634 lines
34 KiB
XML
634 lines
34 KiB
XML
<?xml version="1.0" encoding="UTF-8"?>
|
|
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
|
|
<DocumentTitle xml:lang="en">An update for kernel is now available for openEuler-22.03-LTS-SP4</DocumentTitle>
|
|
<DocumentType>Security Advisory</DocumentType>
|
|
<DocumentPublisher Type="Vendor">
|
|
<ContactDetails>openeuler-security@openeuler.org</ContactDetails>
|
|
<IssuingAuthority>openEuler security committee</IssuingAuthority>
|
|
</DocumentPublisher>
|
|
<DocumentTracking>
|
|
<Identification>
|
|
<ID>openEuler-SA-2024-1898</ID>
|
|
</Identification>
|
|
<Status>Final</Status>
|
|
<Version>1.0</Version>
|
|
<RevisionHistory>
|
|
<Revision>
|
|
<Number>1.0</Number>
|
|
<Date>2024-07-26</Date>
|
|
<Description>Initial</Description>
|
|
</Revision>
|
|
</RevisionHistory>
|
|
<InitialReleaseDate>2024-07-26</InitialReleaseDate>
|
|
<CurrentReleaseDate>2024-07-26</CurrentReleaseDate>
|
|
<Generator>
|
|
<Engine>openEuler SA Tool V1.0</Engine>
|
|
<Date>2024-07-26</Date>
|
|
</Generator>
|
|
</DocumentTracking>
|
|
<DocumentNotes>
|
|
<Note Title="Synopsis" Type="General" Ordinal="1" xml:lang="en">kernel security update</Note>
|
|
<Note Title="Summary" Type="General" Ordinal="2" xml:lang="en">An update for kernel is now available for openEuler-22.03-LTS-SP4</Note>
|
|
<Note Title="Description" Type="General" Ordinal="3" xml:lang="en">The Linux Kernel, the operating system core itself.
|
|
|
|
Security Fix(es):
|
|
|
|
In the Linux kernel, the following vulnerability has been resolved:
|
|
|
|
net: dsa: seville: register the mdiobus under devres
|
|
|
|
As explained in commits:
|
|
74b6d7d13307 ("net: dsa: realtek: register the MDIO bus under devres")
|
|
5135e96a3dd2 ("net: dsa: don't allocate the slave_mii_bus using devres")
|
|
|
|
mdiobus_free() will panic when called from devm_mdiobus_free() <-
|
|
devres_release_all() <- __device_release_driver(), and that mdiobus was
|
|
not previously unregistered.
|
|
|
|
The Seville VSC9959 switch is a platform device, so the initial set of
|
|
constraints that I thought would cause this (I2C or SPI buses which call
|
|
->remove on ->shutdown) do not apply. But there is one more which
|
|
applies here.
|
|
|
|
If the DSA master itself is on a bus that calls ->remove from ->shutdown
|
|
(like dpaa2-eth, which is on the fsl-mc bus), there is a device link
|
|
between the switch and the DSA master, and device_links_unbind_consumers()
|
|
will unbind the seville switch driver on shutdown.
|
|
|
|
So the same treatment must be applied to all DSA switch drivers, which
|
|
is: either use devres for both the mdiobus allocation and registration,
|
|
or don't use devres at all.
|
|
|
|
The seville driver has a code structure that could accommodate both the
|
|
mdiobus_unregister and mdiobus_free calls, but it has an external
|
|
dependency upon mscc_miim_setup() from mdio-mscc-miim.c, which calls
|
|
devm_mdiobus_alloc_size() on its behalf. So rather than restructuring
|
|
that, and exporting yet one more symbol mscc_miim_teardown(), let's work
|
|
with devres and replace of_mdiobus_register with the devres variant.
|
|
When we use all-devres, we can ensure that devres doesn't free a
|
|
still-registered bus (it either runs both callbacks, or none).(CVE-2022-48814)
|
|
|
|
In the Linux kernel, the following vulnerability has been resolved:
|
|
|
|
nfs: Handle error of rpc_proc_register() in nfs_net_init().
|
|
|
|
syzkaller reported a warning [0] triggered while destroying immature
|
|
netns.
|
|
|
|
rpc_proc_register() was called in init_nfs_fs(), but its error
|
|
has been ignored since at least the initial commit 1da177e4c3f4
|
|
("Linux-2.6.12-rc2").
|
|
|
|
Recently, commit d47151b79e32 ("nfs: expose /proc/net/sunrpc/nfs
|
|
in net namespaces") converted the procfs to per-netns and made
|
|
the problem more visible.
|
|
|
|
Even when rpc_proc_register() fails, nfs_net_init() could succeed,
|
|
and thus nfs_net_exit() will be called while destroying the netns.
|
|
|
|
Then, remove_proc_entry() will be called for non-existing proc
|
|
directory and trigger the warning below.
|
|
|
|
Let's handle the error of rpc_proc_register() properly in nfs_net_init().
|
|
|
|
[0]:
|
|
name 'nfs'
|
|
WARNING: CPU: 1 PID: 1710 at fs/proc/generic.c:711 remove_proc_entry+0x1bb/0x2d0 fs/proc/generic.c:711
|
|
Modules linked in:
|
|
CPU: 1 PID: 1710 Comm: syz-executor.2 Not tainted 6.8.0-12822-gcd51db110a7e #12
|
|
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014
|
|
RIP: 0010:remove_proc_entry+0x1bb/0x2d0 fs/proc/generic.c:711
|
|
Code: 41 5d 41 5e c3 e8 85 09 b5 ff 48 c7 c7 88 58 64 86 e8 09 0e 71 02 e8 74 09 b5 ff 4c 89 e6 48 c7 c7 de 1b 80 84 e8 c5 ad 97 ff <0f> 0b eb b1 e8 5c 09 b5 ff 48 c7 c7 88 58 64 86 e8 e0 0d 71 02 eb
|
|
RSP: 0018:ffffc9000c6d7ce0 EFLAGS: 00010286
|
|
RAX: 0000000000000000 RBX: ffff8880422b8b00 RCX: ffffffff8110503c
|
|
RDX: ffff888030652f00 RSI: ffffffff81105045 RDI: 0000000000000001
|
|
RBP: 0000000000000000 R08: 0000000000000001 R09: 0000000000000000
|
|
R10: 0000000000000001 R11: ffffffff81bb62cb R12: ffffffff84807ffc
|
|
R13: ffff88804ad6fcc0 R14: ffffffff84807ffc R15: ffffffff85741ff8
|
|
FS: 00007f30cfba8640(0000) GS:ffff88807dd00000(0000) knlGS:0000000000000000
|
|
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
|
|
CR2: 00007ff51afe8000 CR3: 000000005a60a005 CR4: 0000000000770ef0
|
|
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
|
|
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
|
|
PKRU: 55555554
|
|
Call Trace:
|
|
<TASK>
|
|
rpc_proc_unregister+0x64/0x70 net/sunrpc/stats.c:310
|
|
nfs_net_exit+0x1c/0x30 fs/nfs/inode.c:2438
|
|
ops_exit_list+0x62/0xb0 net/core/net_namespace.c:170
|
|
setup_net+0x46c/0x660 net/core/net_namespace.c:372
|
|
copy_net_ns+0x244/0x590 net/core/net_namespace.c:505
|
|
create_new_namespaces+0x2ed/0x770 kernel/nsproxy.c:110
|
|
unshare_nsproxy_namespaces+0xae/0x160 kernel/nsproxy.c:228
|
|
ksys_unshare+0x342/0x760 kernel/fork.c:3322
|
|
__do_sys_unshare kernel/fork.c:3393 [inline]
|
|
__se_sys_unshare kernel/fork.c:3391 [inline]
|
|
__x64_sys_unshare+0x1f/0x30 kernel/fork.c:3391
|
|
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
|
|
do_syscall_64+0x4f/0x110 arch/x86/entry/common.c:83
|
|
entry_SYSCALL_64_after_hwframe+0x46/0x4e
|
|
RIP: 0033:0x7f30d0febe5d
|
|
Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 73 9f 1b 00 f7 d8 64 89 01 48
|
|
RSP: 002b:00007f30cfba7cc8 EFLAGS: 00000246 ORIG_RAX: 0000000000000110
|
|
RAX: ffffffffffffffda RBX: 00000000004bbf80 RCX: 00007f30d0febe5d
|
|
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000006c020600
|
|
RBP: 00000000004bbf80 R08: 0000000000000000 R09: 0000000000000000
|
|
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
|
|
R13: 000000000000000b R14: 00007f30d104c530 R15: 0000000000000000
|
|
</TASK>(CVE-2024-36939)
|
|
|
|
In the Linux kernel, the following vulnerability has been resolved:
|
|
|
|
USB: class: cdc-wdm: Fix CPU lockup caused by excessive log messages
|
|
|
|
The syzbot fuzzer found that the interrupt-URB completion callback in
|
|
the cdc-wdm driver was taking too long, and the driver's immediate
|
|
resubmission of interrupt URBs with -EPROTO status combined with the
|
|
dummy-hcd emulation to cause a CPU lockup:
|
|
|
|
cdc_wdm 1-1:1.0: nonzero urb status received: -71
|
|
cdc_wdm 1-1:1.0: wdm_int_callback - 0 bytes
|
|
watchdog: BUG: soft lockup - CPU#0 stuck for 26s! [syz-executor782:6625]
|
|
CPU#0 Utilization every 4s during lockup:
|
|
#1: 98% system, 0% softirq, 3% hardirq, 0% idle
|
|
#2: 98% system, 0% softirq, 3% hardirq, 0% idle
|
|
#3: 98% system, 0% softirq, 3% hardirq, 0% idle
|
|
#4: 98% system, 0% softirq, 3% hardirq, 0% idle
|
|
#5: 98% system, 1% softirq, 3% hardirq, 0% idle
|
|
Modules linked in:
|
|
irq event stamp: 73096
|
|
hardirqs last enabled at (73095): [<ffff80008037bc00>] console_emit_next_record kernel/printk/printk.c:2935 [inline]
|
|
hardirqs last enabled at (73095): [<ffff80008037bc00>] console_flush_all+0x650/0xb74 kernel/printk/printk.c:2994
|
|
hardirqs last disabled at (73096): [<ffff80008af10b00>] __el1_irq arch/arm64/kernel/entry-common.c:533 [inline]
|
|
hardirqs last disabled at (73096): [<ffff80008af10b00>] el1_interrupt+0x24/0x68 arch/arm64/kernel/entry-common.c:551
|
|
softirqs last enabled at (73048): [<ffff8000801ea530>] softirq_handle_end kernel/softirq.c:400 [inline]
|
|
softirqs last enabled at (73048): [<ffff8000801ea530>] handle_softirqs+0xa60/0xc34 kernel/softirq.c:582
|
|
softirqs last disabled at (73043): [<ffff800080020de8>] __do_softirq+0x14/0x20 kernel/softirq.c:588
|
|
CPU: 0 PID: 6625 Comm: syz-executor782 Tainted: G W 6.10.0-rc2-syzkaller-g8867bbd4a056 #0
|
|
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024
|
|
|
|
Testing showed that the problem did not occur if the two error
|
|
messages -- the first two lines above -- were removed; apparently adding
|
|
material to the kernel log takes a surprisingly large amount of time.
|
|
|
|
In any case, the best approach for preventing these lockups and to
|
|
avoid spamming the log with thousands of error messages per second is
|
|
to ratelimit the two dev_err() calls. Therefore we replace them with
|
|
dev_err_ratelimited().(CVE-2024-40904)
|
|
|
|
In the Linux kernel, the following vulnerability has been resolved:
|
|
|
|
ipv6: fix possible race in __fib6_drop_pcpu_from()
|
|
|
|
syzbot found a race in __fib6_drop_pcpu_from() [1]
|
|
|
|
If compiler reads more than once (*ppcpu_rt),
|
|
second read could read NULL, if another cpu clears
|
|
the value in rt6_get_pcpu_route().
|
|
|
|
Add a READ_ONCE() to prevent this race.
|
|
|
|
Also add rcu_read_lock()/rcu_read_unlock() because
|
|
we rely on RCU protection while dereferencing pcpu_rt.
|
|
|
|
[1]
|
|
|
|
Oops: general protection fault, probably for non-canonical address 0xdffffc0000000012: 0000 [#1] PREEMPT SMP KASAN PTI
|
|
KASAN: null-ptr-deref in range [0x0000000000000090-0x0000000000000097]
|
|
CPU: 0 PID: 7543 Comm: kworker/u8:17 Not tainted 6.10.0-rc1-syzkaller-00013-g2bfcfd584ff5 #0
|
|
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024
|
|
Workqueue: netns cleanup_net
|
|
RIP: 0010:__fib6_drop_pcpu_from.part.0+0x10a/0x370 net/ipv6/ip6_fib.c:984
|
|
Code: f8 48 c1 e8 03 80 3c 28 00 0f 85 16 02 00 00 4d 8b 3f 4d 85 ff 74 31 e8 74 a7 fa f7 49 8d bf 90 00 00 00 48 89 f8 48 c1 e8 03 <80> 3c 28 00 0f 85 1e 02 00 00 49 8b 87 90 00 00 00 48 8b 0c 24 48
|
|
RSP: 0018:ffffc900040df070 EFLAGS: 00010206
|
|
RAX: 0000000000000012 RBX: 0000000000000001 RCX: ffffffff89932e16
|
|
RDX: ffff888049dd1e00 RSI: ffffffff89932d7c RDI: 0000000000000091
|
|
RBP: dffffc0000000000 R08: 0000000000000005 R09: 0000000000000007
|
|
R10: 0000000000000001 R11: 0000000000000006 R12: ffff88807fa080b8
|
|
R13: fffffbfff1a9a07d R14: ffffed100ff41022 R15: 0000000000000001
|
|
FS: 0000000000000000(0000) GS:ffff8880b9200000(0000) knlGS:0000000000000000
|
|
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
|
|
CR2: 0000001b32c26000 CR3: 000000005d56e000 CR4: 00000000003526f0
|
|
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
|
|
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
|
|
Call Trace:
|
|
<TASK>
|
|
__fib6_drop_pcpu_from net/ipv6/ip6_fib.c:966 [inline]
|
|
fib6_drop_pcpu_from net/ipv6/ip6_fib.c:1027 [inline]
|
|
fib6_purge_rt+0x7f2/0x9f0 net/ipv6/ip6_fib.c:1038
|
|
fib6_del_route net/ipv6/ip6_fib.c:1998 [inline]
|
|
fib6_del+0xa70/0x17b0 net/ipv6/ip6_fib.c:2043
|
|
fib6_clean_node+0x426/0x5b0 net/ipv6/ip6_fib.c:2205
|
|
fib6_walk_continue+0x44f/0x8d0 net/ipv6/ip6_fib.c:2127
|
|
fib6_walk+0x182/0x370 net/ipv6/ip6_fib.c:2175
|
|
fib6_clean_tree+0xd7/0x120 net/ipv6/ip6_fib.c:2255
|
|
__fib6_clean_all+0x100/0x2d0 net/ipv6/ip6_fib.c:2271
|
|
rt6_sync_down_dev net/ipv6/route.c:4906 [inline]
|
|
rt6_disable_ip+0x7ed/0xa00 net/ipv6/route.c:4911
|
|
addrconf_ifdown.isra.0+0x117/0x1b40 net/ipv6/addrconf.c:3855
|
|
addrconf_notify+0x223/0x19e0 net/ipv6/addrconf.c:3778
|
|
notifier_call_chain+0xb9/0x410 kernel/notifier.c:93
|
|
call_netdevice_notifiers_info+0xbe/0x140 net/core/dev.c:1992
|
|
call_netdevice_notifiers_extack net/core/dev.c:2030 [inline]
|
|
call_netdevice_notifiers net/core/dev.c:2044 [inline]
|
|
dev_close_many+0x333/0x6a0 net/core/dev.c:1585
|
|
unregister_netdevice_many_notify+0x46d/0x19f0 net/core/dev.c:11193
|
|
unregister_netdevice_many net/core/dev.c:11276 [inline]
|
|
default_device_exit_batch+0x85b/0xae0 net/core/dev.c:11759
|
|
ops_exit_list+0x128/0x180 net/core/net_namespace.c:178
|
|
cleanup_net+0x5b7/0xbf0 net/core/net_namespace.c:640
|
|
process_one_work+0x9fb/0x1b60 kernel/workqueue.c:3231
|
|
process_scheduled_works kernel/workqueue.c:3312 [inline]
|
|
worker_thread+0x6c8/0xf70 kernel/workqueue.c:3393
|
|
kthread+0x2c1/0x3a0 kernel/kthread.c:389
|
|
ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:147
|
|
ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244(CVE-2024-40905)</Note>
|
|
<Note Title="Topic" Type="General" Ordinal="4" xml:lang="en">An update for kernel is now available for openEuler-22.03-LTS-SP4.
|
|
|
|
openEuler Security has rated this update as having a security impact of medium. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.</Note>
|
|
<Note Title="Severity" Type="General" Ordinal="5" xml:lang="en">Medium</Note>
|
|
<Note Title="Affected Component" Type="General" Ordinal="6" xml:lang="en">kernel</Note>
|
|
</DocumentNotes>
|
|
<DocumentReferences>
|
|
<Reference Type="Self">
|
|
<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1898</URL>
|
|
</Reference>
|
|
<Reference Type="openEuler CVE">
|
|
<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2022-48814</URL>
|
|
<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-36939</URL>
|
|
<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-40904</URL>
|
|
<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-40905</URL>
|
|
</Reference>
|
|
<Reference Type="Other">
|
|
<URL>https://nvd.nist.gov/vuln/detail/CVE-2022-48814</URL>
|
|
<URL>https://nvd.nist.gov/vuln/detail/CVE-2024-36939</URL>
|
|
<URL>https://nvd.nist.gov/vuln/detail/CVE-2024-40904</URL>
|
|
<URL>https://nvd.nist.gov/vuln/detail/CVE-2024-40905</URL>
|
|
</Reference>
|
|
</DocumentReferences>
|
|
<ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
|
|
<Branch Type="Product Name" Name="openEuler">
|
|
<FullProductName ProductID="openEuler-22.03-LTS-SP4" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">openEuler-22.03-LTS-SP4</FullProductName>
|
|
</Branch>
|
|
<Branch Type="Package Arch" Name="aarch64">
|
|
<FullProductName ProductID="bpftool-5.10.0-220.0.0.119" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">bpftool-5.10.0-220.0.0.119.oe2203sp4.aarch64.rpm</FullProductName>
|
|
<FullProductName ProductID="bpftool-debuginfo-5.10.0-220.0.0.119" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">bpftool-debuginfo-5.10.0-220.0.0.119.oe2203sp4.aarch64.rpm</FullProductName>
|
|
<FullProductName ProductID="kernel-5.10.0-220.0.0.119" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">kernel-5.10.0-220.0.0.119.oe2203sp4.aarch64.rpm</FullProductName>
|
|
<FullProductName ProductID="kernel-debuginfo-5.10.0-220.0.0.119" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">kernel-debuginfo-5.10.0-220.0.0.119.oe2203sp4.aarch64.rpm</FullProductName>
|
|
<FullProductName ProductID="kernel-debugsource-5.10.0-220.0.0.119" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">kernel-debugsource-5.10.0-220.0.0.119.oe2203sp4.aarch64.rpm</FullProductName>
|
|
<FullProductName ProductID="kernel-devel-5.10.0-220.0.0.119" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">kernel-devel-5.10.0-220.0.0.119.oe2203sp4.aarch64.rpm</FullProductName>
|
|
<FullProductName ProductID="kernel-headers-5.10.0-220.0.0.119" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">kernel-headers-5.10.0-220.0.0.119.oe2203sp4.aarch64.rpm</FullProductName>
|
|
<FullProductName ProductID="kernel-source-5.10.0-220.0.0.119" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">kernel-source-5.10.0-220.0.0.119.oe2203sp4.aarch64.rpm</FullProductName>
|
|
<FullProductName ProductID="kernel-tools-5.10.0-220.0.0.119" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">kernel-tools-5.10.0-220.0.0.119.oe2203sp4.aarch64.rpm</FullProductName>
|
|
<FullProductName ProductID="kernel-tools-debuginfo-5.10.0-220.0.0.119" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">kernel-tools-debuginfo-5.10.0-220.0.0.119.oe2203sp4.aarch64.rpm</FullProductName>
|
|
<FullProductName ProductID="kernel-tools-devel-5.10.0-220.0.0.119" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">kernel-tools-devel-5.10.0-220.0.0.119.oe2203sp4.aarch64.rpm</FullProductName>
|
|
<FullProductName ProductID="perf-5.10.0-220.0.0.119" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">perf-5.10.0-220.0.0.119.oe2203sp4.aarch64.rpm</FullProductName>
|
|
<FullProductName ProductID="perf-debuginfo-5.10.0-220.0.0.119" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">perf-debuginfo-5.10.0-220.0.0.119.oe2203sp4.aarch64.rpm</FullProductName>
|
|
<FullProductName ProductID="python3-perf-5.10.0-220.0.0.119" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">python3-perf-5.10.0-220.0.0.119.oe2203sp4.aarch64.rpm</FullProductName>
|
|
<FullProductName ProductID="python3-perf-debuginfo-5.10.0-220.0.0.119" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">python3-perf-debuginfo-5.10.0-220.0.0.119.oe2203sp4.aarch64.rpm</FullProductName>
|
|
</Branch>
|
|
<Branch Type="Package Arch" Name="x86_64">
|
|
<FullProductName ProductID="bpftool-5.10.0-220.0.0.119" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">bpftool-5.10.0-220.0.0.119.oe2203sp4.x86_64.rpm</FullProductName>
|
|
<FullProductName ProductID="bpftool-debuginfo-5.10.0-220.0.0.119" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">bpftool-debuginfo-5.10.0-220.0.0.119.oe2203sp4.x86_64.rpm</FullProductName>
|
|
<FullProductName ProductID="kernel-5.10.0-220.0.0.119" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">kernel-5.10.0-220.0.0.119.oe2203sp4.x86_64.rpm</FullProductName>
|
|
<FullProductName ProductID="kernel-debuginfo-5.10.0-220.0.0.119" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">kernel-debuginfo-5.10.0-220.0.0.119.oe2203sp4.x86_64.rpm</FullProductName>
|
|
<FullProductName ProductID="kernel-debugsource-5.10.0-220.0.0.119" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">kernel-debugsource-5.10.0-220.0.0.119.oe2203sp4.x86_64.rpm</FullProductName>
|
|
<FullProductName ProductID="kernel-devel-5.10.0-220.0.0.119" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">kernel-devel-5.10.0-220.0.0.119.oe2203sp4.x86_64.rpm</FullProductName>
|
|
<FullProductName ProductID="kernel-headers-5.10.0-220.0.0.119" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">kernel-headers-5.10.0-220.0.0.119.oe2203sp4.x86_64.rpm</FullProductName>
|
|
<FullProductName ProductID="kernel-source-5.10.0-220.0.0.119" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">kernel-source-5.10.0-220.0.0.119.oe2203sp4.x86_64.rpm</FullProductName>
|
|
<FullProductName ProductID="kernel-tools-5.10.0-220.0.0.119" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">kernel-tools-5.10.0-220.0.0.119.oe2203sp4.x86_64.rpm</FullProductName>
|
|
<FullProductName ProductID="kernel-tools-debuginfo-5.10.0-220.0.0.119" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">kernel-tools-debuginfo-5.10.0-220.0.0.119.oe2203sp4.x86_64.rpm</FullProductName>
|
|
<FullProductName ProductID="kernel-tools-devel-5.10.0-220.0.0.119" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">kernel-tools-devel-5.10.0-220.0.0.119.oe2203sp4.x86_64.rpm</FullProductName>
|
|
<FullProductName ProductID="perf-5.10.0-220.0.0.119" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">perf-5.10.0-220.0.0.119.oe2203sp4.x86_64.rpm</FullProductName>
|
|
<FullProductName ProductID="perf-debuginfo-5.10.0-220.0.0.119" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">perf-debuginfo-5.10.0-220.0.0.119.oe2203sp4.x86_64.rpm</FullProductName>
|
|
<FullProductName ProductID="python3-perf-5.10.0-220.0.0.119" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">python3-perf-5.10.0-220.0.0.119.oe2203sp4.x86_64.rpm</FullProductName>
|
|
<FullProductName ProductID="python3-perf-debuginfo-5.10.0-220.0.0.119" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">python3-perf-debuginfo-5.10.0-220.0.0.119.oe2203sp4.x86_64.rpm</FullProductName>
|
|
</Branch>
|
|
<Branch Type="Package Arch" Name="src">
|
|
<FullProductName ProductID="kernel-5.10.0-220.0.0.119" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">kernel-5.10.0-220.0.0.119.oe2203sp4.src.rpm</FullProductName>
|
|
</Branch>
|
|
</ProductTree>
|
|
<Vulnerability Ordinal="1" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
|
|
<Notes>
|
|
<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:
|
|
|
|
net: dsa: seville: register the mdiobus under devres
|
|
|
|
As explained in commits:
|
|
74b6d7d13307 ("net: dsa: realtek: register the MDIO bus under devres")
|
|
5135e96a3dd2 ("net: dsa: don't allocate the slave_mii_bus using devres")
|
|
|
|
mdiobus_free() will panic when called from devm_mdiobus_free() <-
|
|
devres_release_all() <- __device_release_driver(), and that mdiobus was
|
|
not previously unregistered.
|
|
|
|
The Seville VSC9959 switch is a platform device, so the initial set of
|
|
constraints that I thought would cause this (I2C or SPI buses which call
|
|
->remove on ->shutdown) do not apply. But there is one more which
|
|
applies here.
|
|
|
|
If the DSA master itself is on a bus that calls ->remove from ->shutdown
|
|
(like dpaa2-eth, which is on the fsl-mc bus), there is a device link
|
|
between the switch and the DSA master, and device_links_unbind_consumers()
|
|
will unbind the seville switch driver on shutdown.
|
|
|
|
So the same treatment must be applied to all DSA switch drivers, which
|
|
is: either use devres for both the mdiobus allocation and registration,
|
|
or don't use devres at all.
|
|
|
|
The seville driver has a code structure that could accommodate both the
|
|
mdiobus_unregister and mdiobus_free calls, but it has an external
|
|
dependency upon mscc_miim_setup() from mdio-mscc-miim.c, which calls
|
|
devm_mdiobus_alloc_size() on its behalf. So rather than restructuring
|
|
that, and exporting yet one more symbol mscc_miim_teardown(), let's work
|
|
with devres and replace of_mdiobus_register with the devres variant.
|
|
When we use all-devres, we can ensure that devres doesn't free a
|
|
still-registered bus (it either runs both callbacks, or none).</Note>
|
|
</Notes>
|
|
<ReleaseDate>2024-07-26</ReleaseDate>
|
|
<CVE>CVE-2022-48814</CVE>
|
|
<ProductStatuses>
|
|
<Status Type="Fixed">
|
|
<ProductID>openEuler-22.03-LTS-SP4</ProductID>
|
|
</Status>
|
|
</ProductStatuses>
|
|
<Threats>
|
|
<Threat Type="Impact">
|
|
<Description>Medium</Description>
|
|
</Threat>
|
|
</Threats>
|
|
<CVSSScoreSets>
|
|
<ScoreSet>
|
|
<BaseScore>5.5</BaseScore>
|
|
<Vector>AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</Vector>
|
|
</ScoreSet>
|
|
</CVSSScoreSets>
|
|
<Remediations>
|
|
<Remediation Type="Vendor Fix">
|
|
<Description>kernel security update</Description>
|
|
<DATE>2024-07-26</DATE>
|
|
<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1898</URL>
|
|
</Remediation>
|
|
</Remediations>
|
|
</Vulnerability>
|
|
<Vulnerability Ordinal="2" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
|
|
<Notes>
|
|
<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:
|
|
|
|
nfs: Handle error of rpc_proc_register() in nfs_net_init().
|
|
|
|
syzkaller reported a warning [0] triggered while destroying immature
|
|
netns.
|
|
|
|
rpc_proc_register() was called in init_nfs_fs(), but its error
|
|
has been ignored since at least the initial commit 1da177e4c3f4
|
|
("Linux-2.6.12-rc2").
|
|
|
|
Recently, commit d47151b79e32 ("nfs: expose /proc/net/sunrpc/nfs
|
|
in net namespaces") converted the procfs to per-netns and made
|
|
the problem more visible.
|
|
|
|
Even when rpc_proc_register() fails, nfs_net_init() could succeed,
|
|
and thus nfs_net_exit() will be called while destroying the netns.
|
|
|
|
Then, remove_proc_entry() will be called for non-existing proc
|
|
directory and trigger the warning below.
|
|
|
|
Let's handle the error of rpc_proc_register() properly in nfs_net_init().
|
|
|
|
[0]:
|
|
name 'nfs'
|
|
WARNING: CPU: 1 PID: 1710 at fs/proc/generic.c:711 remove_proc_entry+0x1bb/0x2d0 fs/proc/generic.c:711
|
|
Modules linked in:
|
|
CPU: 1 PID: 1710 Comm: syz-executor.2 Not tainted 6.8.0-12822-gcd51db110a7e #12
|
|
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014
|
|
RIP: 0010:remove_proc_entry+0x1bb/0x2d0 fs/proc/generic.c:711
|
|
Code: 41 5d 41 5e c3 e8 85 09 b5 ff 48 c7 c7 88 58 64 86 e8 09 0e 71 02 e8 74 09 b5 ff 4c 89 e6 48 c7 c7 de 1b 80 84 e8 c5 ad 97 ff <0f> 0b eb b1 e8 5c 09 b5 ff 48 c7 c7 88 58 64 86 e8 e0 0d 71 02 eb
|
|
RSP: 0018:ffffc9000c6d7ce0 EFLAGS: 00010286
|
|
RAX: 0000000000000000 RBX: ffff8880422b8b00 RCX: ffffffff8110503c
|
|
RDX: ffff888030652f00 RSI: ffffffff81105045 RDI: 0000000000000001
|
|
RBP: 0000000000000000 R08: 0000000000000001 R09: 0000000000000000
|
|
R10: 0000000000000001 R11: ffffffff81bb62cb R12: ffffffff84807ffc
|
|
R13: ffff88804ad6fcc0 R14: ffffffff84807ffc R15: ffffffff85741ff8
|
|
FS: 00007f30cfba8640(0000) GS:ffff88807dd00000(0000) knlGS:0000000000000000
|
|
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
|
|
CR2: 00007ff51afe8000 CR3: 000000005a60a005 CR4: 0000000000770ef0
|
|
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
|
|
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
|
|
PKRU: 55555554
|
|
Call Trace:
|
|
<TASK>
|
|
rpc_proc_unregister+0x64/0x70 net/sunrpc/stats.c:310
|
|
nfs_net_exit+0x1c/0x30 fs/nfs/inode.c:2438
|
|
ops_exit_list+0x62/0xb0 net/core/net_namespace.c:170
|
|
setup_net+0x46c/0x660 net/core/net_namespace.c:372
|
|
copy_net_ns+0x244/0x590 net/core/net_namespace.c:505
|
|
create_new_namespaces+0x2ed/0x770 kernel/nsproxy.c:110
|
|
unshare_nsproxy_namespaces+0xae/0x160 kernel/nsproxy.c:228
|
|
ksys_unshare+0x342/0x760 kernel/fork.c:3322
|
|
__do_sys_unshare kernel/fork.c:3393 [inline]
|
|
__se_sys_unshare kernel/fork.c:3391 [inline]
|
|
__x64_sys_unshare+0x1f/0x30 kernel/fork.c:3391
|
|
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
|
|
do_syscall_64+0x4f/0x110 arch/x86/entry/common.c:83
|
|
entry_SYSCALL_64_after_hwframe+0x46/0x4e
|
|
RIP: 0033:0x7f30d0febe5d
|
|
Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 73 9f 1b 00 f7 d8 64 89 01 48
|
|
RSP: 002b:00007f30cfba7cc8 EFLAGS: 00000246 ORIG_RAX: 0000000000000110
|
|
RAX: ffffffffffffffda RBX: 00000000004bbf80 RCX: 00007f30d0febe5d
|
|
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000006c020600
|
|
RBP: 00000000004bbf80 R08: 0000000000000000 R09: 0000000000000000
|
|
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
|
|
R13: 000000000000000b R14: 00007f30d104c530 R15: 0000000000000000
|
|
</TASK></Note>
|
|
</Notes>
|
|
<ReleaseDate>2024-07-26</ReleaseDate>
|
|
<CVE>CVE-2024-36939</CVE>
|
|
<ProductStatuses>
|
|
<Status Type="Fixed">
|
|
<ProductID>openEuler-22.03-LTS-SP4</ProductID>
|
|
</Status>
|
|
</ProductStatuses>
|
|
<Threats>
|
|
<Threat Type="Impact">
|
|
<Description>Medium</Description>
|
|
</Threat>
|
|
</Threats>
|
|
<CVSSScoreSets>
|
|
<ScoreSet>
|
|
<BaseScore>4.6</BaseScore>
|
|
<Vector>AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L</Vector>
|
|
</ScoreSet>
|
|
</CVSSScoreSets>
|
|
<Remediations>
|
|
<Remediation Type="Vendor Fix">
|
|
<Description>kernel security update</Description>
|
|
<DATE>2024-07-26</DATE>
|
|
<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1898</URL>
|
|
</Remediation>
|
|
</Remediations>
|
|
</Vulnerability>
|
|
<Vulnerability Ordinal="3" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
|
|
<Notes>
|
|
<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:
|
|
|
|
USB: class: cdc-wdm: Fix CPU lockup caused by excessive log messages
|
|
|
|
The syzbot fuzzer found that the interrupt-URB completion callback in
|
|
the cdc-wdm driver was taking too long, and the driver's immediate
|
|
resubmission of interrupt URBs with -EPROTO status combined with the
|
|
dummy-hcd emulation to cause a CPU lockup:
|
|
|
|
cdc_wdm 1-1:1.0: nonzero urb status received: -71
|
|
cdc_wdm 1-1:1.0: wdm_int_callback - 0 bytes
|
|
watchdog: BUG: soft lockup - CPU#0 stuck for 26s! [syz-executor782:6625]
|
|
CPU#0 Utilization every 4s during lockup:
|
|
#1: 98% system, 0% softirq, 3% hardirq, 0% idle
|
|
#2: 98% system, 0% softirq, 3% hardirq, 0% idle
|
|
#3: 98% system, 0% softirq, 3% hardirq, 0% idle
|
|
#4: 98% system, 0% softirq, 3% hardirq, 0% idle
|
|
#5: 98% system, 1% softirq, 3% hardirq, 0% idle
|
|
Modules linked in:
|
|
irq event stamp: 73096
|
|
hardirqs last enabled at (73095): [<ffff80008037bc00>] console_emit_next_record kernel/printk/printk.c:2935 [inline]
|
|
hardirqs last enabled at (73095): [<ffff80008037bc00>] console_flush_all+0x650/0xb74 kernel/printk/printk.c:2994
|
|
hardirqs last disabled at (73096): [<ffff80008af10b00>] __el1_irq arch/arm64/kernel/entry-common.c:533 [inline]
|
|
hardirqs last disabled at (73096): [<ffff80008af10b00>] el1_interrupt+0x24/0x68 arch/arm64/kernel/entry-common.c:551
|
|
softirqs last enabled at (73048): [<ffff8000801ea530>] softirq_handle_end kernel/softirq.c:400 [inline]
|
|
softirqs last enabled at (73048): [<ffff8000801ea530>] handle_softirqs+0xa60/0xc34 kernel/softirq.c:582
|
|
softirqs last disabled at (73043): [<ffff800080020de8>] __do_softirq+0x14/0x20 kernel/softirq.c:588
|
|
CPU: 0 PID: 6625 Comm: syz-executor782 Tainted: G W 6.10.0-rc2-syzkaller-g8867bbd4a056 #0
|
|
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024
|
|
|
|
Testing showed that the problem did not occur if the two error
|
|
messages -- the first two lines above -- were removed; apparently adding
|
|
material to the kernel log takes a surprisingly large amount of time.
|
|
|
|
In any case, the best approach for preventing these lockups and to
|
|
avoid spamming the log with thousands of error messages per second is
|
|
to ratelimit the two dev_err() calls. Therefore we replace them with
|
|
dev_err_ratelimited().</Note>
|
|
</Notes>
|
|
<ReleaseDate>2024-07-26</ReleaseDate>
|
|
<CVE>CVE-2024-40904</CVE>
|
|
<ProductStatuses>
|
|
<Status Type="Fixed">
|
|
<ProductID>openEuler-22.03-LTS-SP4</ProductID>
|
|
</Status>
|
|
</ProductStatuses>
|
|
<Threats>
|
|
<Threat Type="Impact">
|
|
<Description>Medium</Description>
|
|
</Threat>
|
|
</Threats>
|
|
<CVSSScoreSets>
|
|
<ScoreSet>
|
|
<BaseScore>5.5</BaseScore>
|
|
<Vector>AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</Vector>
|
|
</ScoreSet>
|
|
</CVSSScoreSets>
|
|
<Remediations>
|
|
<Remediation Type="Vendor Fix">
|
|
<Description>kernel security update</Description>
|
|
<DATE>2024-07-26</DATE>
|
|
<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1898</URL>
|
|
</Remediation>
|
|
</Remediations>
|
|
</Vulnerability>
|
|
<Vulnerability Ordinal="4" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
|
|
<Notes>
|
|
<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:
|
|
|
|
ipv6: fix possible race in __fib6_drop_pcpu_from()
|
|
|
|
syzbot found a race in __fib6_drop_pcpu_from() [1]
|
|
|
|
If compiler reads more than once (*ppcpu_rt),
|
|
second read could read NULL, if another cpu clears
|
|
the value in rt6_get_pcpu_route().
|
|
|
|
Add a READ_ONCE() to prevent this race.
|
|
|
|
Also add rcu_read_lock()/rcu_read_unlock() because
|
|
we rely on RCU protection while dereferencing pcpu_rt.
|
|
|
|
[1]
|
|
|
|
Oops: general protection fault, probably for non-canonical address 0xdffffc0000000012: 0000 [#1] PREEMPT SMP KASAN PTI
|
|
KASAN: null-ptr-deref in range [0x0000000000000090-0x0000000000000097]
|
|
CPU: 0 PID: 7543 Comm: kworker/u8:17 Not tainted 6.10.0-rc1-syzkaller-00013-g2bfcfd584ff5 #0
|
|
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024
|
|
Workqueue: netns cleanup_net
|
|
RIP: 0010:__fib6_drop_pcpu_from.part.0+0x10a/0x370 net/ipv6/ip6_fib.c:984
|
|
Code: f8 48 c1 e8 03 80 3c 28 00 0f 85 16 02 00 00 4d 8b 3f 4d 85 ff 74 31 e8 74 a7 fa f7 49 8d bf 90 00 00 00 48 89 f8 48 c1 e8 03 <80> 3c 28 00 0f 85 1e 02 00 00 49 8b 87 90 00 00 00 48 8b 0c 24 48
|
|
RSP: 0018:ffffc900040df070 EFLAGS: 00010206
|
|
RAX: 0000000000000012 RBX: 0000000000000001 RCX: ffffffff89932e16
|
|
RDX: ffff888049dd1e00 RSI: ffffffff89932d7c RDI: 0000000000000091
|
|
RBP: dffffc0000000000 R08: 0000000000000005 R09: 0000000000000007
|
|
R10: 0000000000000001 R11: 0000000000000006 R12: ffff88807fa080b8
|
|
R13: fffffbfff1a9a07d R14: ffffed100ff41022 R15: 0000000000000001
|
|
FS: 0000000000000000(0000) GS:ffff8880b9200000(0000) knlGS:0000000000000000
|
|
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
|
|
CR2: 0000001b32c26000 CR3: 000000005d56e000 CR4: 00000000003526f0
|
|
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
|
|
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
|
|
Call Trace:
|
|
<TASK>
|
|
__fib6_drop_pcpu_from net/ipv6/ip6_fib.c:966 [inline]
|
|
fib6_drop_pcpu_from net/ipv6/ip6_fib.c:1027 [inline]
|
|
fib6_purge_rt+0x7f2/0x9f0 net/ipv6/ip6_fib.c:1038
|
|
fib6_del_route net/ipv6/ip6_fib.c:1998 [inline]
|
|
fib6_del+0xa70/0x17b0 net/ipv6/ip6_fib.c:2043
|
|
fib6_clean_node+0x426/0x5b0 net/ipv6/ip6_fib.c:2205
|
|
fib6_walk_continue+0x44f/0x8d0 net/ipv6/ip6_fib.c:2127
|
|
fib6_walk+0x182/0x370 net/ipv6/ip6_fib.c:2175
|
|
fib6_clean_tree+0xd7/0x120 net/ipv6/ip6_fib.c:2255
|
|
__fib6_clean_all+0x100/0x2d0 net/ipv6/ip6_fib.c:2271
|
|
rt6_sync_down_dev net/ipv6/route.c:4906 [inline]
|
|
rt6_disable_ip+0x7ed/0xa00 net/ipv6/route.c:4911
|
|
addrconf_ifdown.isra.0+0x117/0x1b40 net/ipv6/addrconf.c:3855
|
|
addrconf_notify+0x223/0x19e0 net/ipv6/addrconf.c:3778
|
|
notifier_call_chain+0xb9/0x410 kernel/notifier.c:93
|
|
call_netdevice_notifiers_info+0xbe/0x140 net/core/dev.c:1992
|
|
call_netdevice_notifiers_extack net/core/dev.c:2030 [inline]
|
|
call_netdevice_notifiers net/core/dev.c:2044 [inline]
|
|
dev_close_many+0x333/0x6a0 net/core/dev.c:1585
|
|
unregister_netdevice_many_notify+0x46d/0x19f0 net/core/dev.c:11193
|
|
unregister_netdevice_many net/core/dev.c:11276 [inline]
|
|
default_device_exit_batch+0x85b/0xae0 net/core/dev.c:11759
|
|
ops_exit_list+0x128/0x180 net/core/net_namespace.c:178
|
|
cleanup_net+0x5b7/0xbf0 net/core/net_namespace.c:640
|
|
process_one_work+0x9fb/0x1b60 kernel/workqueue.c:3231
|
|
process_scheduled_works kernel/workqueue.c:3312 [inline]
|
|
worker_thread+0x6c8/0xf70 kernel/workqueue.c:3393
|
|
kthread+0x2c1/0x3a0 kernel/kthread.c:389
|
|
ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:147
|
|
ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244</Note>
|
|
</Notes>
|
|
<ReleaseDate>2024-07-26</ReleaseDate>
|
|
<CVE>CVE-2024-40905</CVE>
|
|
<ProductStatuses>
|
|
<Status Type="Fixed">
|
|
<ProductID>openEuler-22.03-LTS-SP4</ProductID>
|
|
</Status>
|
|
</ProductStatuses>
|
|
<Threats>
|
|
<Threat Type="Impact">
|
|
<Description>None</Description>
|
|
</Threat>
|
|
</Threats>
|
|
<CVSSScoreSets>
|
|
<ScoreSet>
|
|
<BaseScore>5.5</BaseScore>
|
|
<Vector>AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</Vector>
|
|
</ScoreSet>
|
|
</CVSSScoreSets>
|
|
<Remediations>
|
|
<Remediation Type="Vendor Fix">
|
|
<Description>kernel security update</Description>
|
|
<DATE>2024-07-26</DATE>
|
|
<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1898</URL>
|
|
</Remediation>
|
|
</Remediations>
|
|
</Vulnerability>
|
|
</cvrfdoc> |