasprintf() fails inmodule_add_driver(), the second sysfs_remove_link() in exit path will causenull-ptr-deref as below because kernfs_name_hash() will call strlen() withNULL driver_name.Fix it by releasing resources based on the exit path sequence.KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007]Mem abort info:ESR = 0x0000000096000005EC = 0x25: DABT (current EL), IL = 32 bitsSET = 0, FnV = 0EA = 0, S1PTW = 0FSC = 0x05: level 1 translation faultData abort info:ISV = 0, ISS = 0x00000005, ISS2 = 0x00000000CM = 0, WnR = 0, TnD = 0, TagAccess = 0GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0[dfffffc000000000] address between user and kernel address rangesInternal error: Oops: 0000000096000005 [#1] PREEMPT SMPDumping ftrace buffer:(ftrace buffer empty)Modules linked in: of_fpga_region(+) fpga_region fpga_bridge cfg80211 rfkill 8021q garp mrp stp llc ipv6 [last unloaded: of_fpga_region]CPU: 2 UID: 0 PID: 2036 Comm: modprobe Not tainted 6.11.0-rc2-g6a0e38264012 #295Hardware name: linux,dummy-virt (DT)pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)pc : strlen+0x24/0xb0lr : kernfs_name_hash+0x1c/0xc4sp : ffffffc081f97380x29: ffffffc081f97380 x28: ffffffc081f97b90 x27: ffffff80c821c2a0x26: ffffffedac0be418 x25: 0000000000000000 x24: ffffff80c09d2000x23: 0000000000000000 x22: 0000000000000000 x21: 0000000000000000x20: 0000000000000000 x19: 0000000000000000 x18: 0000000000001840x17: 0000000000000000 x16: 0000000000000000 x15: 1ffffff8103f2e42x14: 00000000f1f1f1f1 x13: 0000000000000004 x12: ffffffb01812d61dx11: 1ffffff01812d61c x10: ffffffb01812d61c x9 : dfffffc000000000x8 : 0000004fe7ed29e4 x7 : ffffff80c096b0e7 x6 : 0000000000000001x5 : ffffff80c096b0e0 x4 : 1ffffffdb990efa2 x3 : 0000000000000000x2 : 0000000000000000 x1 : dfffffc000000000 x0 : 0000000000000000Call trace:strlen+0x24/0xb0kernfs_name_hash+0x1c/0xc4kernfs_find_ns+0x118/0x2e8kernfs_remove_by_name_ns+0x80/0x100sysfs_remove_link+0x74/0xa8module_add_driver+0x278/0x394bus_add_driver+0x1f0/0x43cdriver_register+0xf4/0x3c0__platform_driver_register+0x60/0x88of_fpga_region_init+0x20/0x1000 [of_fpga_region]do_one_initcall+0x110/0x788do_init_module+0x1dc/0x5c8load_module+0x3c38/0x4cacinit_module_from_file+0xd4/0x128idempotent_init_module+0x2cc/0x528__arm64_sys_finit_module+0xac/0x100invoke_syscall+0x6c/0x258el0_svc_common.constprop.0+0x160/0x22cdo_el0_svc+0x44/0x5cel0_svc+0x48/0xb8el0t_64_sync_handler+0x13c/0x158el0t_64_sync+0x190/0x194Code: f2fbffe1 a90157f4 12000802 aa0003f5 (38e16861)---[ end trace 0000000000000000 ]---Kernel panic - not syncing: Oops: Fatal exception |
Moderate | kernel:5.10, kernel:4.19, kernel:6.6 | 否 | 完成修复 | 2025-08-20 | 2026-02-02 |
| CVE-2024-47680 | In the Linux kernel, the following vulnerability has been resolved:f2fs: check discard support for conventional zonesAs the helper function f2fs_bdev_support_discard() shows, f2fs checks ifthe target block devices support discard by callingbdev_max_discard_sectors() and bdev_is_zoned(). This check works wellfor most cases, but it does not work for conventional zones on zonedblock devices. F2fs assumes that zoned block devices support discard,and calls __submit_discard_cmd(). When __submit_discard_cmd() is calledfor sequential write required zones, it works fine since__submit_discard_cmd() issues zone reset commands instead of discardcommands. However, when __submit_discard_cmd() is called forconventional zones, __blkdev_issue_discard() is called even when thedevices do not support discard.The inappropriate __blkdev_issue_discard() call was not a problem beforethe commit 30f1e7241422 ("block: move discard checks into the ioctlhandler") because __blkdev_issue_discard() checked if the target devicessupport discard or not. If not, it returned EOPNOTSUPP. After thecommit, __blkdev_issue_discard() no longer checks it. It always returnszero and sets NULL to the given bio pointer. This NULL pointer triggersf2fs_bug_on() in __submit_discard_cmd(). The BUG is recreated with thecommands below at the umount step, where /dev/nullb0 is a zoned null_blkwith 5GB total size, 128MB zone size and 10 conventional zones.$ mkfs.f2fs -f -m /dev/nullb0$ mount /dev/nullb0 /mnt$ for ((i=0;i<5;i++)); do dd if=/dev/zero of=/mnt/test bs=65536 count=1600 conv=fsync; done$ umount /mntTo fix the BUG, avoid the inappropriate __blkdev_issue_discard() call.When discard is requested for conventional zones, check if the devicesupports discard or not. If not, return EOPNOTSUPP. |
Moderate | kernel:5.10, kernel:4.19, kernel:6.6 | 否 | 完成修复 | 2025-08-20 | 2026-02-02 |
| CVE-2024-47677 | In the Linux kernel, the following vulnerability has been resolved:exfat: resolve memory leak from exfat_create_upcase_table()If exfat_load_upcase_table reaches end and returns -EINVAL,allocated memory doesn't get freed and whileexfat_load_default_upcase_table allocates more memory, leading to amemory leak.Here's link to syzkaller crash report illustrating this issue:https://syzkaller.appspot.com/text?tag=CrashReport&x=1406c201980000 |
Low | kernel:5.10, kernel:4.19, kernel:6.6 | 否 | 完成修复 | 2025-08-20 | 2026-01-24 |
| CVE-2023-52927 | In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: allow exp not to be removed in nf_ct_find_expectation\n\nCurrently nf_conntrack_in() calling nf_ct_find_expectation() will\nremove the exp from the hash table. However, in some scenario, we\nexpect the exp not to be removed when the created ct will not be\nconfirmed, like in OVS and TC conntrack in the following patches.\n\nThis patch allows exp not to be removed by setting IPS_CONFIRMED\nin the status of the tmpl. |
Moderate | kernel:5.10, kernel:4.19, kernel:6.6 | 否 | 完成修复 | 2025-08-20 | 2026-02-02 |
| CVE-2022-49021 | In the Linux kernel, the following vulnerability has been resolved:net: phy: fix null-ptr-deref while probe() failedI got a null-ptr-deref report as following when doing fault injection test:BUG: kernel NULL pointer dereference, address: 0000000000000058Oops: 0000 [#1] PREEMPT SMP KASAN PTICPU: 1 PID: 253 Comm: 507-spi-dm9051 Tainted: G B N 6.1.0-rc3+Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.13.0-1ubuntu1.1 04/01/2014RIP: 0010:klist_put+0x2d/0xd0Call Trace: |
Moderate | kernel:5.10, kernel:4.19, kernel:6.6 | 否 | 完成修复 | 2025-08-20 | 2026-02-02 |
| CVE-2022-49018 | In the Linux kernel, the following vulnerability has been resolved:mptcp: fix sleep in atomic at close timeMatt reported a splat at msk close time:BUG: sleeping function called from invalid context at net/mptcp/protocol.c:2877in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 155, name: packetdrillpreempt_count: 201, expected: 0RCU nest depth: 0, expected: 04 locks held by packetdrill/155:#0: ffff888001536990 (&sb->s_type->i_mutex_key#6){+.+.}-{3:3}, at: __sock_release (net/socket.c:650)#1: ffff88800b498130 (sk_lock-AF_INET){+.+.}-{0:0}, at: mptcp_close (net/mptcp/protocol.c:2973)#2: ffff88800b49a130 (sk_lock-AF_INET/1){+.+.}-{0:0}, at: __mptcp_close_ssk (net/mptcp/protocol.c:2363)#3: ffff88800b49a0b0 (slock-AF_INET){+...}-{2:2}, at: __lock_sock_fast (include/net/sock.h:1820)Preemption disabled at:0x0CPU: 1 PID: 155 Comm: packetdrill Not tainted 6.1.0-rc5 #365Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014Call Trace: |
Moderate | kernel:5.10, kernel:4.19, kernel:6.6 | 否 | 完成修复 | 2025-08-20 | 2026-02-02 |
| CVE-2022-49016 | In the Linux kernel, the following vulnerability has been resolved:net: mdiobus: fix unbalanced node reference countI got the following report while doing device(mscc-miim) load testwith CONFIG_OF_UNITTEST and CONFIG_OF_DYNAMIC enabled:OF: ERROR: memory leak, expected refcount 1 instead of 2,of_node_get()/of_node_put() unbalanced - destroy cset entry:attach overlay node /spi/soc@0/mdio@7107009c/ethernet-phy@0If the 'fwnode' is not an acpi node, the refcount is get infwnode_mdiobus_phy_device_register(), but it has never beenput when the device is freed in the normal path. So callfwnode_handle_put() in phy_device_release() to avoid leak.If it's an acpi node, it has never been get, but it's putin the error path, so call fwnode_handle_get() beforephy_device_register() to keep get/put operation balanced. |
Moderate | kernel:5.10, kernel:4.19, kernel:6.6 | 否 | 完成修复 | 2025-08-20 | 2026-02-02 |
| CVE-2022-49012 | In the Linux kernel, the following vulnerability has been resolved:afs: Fix server->active leak in afs_put_serverThe atomic_read was accidentally replaced with atomic_inc_return,which prevents the server from getting cleaned up and causes rmmodto hang with a warning:Can't purge s=00000001 |
Moderate | kernel:5.10, kernel:4.19, kernel:6.6 | 否 | 完成修复 | 2025-08-20 | 2026-02-02 |
| CVE-2022-49008 | In the Linux kernel, the following vulnerability has been resolved:can: can327: can327_feed_frame_to_netdev(): fix potential skb leak when netdev is downIn can327_feed_frame_to_netdev(), it did not free the skb when netdevis down, and all callers of can327_feed_frame_to_netdev() did not freeallocated skb too. That would trigger skb leak.Fix it by adding kfree_skb() in can327_feed_frame_to_netdev() when netdevis down. Not tested, just compiled. |
Moderate | kernel:5.10, kernel:4.19, kernel:6.6 | 否 | 完成修复 | 2025-08-20 | 2026-02-02 |
| CVE-2022-48998 | In the Linux kernel, the following vulnerability has been resolved:powerpc/bpf/32: Fix Oops on tail call teststest_bpf tail call tests end up as:test_bpf: #0 Tail call leaf jited:1 85 PASStest_bpf: #1 Tail call 2 jited:1 111 PASStest_bpf: #2 Tail call 3 jited:1 145 PASStest_bpf: #3 Tail call 4 jited:1 170 PASStest_bpf: #4 Tail call load/store leaf jited:1 190 PASStest_bpf: #5 Tail call load/store jited:1BUG: Unable to handle kernel data access on write at 0xf1b4e000Faulting instruction address: 0xbe86b710Oops: Kernel access of bad area, sig: 11 [#1]BE PAGE_SIZE=4K MMU=Hash PowerMacModules linked in: test_bpf(+)CPU: 0 PID: 97 Comm: insmod Not tainted 6.1.0-rc4+ #195Hardware name: PowerMac3,1 750CL 0x87210 PowerMacNIP: be86b710 LR: be857e88 CTR: be86b704REGS: f1b4df20 TRAP: 0300 Not tainted (6.1.0-rc4+)MSR: 00009032 |
Moderate | kernel:5.10, kernel:4.19, kernel:6.6 | 否 | 完成修复 | 2025-08-20 | 2026-02-02 |
| CVE-2022-48996 | In the Linux kernel, the following vulnerability has been resolved:mm/damon/sysfs: fix wrong empty schemes assumption under online tuning in damon_sysfs_set_schemes()Commit da87878010e5 ("mm/damon/sysfs: support online inputs update") made'damon_sysfs_set_schemes()' to be called for running DAMON context, whichcould have schemes. In the case, DAMON sysfs interface is supposed toupdate, remove, or add schemes to reflect the sysfs files. However, thecode is assuming the DAMON context wouldn't have schemes at all, andtherefore creates and adds new schemes. As a result, the code doesn'twork as intended for online schemes tuning and could have more thanexpected memory footprint. The schemes are all in the DAMON context, soit doesn't leak the memory, though.Remove the wrong asssumption (the DAMON context wouldn't have schemes) in'damon_sysfs_set_schemes()' to fix the bug. |
Moderate | kernel:5.10, kernel:4.19, kernel:6.6 | 否 | 完成修复 | 2025-08-20 | 2026-02-02 |
| CVE-2022-48990 | In the Linux kernel, the following vulnerability has been resolved: |
Moderate | kernel:5.10, kernel:4.19, kernel:6.6 | 否 | 完成修复 | 2025-08-20 | 2026-02-02 |
| CVE-2022-48985 | In the Linux kernel, the following vulnerability has been resolved:net: mana: Fix race on per-CQ variable napi work_doneAfter calling napi_complete_done(), the NAPIF_STATE_SCHED bit may becleared, and another CPU can start napi thread and access per-CQ variable,cq->work_done. If the other thread (for example, from busy_poll) setsit to a value >= budget, this thread will continue to run when it shouldstop, and cause memory corruption and panic.To fix this issue, save the per-CQ work_done variable in a local variablebefore napi_complete_done(), so it won't be corrupted by a possibleconcurrent thread after napi_complete_done().Also, add a flag bit to advertise to the NIC firmware: the NAPI work_donevariable race is fixed, so the driver is able to reliably support featureslike busy_poll. |
Moderate | kernel:5.10, kernel:4.19, kernel:6.6 | 否 | 完成修复 | 2025-08-20 | 2026-02-02 |
| CVE-2022-48984 | In the Linux kernel, the following vulnerability has been resolved:can: slcan: fix freed work crashThe LTP test pty03 is causing a crash in slcan:BUG: kernel NULL pointer dereference, address: 0000000000000008#PF: supervisor read access in kernel mode#PF: error_code(0x0000) - not-present pagePGD 0 P4D 0Oops: 0000 [#1] PREEMPT SMP NOPTICPU: 0 PID: 348 Comm: kworker/0:3 Not tainted 6.0.8-1-default #1 openSUSE Tumbleweed 9d20364b934f5aab0a9bdf84e8f45cfdfae39dabHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.15.0-0-g2dd4b9b-rebuilt.opensuse.org 04/01/2014Workqueue: 0x0 (events)RIP: 0010:process_one_work (/home/rich/kernel/linux/kernel/workqueue.c:706 /home/rich/kernel/linux/kernel/workqueue.c:2185)Code: 49 89 ff 41 56 41 55 41 54 55 53 48 89 f3 48 83 ec 10 48 8b 06 48 8b 6f 48 49 89 c4 45 30 e4 a8 04 b8 00 00 00 00 4c 0f 44 e0 <49> 8b 44 24 08 44 8b a8 00 01 00 00 41 83 e5 20 f6 45 10 04 75 0eRSP: 0018:ffffaf7b40f47e98 EFLAGS: 00010046RAX: 0000000000000000 RBX: ffff9d644e1b8b48 RCX: ffff9d649e439968RDX: 00000000ffff8455 RSI: ffff9d644e1b8b48 RDI: ffff9d64764aa6c0RBP: ffff9d649e4335c0 R08: 0000000000000c00 R09: ffff9d64764aa734R10: 0000000000000007 R11: 0000000000000001 R12: 0000000000000000R13: ffff9d649e4335e8 R14: ffff9d64490da780 R15: ffff9d64764aa6c0FS: 0000000000000000(0000) GS:ffff9d649e400000(0000) knlGS:0000000000000000CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033CR2: 0000000000000008 CR3: 0000000036424000 CR4: 00000000000006f0Call Trace: |
Moderate | kernel:5.10, kernel:4.19, kernel:6.6 | 否 | 完成修复 | 2025-08-20 | 2026-02-02 |
| CVE-2022-48983 | In the Linux kernel, the following vulnerability has been resolved:io_uring: Fix a null-ptr-deref in io_tctx_exit_cb()Syzkaller reports a NULL deref bug as follows:BUG: KASAN: null-ptr-deref in io_tctx_exit_cb+0x53/0xd3Read of size 4 at addr 0000000000000138 by task file1/1955CPU: 1 PID: 1955 Comm: file1 Not tainted 6.1.0-rc7-00103-gef4d3ea40565 #75Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.11.0-2.el7 04/01/2014Call Trace: |
Moderate | kernel:5.10, kernel:4.19, kernel:6.6 | 否 | 完成修复 | 2025-08-20 | 2026-02-02 |
| CVE-2022-48980 | In the Linux kernel, the following vulnerability has been resolved:net: dsa: sja1105: avoid out of bounds access in sja1105_init_l2_policing()The SJA1105 family has 45 L2 policing table entries(SJA1105_MAX_L2_POLICING_COUNT) and SJA1110 has 110(SJA1110_MAX_L2_POLICING_COUNT). Keeping the table structure butaccounting for the difference in port count (5 in SJA1105 vs 10 inSJA1110) does not fully explain the difference. Rather, the SJA1110 alsohas L2 ingress policers for multicast traffic. If a packet is classifiedas multicast, it will be processed by the policer index 99 + SRCPORT.The sja1105_init_l2_policing() function initializes all L2 policers suchthat they don't interfere with normal packet reception by default. To havea common code between SJA1105 and SJA1110, the index of the multicastpolicer for the port is calculated because it's an index that is out ofbounds for SJA1105 but in bounds for SJA1110, and a bounds check isperformed.The code fails to do the proper thing when determining what to do with themulticast policer of port 0 on SJA1105 (ds->num_ports = 5). The "mcast"index will be equal to 45, which is also equal totable->ops->max_entry_count (SJA1105_MAX_L2_POLICING_COUNT). So it passesthrough the check. But at the same time, SJA1105 doesn't have multicastpolicers. So the code programs the SHARINDX field of an out-of-boundselement in the L2 Policing table of the static config.The comparison between index 45 and 45 entries should have determined thecode to not access this policer index on SJA1105, since its memory wasn'teven allocated.With enough bad luck, the out-of-bounds write could even overwrite othervalid kernel data, but in this case, the issue was detected using KASAN.Kernel log:sja1105 spi5.0: Probed switch chip: SJA1105Q==================================================================BUG: KASAN: slab-out-of-bounds in sja1105_setup+0x1cbc/0x2340Write of size 8 at addr ffffff880bd57708 by task kworker/u8:0/8...Workqueue: events_unbound deferred_probe_work_funcCall trace:...sja1105_setup+0x1cbc/0x2340dsa_register_switch+0x1284/0x18d0sja1105_probe+0x748/0x840...Allocated by task 8:...sja1105_setup+0x1bcc/0x2340dsa_register_switch+0x1284/0x18d0sja1105_probe+0x748/0x840... |
Moderate | kernel:5.10, kernel:4.19, kernel:6.6 | 否 | 完成修复 | 2025-08-20 | 2026-02-02 |
| CVE-2022-48979 | In the Linux kernel, the following vulnerability has been resolved:drm/amd/display: fix array index out of bound error in DCN32 DML[Why&How]LinkCapacitySupport array is indexed with the number of voltage states andnot the number of max DPPs. Fix the error by changing the arraydeclaration to use the correct (larger) array size of total number ofvoltage states. |
Moderate | kernel:5.10, kernel:4.19, kernel:6.6 | 否 | 完成修复 | 2025-08-20 | 2026-02-02 |
| CVE-2022-48976 | In the Linux kernel, the following vulnerability has been resolved: |
Moderate | kernel:5.10, kernel:4.19, kernel:6.6 | 否 | 完成修复 | 2025-08-20 | 2026-02-02 |
| CVE-2022-48974 | In the Linux kernel, the following vulnerability has been resolved:netfilter: conntrack: fix using __this_cpu_add in preemptibleCurrently in nf_conntrack_hash_check_insert(), when it fails innf_ct_ext_valid_pre/post(), NF_CT_STAT_INC() will be called in thepreemptible context, a call trace can be triggered:BUG: using __this_cpu_add() in preemptible [00000000] code: conntrack/1636caller is nf_conntrack_hash_check_insert+0x45/0x430 [nf_conntrack]Call Trace: |
Moderate | kernel:5.10, kernel:4.19, kernel:6.6 | 否 | 完成修复 | 2025-08-20 | 2026-02-02 |
| CVE-2022-48970 | In the Linux kernel, the following vulnerability has been resolved:af_unix: Get user_ns from in_skb in unix_diag_get_exact().Wei Chen reported a NULL deref in sk_user_ns() [0][1], and Paolo diagnosedthe root cause: in unix_diag_get_exact(), the newly allocated skb does nothave sk. [2]We must get the user_ns from the NETLINK_CB(in_skb).sk and pass it tosk_diag_fill().[0]:BUG: kernel NULL pointer dereference, address: 0000000000000270#PF: supervisor read access in kernel mode#PF: error_code(0x0000) - not-present pagePGD 12bbce067 P4D 12bbce067 PUD 12bc40067 PMD 0Oops: 0000 [#1] PREEMPT SMPCPU: 0 PID: 27942 Comm: syz-executor.0 Not tainted 6.1.0-rc5-next-20221118 #2Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOSrel-1.13.0-48-gd9c812dda519-prebuilt.qemu.org 04/01/2014RIP: 0010:sk_user_ns include/net/sock.h:920 [inline]RIP: 0010:sk_diag_dump_uid net/unix/diag.c:119 [inline]RIP: 0010:sk_diag_fill+0x77d/0x890 net/unix/diag.c:170Code: 89 ef e8 66 d4 2d fd c7 44 24 40 00 00 00 00 49 8d 7c 24 18 e854 d7 2d fd 49 8b 5c 24 18 48 8d bb 70 02 00 00 e8 43 d7 2d fd <48> 8b9b 70 02 00 00 48 8d 7b 10 e8 33 d7 2d fd 48 8b 5b 10 48 8dRSP: 0018:ffffc90000d67968 EFLAGS: 00010246RAX: ffff88812badaa48 RBX: 0000000000000000 RCX: ffffffff840d481dRDX: 0000000000000465 RSI: 0000000000000000 RDI: 0000000000000270RBP: ffffc90000d679a8 R08: 0000000000000277 R09: 0000000000000000R10: 0001ffffffffffff R11: 0001c90000d679a8 R12: ffff88812ac03800R13: ffff88812c87c400 R14: ffff88812ae42210 R15: ffff888103026940FS: 00007f08b4e6f700(0000) GS:ffff88813bc00000(0000) knlGS:0000000000000000CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033CR2: 0000000000000270 CR3: 000000012c58b000 CR4: 00000000003506f0DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400Call Trace: |
Moderate | kernel:5.10, kernel:4.19, kernel:6.6 | 否 | 完成修复 | 2025-08-20 | 2026-02-02 |
| CVE-2022-48968 | In the Linux kernel, the following vulnerability has been resolved:octeontx2-pf: Fix potential memory leak in otx2_init_tc()In otx2_init_tc(), if rhashtable_init() failed, it does not freetc->tc_entries_bitmap which is allocated in otx2_tc_alloc_ent_bitmap(). |
Moderate | kernel:5.10, kernel:4.19, kernel:6.6 | 否 | 完成修复 | 2025-08-20 | 2026-02-02 |
| CVE-2022-48965 | In the Linux kernel, the following vulnerability has been resolved:gpio/rockchip: fix refcount leak in rockchip_gpiolib_register()The node returned by of_get_parent() with refcount incremented,of_node_put() needs be called when finish using it. So add it in theend of of_pinctrl_get(). |
Moderate | kernel:5.10, kernel:4.19, kernel:6.6 | 否 | 完成修复 | 2025-08-20 | 2026-02-02 |
| CVE-2022-48963 | In the Linux kernel, the following vulnerability has been resolved: |
Moderate | kernel:5.10, kernel:4.19, kernel:6.6 | 否 | 完成修复 | 2025-08-20 | 2026-02-02 |
| CVE-2022-48957 | In the Linux kernel, the following vulnerability has been resolved:dpaa2-switch: Fix memory leak in dpaa2_switch_acl_entry_add() and dpaa2_switch_acl_entry_remove()The cmd_buff needs to be freed when error happened indpaa2_switch_acl_entry_add() and dpaa2_switch_acl_entry_remove(). |
Moderate | kernel:5.10, kernel:4.19, kernel:6.6 | 否 | 完成修复 | 2025-08-20 | 2026-02-02 |