|
382 | 382 | ], |
383 | 383 | "linux-libc-dev": [ |
384 | 384 | { |
385 | | - "description": "In the Linux kernel, the following vulnerability has been resolved: sunrpc: fix one UAF issue caused by sunrpc kernel tcp socket BUG: KASAN: slab-use-after-free in tcp_write_timer_handler+0x156/0x3e0 Read of size 1 at addr ffff888111f322cd by task swapper/0/0 CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Not tainted 6.12.0-rc4-dirty #7 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 Call Trace: <IRQ> dump_stack_lvl+0x68/0xa0 print_address_description.constprop.0+0x2c/0x3d0 print_report+0xb4/0x270 kasan_report+0xbd/0xf0 tcp_write_timer_handler+0x156/0x3e0 tcp_write_timer+0x66/0x170 call_timer_fn+0xfb/0x1d0 __run_timers+0x3f8/0x480 run_timer_softirq+0x9b/0x100 handle_softirqs+0x153/0x390 __irq_exit_rcu+0x103/0x120 irq_exit_rcu+0xe/0x20 sysvec_apic_timer_interrupt+0x76/0x90 </IRQ> <TASK> asm_sysvec_apic_timer_interrupt+0x1a/0x20 RIP: 0010:default_idle+0xf/0x20 Code: 4c 01 c7 4c 29 c2 e9 72 ff ff ff 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 66 90 0f 00 2d 33 f8 25 00 fb f4 <fa> c3 cc", |
386 | | - "vulnerability_id": "CVE-2024-53168", |
387 | | - "name": "CVE-2024-53168", |
388 | | - "package_name": "linux-libc-dev", |
389 | | - "package_details": { |
390 | | - "file_path": null, |
391 | | - "name": "linux-libc-dev", |
392 | | - "package_manager": "OS", |
393 | | - "version": "5.4.0", |
394 | | - "release": "216.236" |
395 | | - }, |
396 | | - "remediation": {"recommendation": {"text": "None Provided"}}, |
397 | | - "cvss_v3_score": 7.8, |
398 | | - "cvss_v30_score": 0.0, |
399 | | - "cvss_v31_score": 7.8, |
400 | | - "cvss_v2_score": 0.0, |
401 | | - "cvss_v3_severity": "HIGH", |
402 | | - "source_url": "https://people.canonical.com/~ubuntu-security/cve/2024/CVE-2024-53168.html", |
403 | | - "source": "UBUNTU_CVE", |
404 | | - "severity": "HIGH", |
405 | | - "status": "ACTIVE", |
406 | | - "title": "CVE-2024-53168 - linux-libc-dev", |
407 | | - "reason_to_ignore": "N/A" |
| 385 | + "description": "In the Linux kernel, the following vulnerability has been resolved: sunrpc: fix one UAF issue caused by sunrpc kernel tcp socket BUG: KASAN: slab-use-after-free in tcp_write_timer_handler+0x156/0x3e0 Read of size 1 at addr ffff888111f322cd by task swapper/0/0 CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Not tainted 6.12.0-rc4-dirty #7 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 Call Trace: <IRQ> dump_stack_lvl+0x68/0xa0 print_address_description.constprop.0+0x2c/0x3d0 print_report+0xb4/0x270 kasan_report+0xbd/0xf0 tcp_write_timer_handler+0x156/0x3e0 tcp_write_timer+0x66/0x170 call_timer_fn+0xfb/0x1d0 __run_timers+0x3f8/0x480 run_timer_softirq+0x9b/0x100 handle_softirqs+0x153/0x390 __irq_exit_rcu+0x103/0x120 irq_exit_rcu+0xe/0x20 sysvec_apic_timer_interrupt+0x76/0x90 </IRQ> <TASK> asm_sysvec_apic_timer_interrupt+0x1a/0x20 RIP: 0010:default_idle+0xf/0x20 Code: 4c 01 c7 4c 29 c2 e9 72 ff ff ff 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 ** 0f 1e ** 66 90 0f 00 2d 33 f8 25 00 fb f4 <fa> c3 cc", |
| 386 | + "vulnerability_id": "CVE-2024-53168", |
| 387 | + "name": "CVE-2024-53168", |
| 388 | + "package_name": "linux-libc-dev", |
| 389 | + "package_details": { |
| 390 | + "file_path": null, |
| 391 | + "name": "linux-libc-dev", |
| 392 | + "package_manager": "OS", |
| 393 | + "version": "5.4.0", |
| 394 | + "release": "216.236" |
| 395 | + }, |
| 396 | + "remediation": {"recommendation": {"text": "None Provided"}}, |
| 397 | + "cvss_v3_score": 7.8, |
| 398 | + "cvss_v30_score": 0.0, |
| 399 | + "cvss_v31_score": 7.8, |
| 400 | + "cvss_v2_score": 0.0, |
| 401 | + "cvss_v3_severity": "HIGH", |
| 402 | + "source_url": "https://people.canonical.com/~ubuntu-security/cve/2024/CVE-2024-53168.html", |
| 403 | + "source": "UBUNTU_CVE", |
| 404 | + "severity": "HIGH", |
| 405 | + "status": "ACTIVE", |
| 406 | + "title": "CVE-2024-53168 - linux-libc-dev", |
| 407 | + "reason_to_ignore": "N/A" |
408 | 408 | }, |
409 | 409 | { |
410 | 410 | "description": "In the Linux kernel, the following vulnerability has been resolved: tracing: Fix use-after-free in print_graph_function_flags during tracer switching Kairui reported a UAF issue in print_graph_function_flags() during ftrace stress testing [1]. This issue can be reproduced if puting a 'mdelay(10)' after 'mutex_unlock(&trace_types_lock)' in s_start(), and executing the following script: $ echo function_graph > current_tracer $ cat trace > /dev/null & $ sleep 5 # Ensure the 'cat' reaches the 'mdelay(10)' point $ echo timerlat > current_tracer The root cause lies in the two calls to print_graph_function_flags within print_trace_line during each s_show(): * One through 'iter->trace->print_line()'; * Another through 'event->funcs->trace()', which is hidden in print_trace_fmt() before print_trace_line returns. Tracer switching only updates the former, while the latter continues to use the print_line function of the old tracer, which in the script above is print_graph_function_flags. Moreover, when switching from the", |
|
432 | 432 | "reason_to_ignore": "N/A" |
433 | 433 | }, |
434 | 434 | { |
435 | | - "description": "In the Linux kernel, the following vulnerability has been resolved: Bluetooth: L2CAP: Fix uaf in l2cap_connect [Syzbot reported] BUG: KASAN: slab-use-after-free in l2cap_connect.constprop.0+0x10d8/0x1270 net/bluetooth/l2cap_core.c:3949 Read of size 8 at addr ffff8880241e9800 by task kworker/u9:0/54", |
436 | | - "vulnerability_id": "CVE-2024-49950", |
437 | | - "name": "CVE-2024-49950", |
438 | | - "package_name": "linux-libc-dev", |
439 | | - "package_details": { |
440 | | - "file_path": null, |
441 | | - "name": "linux-libc-dev", |
442 | | - "package_manager": "OS", |
443 | | - "version": "5.4.0", |
444 | | - "release": "216.236" |
445 | | - }, |
446 | | - "remediation": {"recommendation": {"text": "None Provided"}}, |
447 | | - "cvss_v3_score": 7.8, |
448 | | - "cvss_v30_score": 0.0, |
449 | | - "cvss_v31_score": 7.8, |
450 | | - "cvss_v2_score": 0.0, |
451 | | - "cvss_v3_severity": "HIGH", |
452 | | - "source_url": "https://people.canonical.com/~ubuntu-security/cve/2024/CVE-2024-49950.html", |
453 | | - "source": "UBUNTU_CVE", |
454 | | - "severity": "HIGH", |
455 | | - "status": "ACTIVE", |
456 | | - "title": "CVE-2024-49950 - linux-libc-dev", |
457 | | - "reason_to_ignore": "N/A" |
| 435 | + "description": "In the Linux kernel, the following vulnerability has been resolved: Bluetooth: L2CAP: Fix uaf in l2cap_connect [Syzbot reported] BUG: KASAN: slab-use-after-free in l2cap_connect.constprop.0+0x10d8/0x1270 net/bluetooth/l2cap_core.c:3949 Read of size 8 at addr ffff8880241e9800 by task kworker/u9:0/54", |
| 436 | + "vulnerability_id": "CVE-2024-49950", |
| 437 | + "name": "CVE-2024-49950", |
| 438 | + "package_name": "linux-libc-dev", |
| 439 | + "package_details": { |
| 440 | + "file_path": null, |
| 441 | + "name": "linux-libc-dev", |
| 442 | + "package_manager": "OS", |
| 443 | + "version": "5.4.0", |
| 444 | + "release": "216.236" |
| 445 | + }, |
| 446 | + "remediation": {"recommendation": {"text": "None Provided"}}, |
| 447 | + "cvss_v3_score": 7.8, |
| 448 | + "cvss_v30_score": 0.0, |
| 449 | + "cvss_v31_score": 7.8, |
| 450 | + "cvss_v2_score": 0.0, |
| 451 | + "cvss_v3_severity": "HIGH", |
| 452 | + "source_url": "https://people.canonical.com/~ubuntu-security/cve/2024/CVE-2024-49950.html", |
| 453 | + "source": "UBUNTU_CVE", |
| 454 | + "severity": "HIGH", |
| 455 | + "status": "ACTIVE", |
| 456 | + "title": "CVE-2024-49950 - linux-libc-dev", |
| 457 | + "reason_to_ignore": "N/A" |
458 | 458 | }, |
459 | 459 | { |
460 | 460 | "description": "In the Linux kernel, the following vulnerability has been resolved: iscsi_ibft: Fix UBSAN shift-out-of-bounds warning in ibft_attr_show_nic() When performing an iSCSI boot using IPv6, iscsistart still reads the /sys/firmware/ibft/ethernetX/subnet-mask entry. Since the IPv6 prefix length is 64, this causes the shift exponent to become negative, triggering a UBSAN warning. As the concept of a subnet mask does not apply to IPv6, the value is set to ~0 to suppress the warning message.", |
|
482 | 482 | "reason_to_ignore": "N/A" |
483 | 483 | }, |
484 | 484 | { |
485 | | - "description": "In the Linux kernel, the following vulnerability has been resolved: memstick: rtsx_usb_ms: Fix slab-use-after-free in rtsx_usb_ms_drv_remove This fixes the following crash: ================================================================== BUG: KASAN: slab-use-after-free in rtsx_usb_ms_poll_card+0x159/0x200 [rtsx_usb_ms] Read of size 8 at addr ffff888136335380 by task kworker/6:0/140241", |
486 | | - "vulnerability_id": "CVE-2025-22020", |
487 | | - "name": "CVE-2025-22020", |
488 | | - "package_name": "linux-libc-dev", |
489 | | - "package_details": { |
490 | | - "file_path": null, |
491 | | - "name": "linux-libc-dev", |
492 | | - "package_manager": "OS", |
493 | | - "version": "5.4.0", |
494 | | - "release": "216.236" |
495 | | - }, |
496 | | - "remediation": {"recommendation": {"text": "None Provided"}}, |
497 | | - "cvss_v3_score": 7.8, |
498 | | - "cvss_v30_score": 0.0, |
499 | | - "cvss_v31_score": 7.8, |
500 | | - "cvss_v2_score": 0.0, |
501 | | - "cvss_v3_severity": "HIGH", |
502 | | - "source_url": "https://people.canonical.com/~ubuntu-security/cve/2025/CVE-2025-22020.html", |
503 | | - "source": "UBUNTU_CVE", |
504 | | - "severity": "HIGH", |
505 | | - "status": "ACTIVE", |
506 | | - "title": "CVE-2025-22020 - linux-libc-dev", |
507 | | - "reason_to_ignore": "N/A" |
| 485 | + "description": "In the Linux kernel, the following vulnerability has been resolved: memstick: rtsx_usb_ms: Fix slab-use-after-free in rtsx_usb_ms_drv_remove This fixes the following crash: ================================================================== BUG: KASAN: slab-use-after-free in rtsx_usb_ms_poll_card+0x159/0x200 [rtsx_usb_ms] Read of size 8 at addr ffff888136335380 by task kworker/6:0/140241", |
| 486 | + "vulnerability_id": "CVE-2025-22020", |
| 487 | + "name": "CVE-2025-22020", |
| 488 | + "package_name": "linux-libc-dev", |
| 489 | + "package_details": { |
| 490 | + "file_path": null, |
| 491 | + "name": "linux-libc-dev", |
| 492 | + "package_manager": "OS", |
| 493 | + "version": "5.4.0", |
| 494 | + "release": "216.236" |
| 495 | + }, |
| 496 | + "remediation": {"recommendation": {"text": "None Provided"}}, |
| 497 | + "cvss_v3_score": 7.8, |
| 498 | + "cvss_v30_score": 0.0, |
| 499 | + "cvss_v31_score": 7.8, |
| 500 | + "cvss_v2_score": 0.0, |
| 501 | + "cvss_v3_severity": "HIGH", |
| 502 | + "source_url": "https://people.canonical.com/~ubuntu-security/cve/2025/CVE-2025-22020.html", |
| 503 | + "source": "UBUNTU_CVE", |
| 504 | + "severity": "HIGH", |
| 505 | + "status": "ACTIVE", |
| 506 | + "title": "CVE-2025-22020 - linux-libc-dev", |
| 507 | + "reason_to_ignore": "N/A" |
508 | 508 | }, |
509 | 509 | { |
510 | 510 | "description": "In the Linux kernel, the following vulnerability has been resolved: jfs: fix slab-out-of-bounds read in ea_get() During the \"size_check\" label in ea_get(), the code checks if the extended attribute list (xattr) size matches ea_size. If not, it logs \"ea_get: invalid extended attribute\" and calls print_hex_dump(). Here, EALIST_SIZE(ea_buf->xattr) returns 4110417968, which exceeds INT_MAX (2,147,483,647). Then ea_size is clamped: int size = clamp_t(int, ea_size, 0, EALIST_SIZE(ea_buf->xattr)); Although clamp_t aims to bound ea_size between 0 and 4110417968, the upper limit is treated as an int, causing an overflow above 2^31 - 1.", |
|
561 | 561 | "reason_to_ignore": "N/A" |
562 | 562 | }, |
563 | 563 | { |
| 564 | + |
564 | 565 | "description": "In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: fix usage slab after free [ +0.000021] BUG: KASAN: slab-use-after-free in drm_sched_entity_flush+0x6cb/0x7a0 [gpu_sched] [ +0.000027] Read of size 8 at addr ffff8881b8605f88 by task amd_pci_unplug/2147 [ +0.000023] CPU: 6 PID: 2147 Comm: amd_pci_unplug Not tainted 6.10.0+ #1 [ +0.000016] Hardware name: ASUS System Product Name/ROG STRIX B550-F GAMING (WI-FI), BIOS 1401 12/03/2020 [ +0.000016] Call Trace: [ +0.000008] <TASK> [ +0.000009] dump_stack_lvl+0x76/0xa0 [ +0.000017] print_report+0xce/0x5f0 [ +0.000017] ? drm_sched_entity_flush+0x6cb/0x7a0 [gpu_sched] [ +0.000019] ? srso_return_thunk+0x5/0x5f [ +0.000015] ? kasan_complete_mode_report_info+0x72/0x200 [ +0.000016] ? drm_sched_entity_flush+0x6cb/0x7a0 [gpu_sched] [ +0.000019] kasan_report+0xbe/0x110 [ +0.000015] ? drm_sched_entity_flush+0x6cb/0x7a0 [gpu_sched] [ +0.000023] __asan_report_load8_noabort+0x14/0x30 [ +0.000014] drm_sched_entity_flush+0x6cb/0x7a0 [gpu_sched] [ +0.00", |
565 | 566 | "vulnerability_id": "CVE-2024-56551", |
566 | 567 | "name": "CVE-2024-56551", |
|
0 commit comments