Skip to content

Commit c430b57

Browse files
Merge branch 'master' into fix-tf-cves
2 parents efc5973 + 3cff817 commit c430b57

File tree

2 files changed

+140
-139
lines changed

2 files changed

+140
-139
lines changed

tensorflow/inference/docker/2.18/py3/Dockerfile.ec2.arm64.cpu.os_scan_allowlist.json

Lines changed: 70 additions & 69 deletions
Original file line numberDiff line numberDiff line change
@@ -382,29 +382,29 @@
382382
],
383383
"linux-libc-dev": [
384384
{
385-
"description": "In the Linux kernel, the following vulnerability has been resolved: sunrpc: fix one UAF issue caused by sunrpc kernel tcp socket BUG: KASAN: slab-use-after-free in tcp_write_timer_handler+0x156/0x3e0 Read of size 1 at addr ffff888111f322cd by task swapper/0/0 CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Not tainted 6.12.0-rc4-dirty #7 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 Call Trace: <IRQ> dump_stack_lvl+0x68/0xa0 print_address_description.constprop.0+0x2c/0x3d0 print_report+0xb4/0x270 kasan_report+0xbd/0xf0 tcp_write_timer_handler+0x156/0x3e0 tcp_write_timer+0x66/0x170 call_timer_fn+0xfb/0x1d0 __run_timers+0x3f8/0x480 run_timer_softirq+0x9b/0x100 handle_softirqs+0x153/0x390 __irq_exit_rcu+0x103/0x120 irq_exit_rcu+0xe/0x20 sysvec_apic_timer_interrupt+0x76/0x90 </IRQ> <TASK> asm_sysvec_apic_timer_interrupt+0x1a/0x20 RIP: 0010:default_idle+0xf/0x20 Code: 4c 01 c7 4c 29 c2 e9 72 ff ff ff 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 66 90 0f 00 2d 33 f8 25 00 fb f4 <fa> c3 cc",
386-
"vulnerability_id": "CVE-2024-53168",
387-
"name": "CVE-2024-53168",
388-
"package_name": "linux-libc-dev",
389-
"package_details": {
390-
"file_path": null,
391-
"name": "linux-libc-dev",
392-
"package_manager": "OS",
393-
"version": "5.4.0",
394-
"release": "216.236"
395-
},
396-
"remediation": {"recommendation": {"text": "None Provided"}},
397-
"cvss_v3_score": 7.8,
398-
"cvss_v30_score": 0.0,
399-
"cvss_v31_score": 7.8,
400-
"cvss_v2_score": 0.0,
401-
"cvss_v3_severity": "HIGH",
402-
"source_url": "https://people.canonical.com/~ubuntu-security/cve/2024/CVE-2024-53168.html",
403-
"source": "UBUNTU_CVE",
404-
"severity": "HIGH",
405-
"status": "ACTIVE",
406-
"title": "CVE-2024-53168 - linux-libc-dev",
407-
"reason_to_ignore": "N/A"
385+
"description": "In the Linux kernel, the following vulnerability has been resolved: sunrpc: fix one UAF issue caused by sunrpc kernel tcp socket BUG: KASAN: slab-use-after-free in tcp_write_timer_handler+0x156/0x3e0 Read of size 1 at addr ffff888111f322cd by task swapper/0/0 CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Not tainted 6.12.0-rc4-dirty #7 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 Call Trace: <IRQ> dump_stack_lvl+0x68/0xa0 print_address_description.constprop.0+0x2c/0x3d0 print_report+0xb4/0x270 kasan_report+0xbd/0xf0 tcp_write_timer_handler+0x156/0x3e0 tcp_write_timer+0x66/0x170 call_timer_fn+0xfb/0x1d0 __run_timers+0x3f8/0x480 run_timer_softirq+0x9b/0x100 handle_softirqs+0x153/0x390 __irq_exit_rcu+0x103/0x120 irq_exit_rcu+0xe/0x20 sysvec_apic_timer_interrupt+0x76/0x90 </IRQ> <TASK> asm_sysvec_apic_timer_interrupt+0x1a/0x20 RIP: 0010:default_idle+0xf/0x20 Code: 4c 01 c7 4c 29 c2 e9 72 ff ff ff 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 ** 0f 1e ** 66 90 0f 00 2d 33 f8 25 00 fb f4 <fa> c3 cc",
386+
"vulnerability_id": "CVE-2024-53168",
387+
"name": "CVE-2024-53168",
388+
"package_name": "linux-libc-dev",
389+
"package_details": {
390+
"file_path": null,
391+
"name": "linux-libc-dev",
392+
"package_manager": "OS",
393+
"version": "5.4.0",
394+
"release": "216.236"
395+
},
396+
"remediation": {"recommendation": {"text": "None Provided"}},
397+
"cvss_v3_score": 7.8,
398+
"cvss_v30_score": 0.0,
399+
"cvss_v31_score": 7.8,
400+
"cvss_v2_score": 0.0,
401+
"cvss_v3_severity": "HIGH",
402+
"source_url": "https://people.canonical.com/~ubuntu-security/cve/2024/CVE-2024-53168.html",
403+
"source": "UBUNTU_CVE",
404+
"severity": "HIGH",
405+
"status": "ACTIVE",
406+
"title": "CVE-2024-53168 - linux-libc-dev",
407+
"reason_to_ignore": "N/A"
408408
},
409409
{
410410
"description": "In the Linux kernel, the following vulnerability has been resolved: tracing: Fix use-after-free in print_graph_function_flags during tracer switching Kairui reported a UAF issue in print_graph_function_flags() during ftrace stress testing [1]. This issue can be reproduced if puting a 'mdelay(10)' after 'mutex_unlock(&trace_types_lock)' in s_start(), and executing the following script: $ echo function_graph > current_tracer $ cat trace > /dev/null & $ sleep 5 # Ensure the 'cat' reaches the 'mdelay(10)' point $ echo timerlat > current_tracer The root cause lies in the two calls to print_graph_function_flags within print_trace_line during each s_show(): * One through 'iter->trace->print_line()'; * Another through 'event->funcs->trace()', which is hidden in print_trace_fmt() before print_trace_line returns. Tracer switching only updates the former, while the latter continues to use the print_line function of the old tracer, which in the script above is print_graph_function_flags. Moreover, when switching from the",
@@ -432,29 +432,29 @@
432432
"reason_to_ignore": "N/A"
433433
},
434434
{
435-
"description": "In the Linux kernel, the following vulnerability has been resolved: Bluetooth: L2CAP: Fix uaf in l2cap_connect [Syzbot reported] BUG: KASAN: slab-use-after-free in l2cap_connect.constprop.0+0x10d8/0x1270 net/bluetooth/l2cap_core.c:3949 Read of size 8 at addr ffff8880241e9800 by task kworker/u9:0/54",
436-
"vulnerability_id": "CVE-2024-49950",
437-
"name": "CVE-2024-49950",
438-
"package_name": "linux-libc-dev",
439-
"package_details": {
440-
"file_path": null,
441-
"name": "linux-libc-dev",
442-
"package_manager": "OS",
443-
"version": "5.4.0",
444-
"release": "216.236"
445-
},
446-
"remediation": {"recommendation": {"text": "None Provided"}},
447-
"cvss_v3_score": 7.8,
448-
"cvss_v30_score": 0.0,
449-
"cvss_v31_score": 7.8,
450-
"cvss_v2_score": 0.0,
451-
"cvss_v3_severity": "HIGH",
452-
"source_url": "https://people.canonical.com/~ubuntu-security/cve/2024/CVE-2024-49950.html",
453-
"source": "UBUNTU_CVE",
454-
"severity": "HIGH",
455-
"status": "ACTIVE",
456-
"title": "CVE-2024-49950 - linux-libc-dev",
457-
"reason_to_ignore": "N/A"
435+
"description": "In the Linux kernel, the following vulnerability has been resolved: Bluetooth: L2CAP: Fix uaf in l2cap_connect [Syzbot reported] BUG: KASAN: slab-use-after-free in l2cap_connect.constprop.0+0x10d8/0x1270 net/bluetooth/l2cap_core.c:3949 Read of size 8 at addr ffff8880241e9800 by task kworker/u9:0/54",
436+
"vulnerability_id": "CVE-2024-49950",
437+
"name": "CVE-2024-49950",
438+
"package_name": "linux-libc-dev",
439+
"package_details": {
440+
"file_path": null,
441+
"name": "linux-libc-dev",
442+
"package_manager": "OS",
443+
"version": "5.4.0",
444+
"release": "216.236"
445+
},
446+
"remediation": {"recommendation": {"text": "None Provided"}},
447+
"cvss_v3_score": 7.8,
448+
"cvss_v30_score": 0.0,
449+
"cvss_v31_score": 7.8,
450+
"cvss_v2_score": 0.0,
451+
"cvss_v3_severity": "HIGH",
452+
"source_url": "https://people.canonical.com/~ubuntu-security/cve/2024/CVE-2024-49950.html",
453+
"source": "UBUNTU_CVE",
454+
"severity": "HIGH",
455+
"status": "ACTIVE",
456+
"title": "CVE-2024-49950 - linux-libc-dev",
457+
"reason_to_ignore": "N/A"
458458
},
459459
{
460460
"description": "In the Linux kernel, the following vulnerability has been resolved: iscsi_ibft: Fix UBSAN shift-out-of-bounds warning in ibft_attr_show_nic() When performing an iSCSI boot using IPv6, iscsistart still reads the /sys/firmware/ibft/ethernetX/subnet-mask entry. Since the IPv6 prefix length is 64, this causes the shift exponent to become negative, triggering a UBSAN warning. As the concept of a subnet mask does not apply to IPv6, the value is set to ~0 to suppress the warning message.",
@@ -482,29 +482,29 @@
482482
"reason_to_ignore": "N/A"
483483
},
484484
{
485-
"description": "In the Linux kernel, the following vulnerability has been resolved: memstick: rtsx_usb_ms: Fix slab-use-after-free in rtsx_usb_ms_drv_remove This fixes the following crash: ================================================================== BUG: KASAN: slab-use-after-free in rtsx_usb_ms_poll_card+0x159/0x200 [rtsx_usb_ms] Read of size 8 at addr ffff888136335380 by task kworker/6:0/140241",
486-
"vulnerability_id": "CVE-2025-22020",
487-
"name": "CVE-2025-22020",
488-
"package_name": "linux-libc-dev",
489-
"package_details": {
490-
"file_path": null,
491-
"name": "linux-libc-dev",
492-
"package_manager": "OS",
493-
"version": "5.4.0",
494-
"release": "216.236"
495-
},
496-
"remediation": {"recommendation": {"text": "None Provided"}},
497-
"cvss_v3_score": 7.8,
498-
"cvss_v30_score": 0.0,
499-
"cvss_v31_score": 7.8,
500-
"cvss_v2_score": 0.0,
501-
"cvss_v3_severity": "HIGH",
502-
"source_url": "https://people.canonical.com/~ubuntu-security/cve/2025/CVE-2025-22020.html",
503-
"source": "UBUNTU_CVE",
504-
"severity": "HIGH",
505-
"status": "ACTIVE",
506-
"title": "CVE-2025-22020 - linux-libc-dev",
507-
"reason_to_ignore": "N/A"
485+
"description": "In the Linux kernel, the following vulnerability has been resolved: memstick: rtsx_usb_ms: Fix slab-use-after-free in rtsx_usb_ms_drv_remove This fixes the following crash: ================================================================== BUG: KASAN: slab-use-after-free in rtsx_usb_ms_poll_card+0x159/0x200 [rtsx_usb_ms] Read of size 8 at addr ffff888136335380 by task kworker/6:0/140241",
486+
"vulnerability_id": "CVE-2025-22020",
487+
"name": "CVE-2025-22020",
488+
"package_name": "linux-libc-dev",
489+
"package_details": {
490+
"file_path": null,
491+
"name": "linux-libc-dev",
492+
"package_manager": "OS",
493+
"version": "5.4.0",
494+
"release": "216.236"
495+
},
496+
"remediation": {"recommendation": {"text": "None Provided"}},
497+
"cvss_v3_score": 7.8,
498+
"cvss_v30_score": 0.0,
499+
"cvss_v31_score": 7.8,
500+
"cvss_v2_score": 0.0,
501+
"cvss_v3_severity": "HIGH",
502+
"source_url": "https://people.canonical.com/~ubuntu-security/cve/2025/CVE-2025-22020.html",
503+
"source": "UBUNTU_CVE",
504+
"severity": "HIGH",
505+
"status": "ACTIVE",
506+
"title": "CVE-2025-22020 - linux-libc-dev",
507+
"reason_to_ignore": "N/A"
508508
},
509509
{
510510
"description": "In the Linux kernel, the following vulnerability has been resolved: jfs: fix slab-out-of-bounds read in ea_get() During the \"size_check\" label in ea_get(), the code checks if the extended attribute list (xattr) size matches ea_size. If not, it logs \"ea_get: invalid extended attribute\" and calls print_hex_dump(). Here, EALIST_SIZE(ea_buf->xattr) returns 4110417968, which exceeds INT_MAX (2,147,483,647). Then ea_size is clamped: int size = clamp_t(int, ea_size, 0, EALIST_SIZE(ea_buf->xattr)); Although clamp_t aims to bound ea_size between 0 and 4110417968, the upper limit is treated as an int, causing an overflow above 2^31 - 1.",
@@ -561,6 +561,7 @@
561561
"reason_to_ignore": "N/A"
562562
},
563563
{
564+
564565
"description": "In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: fix usage slab after free [ +0.000021] BUG: KASAN: slab-use-after-free in drm_sched_entity_flush+0x6cb/0x7a0 [gpu_sched] [ +0.000027] Read of size 8 at addr ffff8881b8605f88 by task amd_pci_unplug/2147 [ +0.000023] CPU: 6 PID: 2147 Comm: amd_pci_unplug Not tainted 6.10.0+ #1 [ +0.000016] Hardware name: ASUS System Product Name/ROG STRIX B550-F GAMING (WI-FI), BIOS 1401 12/03/2020 [ +0.000016] Call Trace: [ +0.000008] <TASK> [ +0.000009] dump_stack_lvl+0x76/0xa0 [ +0.000017] print_report+0xce/0x5f0 [ +0.000017] ? drm_sched_entity_flush+0x6cb/0x7a0 [gpu_sched] [ +0.000019] ? srso_return_thunk+0x5/0x5f [ +0.000015] ? kasan_complete_mode_report_info+0x72/0x200 [ +0.000016] ? drm_sched_entity_flush+0x6cb/0x7a0 [gpu_sched] [ +0.000019] kasan_report+0xbe/0x110 [ +0.000015] ? drm_sched_entity_flush+0x6cb/0x7a0 [gpu_sched] [ +0.000023] __asan_report_load8_noabort+0x14/0x30 [ +0.000014] drm_sched_entity_flush+0x6cb/0x7a0 [gpu_sched] [ +0.00",
565566
"vulnerability_id": "CVE-2024-56551",
566567
"name": "CVE-2024-56551",

0 commit comments

Comments
 (0)