这是indexloc提供的服务,不要输入任何密码
Skip to content

Conversation

@shreeya-patel98
Copy link
Collaborator

@shreeya-patel98 shreeya-patel98 commented Nov 13, 2025

Commits

    crypto: xts - Handle EBUSY correctly
    
    jira VULN-157046
    cve CVE-2023-53494
    commit-author Herbert Xu <herbert@gondor.apana.org.au>
    commit 51c082514c2dedf2711c99d93c196cc4eedceb40
    

    mm: kmem: fix a NULL pointer dereference in obj_stock_flush_required()
    
    jira VULN-155867
    cve CVE-2023-53401
    commit-author Roman Gushchin <roman.gushchin@linux.dev>
    commit 3b8abb3239530c423c0b97e42af7f7e856e1ee96
    

    Bluetooth: Fix potential use-after-free when clear keys
    
    jira VULN-155798
    cve CVE-2023-53386
    commit-author Min Li <lm0963hack@gmail.com>
    commit 3673952cf0c6cf81b06c66a0b788abeeb02ff3ae
    

    crypto: seqiv - Handle EBUSY correctly
    
    jira VULN-155736
    cve CVE-2023-53373
    commit-author Herbert Xu <herbert@gondor.apana.org.au>
    commit 32e62025e5e52fbe4812ef044759de7010b15dbc
    

    pstore/ram: Check start of empty przs during init
    
    jira VULN-155103
    cve CVE-2023-53331
    commit-author Enlin Mu <enlin.mu@unisoc.com>
    commit fe8c3623ab06603eb760444a032d426542212021
    

    Bluetooth: L2CAP: Fix use-after-free
    
    jira VULN-155020
    cve CVE-2023-53305
    commit-author Zhengping Jiang <jiangzp@google.com>
    commit f752a0b334bb95fe9b42ecb511e0864e2768046f
    

    mt76: mt7921: fix kernel panic by accessing unallocated eeprom.data
    
    jira VULN-154549
    cve CVE-2023-53232
    commit-author Sean Wang <sean.wang@mediatek.com>
    commit 12db28c3ef31f719bd18fa186a40bb152e6a527c
    
    wifi: mwifiex: Fix missed return in oob checks failed path
    
    jira VULN-154525
    cve-bf CVE-2023-53226
    commit-author Polaris Pi <pinkperfect2021@gmail.com>
    commit 2785851c627f2db05f9271f7f63661b5dbd95c4c
    
    wifi: mwifiex: Fix oob check condition in mwifiex_process_rx_packet
    
    jira VULN-154525
    cve-bf CVE-2023-53226
    commit-author Pin-yen Lin <treapking@chromium.org>
    commit aef7a0300047e7b4707ea0411dc9597cba108fc8

    wifi: mwifiex: Fix OOB and integer underflow when rx packets
    
    jira VULN-154525
    cve CVE-2023-53226
    commit-author Polaris Pi <pinkperfect2021@gmail.com>
    commit 11958528161731c58e105b501ed60b83a91ea941

   wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies()
   
   jira VULN-154481
   cve CVE-2023-53213
   commit-author Jisoo Jang <jisoo.jang@yonsei.ac.kr>
   commit 0da40e018fd034d87c9460123fa7f897b69fdee7
   

    wifi: ath9k: don't allow to overwrite ENDPOINT0 attributes
    
    jira VULN-154356
    cve CVE-2023-53185
    commit-author Fedor Pchelkin <pchelkin@ispras.ru>
    commit 061b0cb9327b80d7a0f63a33e7c3e2a91a71f142
    

    fs: fix UAF/GPF bug in nilfs_mdt_destroy
    
    jira VULN-155287
    cve CVE-2022-50367
    commit-author Dongliang Mu <mudongliangabcd@gmail.com>
    commit 2e488f13755ffbb60f307e991b27024716a33b29
    

Kernel Build

/mnt/scratch/workspace/ciqlts9_2/kernel-src-tree
Skipping make mrproper
[TIMER]{MRPROPER}: 0s
x86_64 architecture detected, copying config
'configs/kernel-x86_64-rhel.config' -> '.config'
Setting Local Version for build
CONFIG_LOCALVERSION="-spatel_ciqlts9_2-ca3e0df84920"
Making olddefconfig
#
# configuration written to .config
#
Starting Build
  SYNC    include/config/auto.conf.cmd
  DESCEND objtool
  DESCEND bpf/resolve_btfids
  UPD     include/config/kernel.release
  UPD     include/generated/utsrelease.h
  CALL    scripts/atomic/check-atomics.sh
warning: generated include/linux/atomic/atomic-instrumented.h has been modified.
  CALL    scripts/checksyscalls.sh
  CHK     include/generated/compile.h
  CC      init/version.o
  CC      arch/x86/crypto/aesni-intel_glue.o
  AR      init/built-in.a
  AR      arch/x86/crypto/built-in.a
  CC      kernel/sys.o
  CC      drivers/pnp/core.o
  CC      drivers/pnp/card.o
  <--snip-->
    STRIP   /lib/modules/5.14.0-spatel_ciqlts9_2-ca3e0df84920+/kernel/sound/x86/snd-hdmi-lpe-audio.ko
  STRIP   /lib/modules/5.14.0-spatel_ciqlts9_2-ca3e0df84920+/kernel/sound/usb/usx2y/snd-usb-usx2y.ko
  SIGN    /lib/modules/5.14.0-spatel_ciqlts9_2-ca3e0df84920+/kernel/sound/usb/snd-usb-audio.ko
  STRIP   /lib/modules/5.14.0-spatel_ciqlts9_2-ca3e0df84920+/kernel/sound/virtio/virtio_snd.ko
  SIGN    /lib/modules/5.14.0-spatel_ciqlts9_2-ca3e0df84920+/kernel/sound/usb/usx2y/snd-usb-us122l.ko
  SIGN    /lib/modules/5.14.0-spatel_ciqlts9_2-ca3e0df84920+/kernel/sound/usb/usx2y/snd-usb-usx2y.ko
  SIGN    /lib/modules/5.14.0-spatel_ciqlts9_2-ca3e0df84920+/kernel/sound/x86/snd-hdmi-lpe-audio.ko
  STRIP   /lib/modules/5.14.0-spatel_ciqlts9_2-ca3e0df84920+/kernel/sound/xen/snd_xen_front.ko
  SIGN    /lib/modules/5.14.0-spatel_ciqlts9_2-ca3e0df84920+/kernel/sound/virtio/virtio_snd.ko
  SIGN    /lib/modules/5.14.0-spatel_ciqlts9_2-ca3e0df84920+/kernel/sound/xen/snd_xen_front.ko
  STRIP   /lib/modules/5.14.0-spatel_ciqlts9_2-ca3e0df84920+/kernel/virt/lib/irqbypass.ko
  SIGN    /lib/modules/5.14.0-spatel_ciqlts9_2-ca3e0df84920+/kernel/virt/lib/irqbypass.ko
  STRIP   /lib/modules/5.14.0-spatel_ciqlts9_2-ca3e0df84920+/kernel/net/vmw_vsock/vmw_vsock_vmci_transport.ko
  SIGN    /lib/modules/5.14.0-spatel_ciqlts9_2-ca3e0df84920+/kernel/net/vmw_vsock/vmw_vsock_vmci_transport.ko
  DEPMOD  /lib/modules/5.14.0-spatel_ciqlts9_2-ca3e0df84920+
[TIMER]{MODULES}: 11s
Making Install
sh ./arch/x86/boot/install.sh \
	5.14.0-spatel_ciqlts9_2-ca3e0df84920+ arch/x86/boot/bzImage \
	System.map "/boot"
[TIMER]{INSTALL}: 23s
Checking kABI
kABI check passed
Setting Default Kernel to /boot/vmlinuz-5.14.0-spatel_ciqlts9_2-ca3e0df84920+ and Index to 4
The default is /boot/loader/entries/2d84c760132f4bab9836f9dd9e3ac547-5.14.0-spatel_ciqlts9_2-ca3e0df84920+.conf with index 4 and kernel /boot/vmlinuz-5.14.0-spatel_ciqlts9_2-ca3e0df84920+
The default is /boot/loader/entries/2d84c760132f4bab9836f9dd9e3ac547-5.14.0-spatel_ciqlts9_2-ca3e0df84920+.conf with index 4 and kernel /boot/vmlinuz-5.14.0-spatel_ciqlts9_2-ca3e0df84920+
Generating grub configuration file ...
Adding boot menu entry for UEFI Firmware Settings ...
done
Hopefully Grub2.0 took everything ... rebooting after time metrices
[TIMER]{MRPROPER}: 0s
[TIMER]{BUILD}: 2523s
[TIMER]{MODULES}: 11s
[TIMER]{INSTALL}: 23s
[TIMER]{TOTAL} 2563s
Rebooting in 10 seconds

kernel-build.log

Kselftest

shreeya@spatel-dev-bom ~/c/w/ciqlts9_2> grep -a ^ok kselftest-before.log | wc -l
290
shreeya@spatel-dev-bom ~/c/w/ciqlts9_2> grep -a ^ok kselftest-after.log | wc -l
291
shreeya@spatel-dev-bom ~/c/w/ciqlts9_2> 

kselftest-after.log
kselftest-before.log

jira VULN-155287
cve CVE-2022-50367
commit-author Dongliang Mu <mudongliangabcd@gmail.com>
commit 2e488f1

In alloc_inode, inode_init_always() could return -ENOMEM if
security_inode_alloc() fails, which causes inode->i_private
uninitialized. Then nilfs_is_metadata_file_inode() returns
true and nilfs_free_inode() wrongly calls nilfs_mdt_destroy(),
which frees the uninitialized inode->i_private
and leads to crashes(e.g., UAF/GPF).

Fix this by moving security_inode_alloc just prior to
this_cpu_inc(nr_inodes)

Link: https://lkml.kernel.org/r/CAFcO6XOcf1Jj2SeGt=jJV59wmhESeSKpfR0omdFRq+J9nD1vfQ@mail.gmail.com
	Reported-by: butt3rflyh4ck <butterflyhuangxx@gmail.com>
	Reported-by: Hao Sun <sunhao.th@gmail.com>
	Reported-by: Jiacheng Xu <stitch@zju.edu.cn>
	Reviewed-by: Christian Brauner (Microsoft) <brauner@kernel.org>
	Signed-off-by: Dongliang Mu <mudongliangabcd@gmail.com>
	Cc: Al Viro <viro@zeniv.linux.org.uk>
	Cc: stable@vger.kernel.org
	Signed-off-by: Al Viro <viro@zeniv.linux.org.uk>
(cherry picked from commit 2e488f1)
	Signed-off-by: Shreeya Patel <spatel@ciq.com>
jira VULN-154356
cve CVE-2023-53185
commit-author Fedor Pchelkin <pchelkin@ispras.ru>
commit 061b0cb

A bad USB device is able to construct a service connection response
message with target endpoint being ENDPOINT0 which is reserved for
HTC_CTRL_RSVD_SVC and should not be modified to be used for any other
services.

Reject such service connection responses.

Found by Linux Verification Center (linuxtesting.org) with Syzkaller.

Fixes: fb9987d ("ath9k_htc: Support for AR9271 chipset.")
	Reported-by: syzbot+b68fbebe56d8362907e8@syzkaller.appspotmail.com
	Signed-off-by: Fedor Pchelkin <pchelkin@ispras.ru>
	Acked-by: Toke Høiland-Jørgensen <toke@toke.dk>
	Signed-off-by: Kalle Valo <quic_kvalo@quicinc.com>
Link: https://lore.kernel.org/r/20230516150427.79469-1-pchelkin@ispras.ru
(cherry picked from commit 061b0cb)
	Signed-off-by: Shreeya Patel <spatel@ciq.com>
jira VULN-154481
cve CVE-2023-53213
commit-author Jisoo Jang <jisoo.jang@yonsei.ac.kr>
commit 0da40e0

Fix a slab-out-of-bounds read that occurs in kmemdup() called from
brcmf_get_assoc_ies().
The bug could occur when assoc_info->req_len, data from a URB provided
by a USB device, is bigger than the size of buffer which is defined as
WL_EXTRA_BUF_MAX.

Add the size check for req_len/resp_len of assoc_info.

Found by a modified version of syzkaller.

[   46.592467][    T7] ==================================================================
[   46.594687][    T7] BUG: KASAN: slab-out-of-bounds in kmemdup+0x3e/0x50
[   46.596572][    T7] Read of size 3014656 at addr ffff888019442000 by task kworker/0:1/7
[   46.598575][    T7]
[   46.599157][    T7] CPU: 0 PID: 7 Comm: kworker/0:1 Tainted: G           O      5.14.0+ #145
[   46.601333][    T7] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.12.1-0-ga5cab58e9a3f-prebuilt.qemu.org 04/01/2014
[   46.604360][    T7] Workqueue: events brcmf_fweh_event_worker
[   46.605943][    T7] Call Trace:
[   46.606584][    T7]  dump_stack_lvl+0x8e/0xd1
[   46.607446][    T7]  print_address_description.constprop.0.cold+0x93/0x334
[   46.608610][    T7]  ? kmemdup+0x3e/0x50
[   46.609341][    T7]  kasan_report.cold+0x79/0xd5
[   46.610151][    T7]  ? kmemdup+0x3e/0x50
[   46.610796][    T7]  kasan_check_range+0x14e/0x1b0
[   46.611691][    T7]  memcpy+0x20/0x60
[   46.612323][    T7]  kmemdup+0x3e/0x50
[   46.612987][    T7]  brcmf_get_assoc_ies+0x967/0xf60
[   46.613904][    T7]  ? brcmf_notify_vif_event+0x3d0/0x3d0
[   46.614831][    T7]  ? lock_chain_count+0x20/0x20
[   46.615683][    T7]  ? mark_lock.part.0+0xfc/0x2770
[   46.616552][    T7]  ? lock_chain_count+0x20/0x20
[   46.617409][    T7]  ? mark_lock.part.0+0xfc/0x2770
[   46.618244][    T7]  ? lock_chain_count+0x20/0x20
[   46.619024][    T7]  brcmf_bss_connect_done.constprop.0+0x241/0x2e0
[   46.620019][    T7]  ? brcmf_parse_configure_security.isra.0+0x2a0/0x2a0
[   46.620818][    T7]  ? __lock_acquire+0x181f/0x5790
[   46.621462][    T7]  brcmf_notify_connect_status+0x448/0x1950
[   46.622134][    T7]  ? rcu_read_lock_bh_held+0xb0/0xb0
[   46.622736][    T7]  ? brcmf_cfg80211_join_ibss+0x7b0/0x7b0
[   46.623390][    T7]  ? find_held_lock+0x2d/0x110
[   46.623962][    T7]  ? brcmf_fweh_event_worker+0x19f/0xc60
[   46.624603][    T7]  ? mark_held_locks+0x9f/0xe0
[   46.625145][    T7]  ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0
[   46.625871][    T7]  ? brcmf_cfg80211_join_ibss+0x7b0/0x7b0
[   46.626545][    T7]  brcmf_fweh_call_event_handler.isra.0+0x90/0x100
[   46.627338][    T7]  brcmf_fweh_event_worker+0x557/0xc60
[   46.627962][    T7]  ? brcmf_fweh_call_event_handler.isra.0+0x100/0x100
[   46.628736][    T7]  ? rcu_read_lock_sched_held+0xa1/0xd0
[   46.629396][    T7]  ? rcu_read_lock_bh_held+0xb0/0xb0
[   46.629970][    T7]  ? lockdep_hardirqs_on_prepare+0x273/0x3e0
[   46.630649][    T7]  process_one_work+0x92b/0x1460
[   46.631205][    T7]  ? pwq_dec_nr_in_flight+0x330/0x330
[   46.631821][    T7]  ? rwlock_bug.part.0+0x90/0x90
[   46.632347][    T7]  worker_thread+0x95/0xe00
[   46.632832][    T7]  ? __kthread_parkme+0x115/0x1e0
[   46.633393][    T7]  ? process_one_work+0x1460/0x1460
[   46.633957][    T7]  kthread+0x3a1/0x480
[   46.634369][    T7]  ? set_kthread_struct+0x120/0x120
[   46.634933][    T7]  ret_from_fork+0x1f/0x30
[   46.635431][    T7]
[   46.635687][    T7] Allocated by task 7:
[   46.636151][    T7]  kasan_save_stack+0x1b/0x40
[   46.636628][    T7]  __kasan_kmalloc+0x7c/0x90
[   46.637108][    T7]  kmem_cache_alloc_trace+0x19e/0x330
[   46.637696][    T7]  brcmf_cfg80211_attach+0x4a0/0x4040
[   46.638275][    T7]  brcmf_attach+0x389/0xd40
[   46.638739][    T7]  brcmf_usb_probe+0x12de/0x1690
[   46.639279][    T7]  usb_probe_interface+0x2aa/0x760
[   46.639820][    T7]  really_probe+0x205/0xb70
[   46.640342][    T7]  __driver_probe_device+0x311/0x4b0
[   46.640876][    T7]  driver_probe_device+0x4e/0x150
[   46.641445][    T7]  __device_attach_driver+0x1cc/0x2a0
[   46.642000][    T7]  bus_for_each_drv+0x156/0x1d0
[   46.642543][    T7]  __device_attach+0x23f/0x3a0
[   46.643065][    T7]  bus_probe_device+0x1da/0x290
[   46.643644][    T7]  device_add+0xb7b/0x1eb0
[   46.644130][    T7]  usb_set_configuration+0xf59/0x16f0
[   46.644720][    T7]  usb_generic_driver_probe+0x82/0xa0
[   46.645295][    T7]  usb_probe_device+0xbb/0x250
[   46.645786][    T7]  really_probe+0x205/0xb70
[   46.646258][    T7]  __driver_probe_device+0x311/0x4b0
[   46.646804][    T7]  driver_probe_device+0x4e/0x150
[   46.647387][    T7]  __device_attach_driver+0x1cc/0x2a0
[   46.647926][    T7]  bus_for_each_drv+0x156/0x1d0
[   46.648454][    T7]  __device_attach+0x23f/0x3a0
[   46.648939][    T7]  bus_probe_device+0x1da/0x290
[   46.649478][    T7]  device_add+0xb7b/0x1eb0
[   46.649936][    T7]  usb_new_device.cold+0x49c/0x1029
[   46.650526][    T7]  hub_event+0x1c98/0x3950
[   46.650975][    T7]  process_one_work+0x92b/0x1460
[   46.651535][    T7]  worker_thread+0x95/0xe00
[   46.651991][    T7]  kthread+0x3a1/0x480
[   46.652413][    T7]  ret_from_fork+0x1f/0x30
[   46.652885][    T7]
[   46.653131][    T7] The buggy address belongs to the object at ffff888019442000
[   46.653131][    T7]  which belongs to the cache kmalloc-2k of size 2048
[   46.654669][    T7] The buggy address is located 0 bytes inside of
[   46.654669][    T7]  2048-byte region [ffff888019442000, ffff888019442800)
[   46.656137][    T7] The buggy address belongs to the page:
[   46.656720][    T7] page:ffffea0000651000 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x19440
[   46.657792][    T7] head:ffffea0000651000 order:3 compound_mapcount:0 compound_pincount:0
[   46.658673][    T7] flags: 0x100000000010200(slab|head|node=0|zone=1)
[   46.659422][    T7] raw: 0100000000010200 0000000000000000 dead000000000122 ffff888100042000
[   46.660363][    T7] raw: 0000000000000000 0000000000080008 00000001ffffffff 0000000000000000
[   46.661236][    T7] page dumped because: kasan: bad access detected
[   46.661956][    T7] page_owner tracks the page as allocated
[   46.662588][    T7] page last allocated via order 3, migratetype Unmovable, gfp_mask 0x52a20(GFP_ATOMIC|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP), pid 7, ts 31136961085, free_ts 0
[   46.664271][    T7]  prep_new_page+0x1aa/0x240
[   46.664763][    T7]  get_page_from_freelist+0x159a/0x27c0
[   46.665340][    T7]  __alloc_pages+0x2da/0x6a0
[   46.665847][    T7]  alloc_pages+0xec/0x1e0
[   46.666308][    T7]  allocate_slab+0x380/0x4e0
[   46.666770][    T7]  ___slab_alloc+0x5bc/0x940
[   46.667264][    T7]  __slab_alloc+0x6d/0x80
[   46.667712][    T7]  kmem_cache_alloc_trace+0x30a/0x330
[   46.668299][    T7]  brcmf_usbdev_qinit.constprop.0+0x50/0x470
[   46.668885][    T7]  brcmf_usb_probe+0xc97/0x1690
[   46.669438][    T7]  usb_probe_interface+0x2aa/0x760
[   46.669988][    T7]  really_probe+0x205/0xb70
[   46.670487][    T7]  __driver_probe_device+0x311/0x4b0
[   46.671031][    T7]  driver_probe_device+0x4e/0x150
[   46.671604][    T7]  __device_attach_driver+0x1cc/0x2a0
[   46.672192][    T7]  bus_for_each_drv+0x156/0x1d0
[   46.672739][    T7] page_owner free stack trace missing
[   46.673335][    T7]
[   46.673620][    T7] Memory state around the buggy address:
[   46.674213][    T7]  ffff888019442700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   46.675083][    T7]  ffff888019442780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   46.675994][    T7] >ffff888019442800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.676875][    T7]                    ^
[   46.677323][    T7]  ffff888019442880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.678190][    T7]  ffff888019442900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.679052][    T7] ==================================================================
[   46.679945][    T7] Disabling lock debugging due to kernel taint
[   46.680725][    T7] Kernel panic - not syncing:

	Reviewed-by: Arend van Spriel <arend.vanspriel@broadcom.com>
	Signed-off-by: Jisoo Jang <jisoo.jang@yonsei.ac.kr>
	Signed-off-by: Kalle Valo <kvalo@kernel.org>
Link: https://lore.kernel.org/r/20230309104457.22628-1-jisoo.jang@yonsei.ac.kr
(cherry picked from commit 0da40e0)
	Signed-off-by: Shreeya Patel <spatel@ciq.com>
jira VULN-154525
cve CVE-2023-53226
commit-author Polaris Pi <pinkperfect2021@gmail.com>
commit 1195852

Make sure mwifiex_process_mgmt_packet,
mwifiex_process_sta_rx_packet and mwifiex_process_uap_rx_packet,
mwifiex_uap_queue_bridged_pkt and mwifiex_process_rx_packet
not out-of-bounds access the skb->data buffer.

Fixes: 2dbaf75 ("mwifiex: report received management frames to cfg80211")
	Signed-off-by: Polaris Pi <pinkperfect2021@gmail.com>
	Reviewed-by: Matthew Wang <matthewmwang@chromium.org>
	Reviewed-by: Brian Norris <briannorris@chromium.org>
	Signed-off-by: Kalle Valo <kvalo@kernel.org>
Link: https://lore.kernel.org/r/20230723070741.1544662-1-pinkperfect2021@gmail.com
(cherry picked from commit 1195852)
	Signed-off-by: Shreeya Patel <spatel@ciq.com>
@shreeya-patel98 shreeya-patel98 requested a review from a team November 13, 2025 15:14
@github-actions
Copy link

🔍 Upstream Linux Kernel Commit Check

  • ⚠️ PR commit 5e35f54b220b (wifi: mwifiex: Fix OOB and integer underflow when rx packets) references upstream commit
    119585281617 which has been referenced by a Fixes: tag in the upstream
    Linux kernel:
    aef7a0300047 wifi: mwifiex: Fix oob check condition in mwifiex_process_rx_packet (Pin-yen Lin)
    2785851c627f wifi: mwifiex: Fix missed return in oob checks failed path (Polaris Pi)

This is an automated message from the kernel commit checker workflow.

Copy link

@roxanan1996 roxanan1996 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The cve-bfs are missing

jira VULN-154525
cve-bf CVE-2023-53226
commit-author Pin-yen Lin <treapking@chromium.org>
commit aef7a03

Only skip the code path trying to access the rfc1042 headers when the
buffer is too small, so the driver can still process packets without
rfc1042 headers.

Fixes: 1195852 ("wifi: mwifiex: Fix OOB and integer underflow when rx packets")
	Signed-off-by: Pin-yen Lin <treapking@chromium.org>
	Acked-by: Brian Norris <briannorris@chromium.org>
	Reviewed-by: Matthew Wang <matthewmwang@chromium.org>
	Signed-off-by: Kalle Valo <kvalo@kernel.org>
Link: https://lore.kernel.org/r/20230908104308.1546501-1-treapking@chromium.org
(cherry picked from commit aef7a03)
	Signed-off-by: Shreeya Patel <spatel@ciq.com>
jira VULN-154525
cve-bf CVE-2023-53226
commit-author Polaris Pi <pinkperfect2021@gmail.com>
commit 2785851

Add missed return in mwifiex_uap_queue_bridged_pkt() and
mwifiex_process_rx_packet().

Fixes: 1195852 ("wifi: mwifiex: Fix OOB and integer underflow when rx packets")
	Signed-off-by: Polaris Pi <pinkperfect2021@gmail.com>
	Reported-by: Dmitry Antipov <dmantipov@yandex.ru>
	Acked-by: Brian Norris <briannorris@chromium.org>
	Signed-off-by: Kalle Valo <kvalo@kernel.org>
Link: https://lore.kernel.org/r/20230810083911.3725248-1-pinkperfect2021@gmail.com
(cherry picked from commit 2785851)
	Signed-off-by: Shreeya Patel <spatel@ciq.com>
jira VULN-154549
cve CVE-2023-53232
commit-author Sean Wang <sean.wang@mediatek.com>
commit 12db28c

The MT7921 driver no longer uses eeprom.data, but the relevant code has not
been removed completely since
commit 16d98b5 ("mt76: mt7921: rely on mcu_get_nic_capability").
This could result in potential invalid memory access.

To fix the kernel panic issue in mt7921, it is necessary to avoid accessing
unallocated eeprom.data which can lead to invalid memory access.

Furthermore, it is possible to entirely eliminate the
mt7921_mcu_parse_eeprom function and solely depend on
mt7921_mcu_parse_response to divide the RxD header.

[2.702735] BUG: kernel NULL pointer dereference, address: 0000000000000550
[2.702740] #PF: supervisor write access in kernel mode
[2.702741] #PF: error_code(0x0002) - not-present page
[2.702743] PGD 0 P4D 0
[2.702747] Oops: 0002 [#1] PREEMPT SMP NOPTI
[2.702755] RIP: 0010:mt7921_mcu_parse_response+0x147/0x170 [mt7921_common]
[2.702758] RSP: 0018:ffffae7c00fef828 EFLAGS: 00010286
[2.702760] RAX: ffffa367f57be024 RBX: ffffa367cc7bf500 RCX: 0000000000000000
[2.702762] RDX: 0000000000000550 RSI: 0000000000000000 RDI: ffffa367cc7bf500
[2.702763] RBP: ffffae7c00fef840 R08: ffffa367cb167000 R09: 0000000000000005
[2.702764] R10: 0000000000000000 R11: ffffffffc04702e4 R12: ffffa367e8329f40
[2.702766] R13: 0000000000000000 R14: 0000000000000001 R15: ffffa367e8329f40
[2.702768] FS:  000079ee6cf20c40(0000) GS:ffffa36b2f940000(0000) knlGS:0000000000000000
[2.702769] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[2.702775] CR2: 0000000000000550 CR3: 00000001233c6004 CR4: 0000000000770ee0
[2.702776] PKRU: 55555554
[2.702777] Call Trace:
[2.702782]  mt76_mcu_skb_send_and_get_msg+0xc3/0x11e [mt76 <HASH:1bc4 5>]
[2.702785]  mt7921_run_firmware+0x241/0x853 [mt7921_common <HASH:6a2f 6>]
[2.702789]  mt7921e_mcu_init+0x2b/0x56 [mt7921e <HASH:d290 7>]
[2.702792]  mt7921_register_device+0x2eb/0x5a5 [mt7921_common <HASH:6a2f 6>]
[2.702795]  ? mt7921_irq_tasklet+0x1d4/0x1d4 [mt7921e <HASH:d290 7>]
[2.702797]  mt7921_pci_probe+0x2d6/0x319 [mt7921e <HASH:d290 7>]
[2.702799]  pci_device_probe+0x9f/0x12a

Fixes: 16d98b5 ("mt76: mt7921: rely on mcu_get_nic_capability")
	Signed-off-by: Sean Wang <sean.wang@mediatek.com>
	Signed-off-by: Felix Fietkau <nbd@nbd.name>
(cherry picked from commit 12db28c)
	Signed-off-by: Shreeya Patel <spatel@ciq.com>
jira VULN-155020
cve CVE-2023-53305
commit-author Zhengping Jiang <jiangzp@google.com>
commit f752a0b

Fix potential use-after-free in l2cap_le_command_rej.

	Signed-off-by: Zhengping Jiang <jiangzp@google.com>
	Signed-off-by: Luiz Augusto von Dentz <luiz.von.dentz@intel.com>
	Signed-off-by: Jakub Kicinski <kuba@kernel.org>
(cherry picked from commit f752a0b)
	Signed-off-by: Shreeya Patel <spatel@ciq.com>
jira VULN-155103
cve CVE-2023-53331
commit-author Enlin Mu <enlin.mu@unisoc.com>
commit fe8c362

After commit 3069637 ("pstore/ram: Do not treat empty buffers as
valid"), initialization would assume a prz was valid after seeing that
the buffer_size is zero (regardless of the buffer start position). This
unchecked start value means it could be outside the bounds of the buffer,
leading to future access panics when written to:

 sysdump_panic_event+0x3b4/0x5b8
 atomic_notifier_call_chain+0x54/0x90
 panic+0x1c8/0x42c
 die+0x29c/0x2a8
 die_kernel_fault+0x68/0x78
 __do_kernel_fault+0x1c4/0x1e0
 do_bad_area+0x40/0x100
 do_translation_fault+0x68/0x80
 do_mem_abort+0x68/0xf8
 el1_da+0x1c/0xc0
 __raw_writeb+0x38/0x174
 __memcpy_toio+0x40/0xac
 persistent_ram_update+0x44/0x12c
 persistent_ram_write+0x1a8/0x1b8
 ramoops_pstore_write+0x198/0x1e8
 pstore_console_write+0x94/0xe0
 ...

To avoid this, also check if the prz start is 0 during the initialization
phase. If not, the next prz sanity check case will discover it (start >
size) and zap the buffer back to a sane state.

Fixes: 3069637 ("pstore/ram: Do not treat empty buffers as valid")
	Cc: Yunlong Xing <yunlong.xing@unisoc.com>
	Cc: stable@vger.kernel.org
	Signed-off-by: Enlin Mu <enlin.mu@unisoc.com>
Link: https://lore.kernel.org/r/20230801060432.1307717-1-yunlong.xing@unisoc.com
[kees: update commit log with backtrace and clarifications]
	Signed-off-by: Kees Cook <keescook@chromium.org>
(cherry picked from commit fe8c362)
	Signed-off-by: Shreeya Patel <spatel@ciq.com>
jira VULN-155736
cve CVE-2023-53373
commit-author Herbert Xu <herbert@gondor.apana.org.au>
commit 32e6202

As it is seqiv only handles the special return value of EINPROGERSS,
which means that in all other cases it will free data related to the
request.

However, as the caller of seqiv may specify MAY_BACKLOG, we also need
to expect EBUSY and treat it in the same way.  Otherwise backlogged
requests will trigger a use-after-free.

Fixes: 0a27032 ("[CRYPTO] seqiv: Add Sequence Number IV Generator")
	Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
(cherry picked from commit 32e6202)
	Signed-off-by: Shreeya Patel <spatel@ciq.com>
jira VULN-155798
cve CVE-2023-53386
commit-author Min Li <lm0963hack@gmail.com>
commit 3673952

Similar to commit c5d2b6f ("Bluetooth: Fix use-after-free in
hci_remove_ltk/hci_remove_irk"). We can not access k after kfree_rcu()
call.

Fixes: d7d4168 ("Bluetooth: Fix Suspicious RCU usage warnings")
	Signed-off-by: Min Li <lm0963hack@gmail.com>
	Signed-off-by: Luiz Augusto von Dentz <luiz.von.dentz@intel.com>
(cherry picked from commit 3673952)
	Signed-off-by: Shreeya Patel <spatel@ciq.com>
jira VULN-155867
cve CVE-2023-53401
commit-author Roman Gushchin <roman.gushchin@linux.dev>
commit 3b8abb3

KCSAN found an issue in obj_stock_flush_required():
stock->cached_objcg can be reset between the check and dereference:

==================================================================
BUG: KCSAN: data-race in drain_all_stock / drain_obj_stock

write to 0xffff888237c2a2f8 of 8 bytes by task 19625 on cpu 0:
 drain_obj_stock+0x408/0x4e0 mm/memcontrol.c:3306
 refill_obj_stock+0x9c/0x1e0 mm/memcontrol.c:3340
 obj_cgroup_uncharge+0xe/0x10 mm/memcontrol.c:3408
 memcg_slab_free_hook mm/slab.h:587 [inline]
 __cache_free mm/slab.c:3373 [inline]
 __do_kmem_cache_free mm/slab.c:3577 [inline]
 kmem_cache_free+0x105/0x280 mm/slab.c:3602
 __d_free fs/dcache.c:298 [inline]
 dentry_free fs/dcache.c:375 [inline]
 __dentry_kill+0x422/0x4a0 fs/dcache.c:621
 dentry_kill+0x8d/0x1e0
 dput+0x118/0x1f0 fs/dcache.c:913
 __fput+0x3bf/0x570 fs/file_table.c:329
 ____fput+0x15/0x20 fs/file_table.c:349
 task_work_run+0x123/0x160 kernel/task_work.c:179
 resume_user_mode_work include/linux/resume_user_mode.h:49 [inline]
 exit_to_user_mode_loop+0xcf/0xe0 kernel/entry/common.c:171
 exit_to_user_mode_prepare+0x6a/0xa0 kernel/entry/common.c:203
 __syscall_exit_to_user_mode_work kernel/entry/common.c:285 [inline]
 syscall_exit_to_user_mode+0x26/0x140 kernel/entry/common.c:296
 do_syscall_64+0x4d/0xc0 arch/x86/entry/common.c:86
 entry_SYSCALL_64_after_hwframe+0x63/0xcd

read to 0xffff888237c2a2f8 of 8 bytes by task 19632 on cpu 1:
 obj_stock_flush_required mm/memcontrol.c:3319 [inline]
 drain_all_stock+0x174/0x2a0 mm/memcontrol.c:2361
 try_charge_memcg+0x6d0/0xd10 mm/memcontrol.c:2703
 try_charge mm/memcontrol.c:2837 [inline]
 mem_cgroup_charge_skmem+0x51/0x140 mm/memcontrol.c:7290
 sock_reserve_memory+0xb1/0x390 net/core/sock.c:1025
 sk_setsockopt+0x800/0x1e70 net/core/sock.c:1525
 udp_lib_setsockopt+0x99/0x6c0 net/ipv4/udp.c:2692
 udp_setsockopt+0x73/0xa0 net/ipv4/udp.c:2817
 sock_common_setsockopt+0x61/0x70 net/core/sock.c:3668
 __sys_setsockopt+0x1c3/0x230 net/socket.c:2271
 __do_sys_setsockopt net/socket.c:2282 [inline]
 __se_sys_setsockopt net/socket.c:2279 [inline]
 __x64_sys_setsockopt+0x66/0x80 net/socket.c:2279
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x41/0xc0 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x63/0xcd

value changed: 0xffff8881382d52c0 -> 0xffff888138893740

Reported by Kernel Concurrency Sanitizer on:
CPU: 1 PID: 19632 Comm: syz-executor.0 Not tainted 6.3.0-rc2-syzkaller-00387-g534293368afa #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/02/2023

Fix it by using READ_ONCE()/WRITE_ONCE() for all accesses to
stock->cached_objcg.

Link: https://lkml.kernel.org/r/20230502160839.361544-1-roman.gushchin@linux.dev
Fixes: bf4f059 ("mm: memcg/slab: obj_cgroup API")
	Signed-off-by: Roman Gushchin <roman.gushchin@linux.dev>
	Reported-by: syzbot+774c29891415ab0fd29d@syzkaller.appspotmail.com
	Reported-by: Dmitry Vyukov <dvyukov@google.com>
  Link: https://lore.kernel.org/linux-mm/CACT4Y+ZfucZhM60YPphWiCLJr6+SGFhT+jjm8k1P-a_8Kkxsjg@mail.gmail.com/T/#t
	Reviewed-by: Yosry Ahmed <yosryahmed@google.com>
	Acked-by: Shakeel Butt <shakeelb@google.com>
	Reviewed-by: Dmitry Vyukov <dvyukov@google.com>
	Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
(cherry picked from commit 3b8abb3)
	Signed-off-by: Shreeya Patel <spatel@ciq.com>
jira VULN-157046
cve CVE-2023-53494
commit-author Herbert Xu <herbert@gondor.apana.org.au>
commit 51c0825

As it is xts only handles the special return value of EINPROGRESS,
which means that in all other cases it will free data related to the
request.

However, as the caller of xts may specify MAY_BACKLOG, we also need
to expect EBUSY and treat it in the same way.  Otherwise backlogged
requests will trigger a use-after-free.

Fixes: 8083b1b ("crypto: xts - add support for ciphertext stealing")
	Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
	Acked-by: Ard Biesheuvel <ardb@kernel.org>
	Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
(cherry picked from commit 51c0825)
	Signed-off-by: Shreeya Patel <spatel@ciq.com>
Copy link

@roxanan1996 roxanan1996 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I got this while running check_kernel_commits with --cve-fixes

[CVE-MISSING] PR commit f58691dc9f29b (wifi: mwifiex: Fix oob check condition in
              mwifiex_process_rx_packet) does not reference a CVE but upstream
              commit aef7a0300047 is associated with CVE-2023-52525

@shreeya-patel98
Copy link
Collaborator Author

shreeya-patel98 commented Nov 14, 2025

I got this while running check_kernel_commits with --cve-fixes

[CVE-MISSING] PR commit f58691dc9f29b (wifi: mwifiex: Fix oob check condition in
              mwifiex_process_rx_packet) does not reference a CVE but upstream
              commit aef7a0300047 is associated with CVE-2023-52525

I don't see the ticket in our system though

@shreeya-patel98 shreeya-patel98 requested review from a team and roxanan1996 November 14, 2025 12:58
@bmastbergen
Copy link
Collaborator

This is sort of a nit, but can we reverse the order of these two commits?

baba026a6cab wifi: mwifiex: Fix missed return in oob checks failed path
f58691dc9f29 wifi: mwifiex: Fix oob check condition in mwifiex_process_rx_packet

It will match mainline order and make interdiff output clean.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Development

Successfully merging this pull request may close these issues.

4 participants