Skip to content

Conversation

@shreeya-patel98
Copy link
Collaborator

@shreeya-patel98 shreeya-patel98 commented Dec 9, 2025

Summary

This PR has been automatically created after successful completion of all CI stages.

Commit Message(s)

Bluetooth: L2CAP: Fix user-after-free

jira VULN-155532
cve CVE-2022-50386
commit-author Luiz Augusto von Dentz <luiz.von.dentz@intel.com>
commit 35fcbc4243aad7e7d020b7c1dfb14bb888b20a4f
wifi: mac80211: check S1G action frame size

jira VULN-154635
cve CVE-2023-53257
commit-author Johannes Berg <johannes.berg@intel.com>
commit 19e4a47ee74718a22e963e8a647c8c3bfe8bb05c
Bluetooth: L2CAP: Fix use-after-free in l2cap_disconnect_{req,rsp}

jira VULN-168834
cve CVE-2023-53827
commit-author Luiz Augusto von Dentz <luiz.von.dentz@intel.com>
commit a2a9339e1c9deb7e1e079e12e27a0265aea8421a
Bluetooth: Fix l2cap_disconnect_req deadlock

jira VULN-155001
cve-pre CVE-2023-53297
commit-author Ying Hsu <yinghsu@chromium.org>
commit 02c5ea5246a44d6ffde0fddebfc1d56188052976
Bluetooth: L2CAP: fix "bad unlock balance" in l2cap_disconnect_rsp

jira VULN-155001
cve CVE-2023-53297
commit-author Min Li <lm0963hack@gmail.com>
commit 25e97f7b1866e6b8503be349eeea44bb52d661ce
ip6mr: Fix skb_under_panic in ip6mr_cache_report()

jira VULN-155441
cve CVE-2023-53365
commit-author Yue Haibing <yuehaibing@huawei.com>
commit 30e0191b16e8a58e4620fa3e2839ddc7b9d4281c
nbd: fix incomplete validation of ioctl arg

jira VULN-157131
cve CVE-2023-53513
commit-author Zhong Jinghua <zhongjinghua@huawei.com>
commit 55793ea54d77719a071b1ccc05a05056e3b5e009
ALSA: usb-audio: Validate UAC3 power domain descriptors, too

jira VULN-136372
cve CVE-2025-38729
commit-author Takashi Iwai <tiwai@suse.de>
commit d832ccbc301fbd9e5a1d691bdcf461cdb514595f
ipv6: sr: Fix MAC comparison to be constant-time

jira VULN-136544
cve CVE-2025-39702
commit-author Eric Biggers <ebiggers@kernel.org>
commit a458b2902115b26a25d67393b12ddd57d1216aaa
ALSA: usb-audio: Validate UAC3 cluster segment descriptors

jira VULN-152936
cve CVE-2025-39757
commit-author Takashi Iwai <tiwai@suse.de>
commit ecfd41166b72b67d3bdeb88d224ff445f6163869
ALSA: usb-audio: Fix size validation in convert_chmap_v3()

jira VULN-152936
cve-bf CVE-2025-39757
commit-author Dan Carpenter <dan.carpenter@linaro.org>
commit 89f0addeee3cb2dc49837599330ed9c4612f05b0
efivarfs: Fix slab-out-of-bounds in efivarfs_d_compare

jira VULN-155161
cve CVE-2025-39817
commit-author Li Nan <linan122@huawei.com>
commit a6358f8cf64850f3f27857b8ed8c1b08cfc4685c

Test Results

✅ Build Stage

✅ Boot Verification

✅ Kernel Selftests

⚠️ Test Comparison

  • Status: Skipped
  • Reason: No baseline test results available from ciqlts9_2
  • Note: Manual review recommended to ensure no regressions

🤖 This PR was automatically generated by GitHub Actions
Run ID: 20104479743

jira VULN-155532
cve CVE-2022-50386
commit-author Luiz Augusto von Dentz <luiz.von.dentz@intel.com>
commit 35fcbc4

This uses l2cap_chan_hold_unless_zero() after calling
__l2cap_get_chan_blah() to prevent the following trace:

Bluetooth: l2cap_core.c:static void l2cap_chan_destroy(struct kref
*kref)
Bluetooth: chan 0000000023c4974d
Bluetooth: parent 00000000ae861c08
==================================================================
BUG: KASAN: use-after-free in __mutex_waiter_is_first
kernel/locking/mutex.c:191 [inline]
BUG: KASAN: use-after-free in __mutex_lock_common
kernel/locking/mutex.c:671 [inline]
BUG: KASAN: use-after-free in __mutex_lock+0x278/0x400
kernel/locking/mutex.c:729
Read of size 8 at addr ffff888006a49b08 by task kworker/u3:2/389

Link: https://lore.kernel.org/lkml/20220622082716.478486-1-lee.jones@linaro.org
	Signed-off-by: Luiz Augusto von Dentz <luiz.von.dentz@intel.com>
	Signed-off-by: Sungwoo Kim <iam@sung-woo.kim>
(cherry picked from commit 35fcbc4)
	Signed-off-by: Brett Mastbergen <bmastbergen@ciq.com>
jira VULN-154635
cve CVE-2023-53257
commit-author Johannes Berg <johannes.berg@intel.com>
commit 19e4a47

Before checking the action code, check that it even
exists in the frame.

	Reported-by: syzbot+be9c824e6f269d608288@syzkaller.appspotmail.com
	Signed-off-by: Johannes Berg <johannes.berg@intel.com>
(cherry picked from commit 19e4a47)
	Signed-off-by: Brett Mastbergen <bmastbergen@ciq.com>
@github-actions
Copy link

github-actions bot commented Dec 9, 2025

🔍 Interdiff Analysis

  • ⚠️ PR commit ddf277f66f2 (Bluetooth: L2CAP: fix "bad unlock balance" in l2cap_disconnect_rsp) → upstream 25e97f7b1866
    Differences found:
diff -u b/net/bluetooth/l2cap_core.c b/net/bluetooth/l2cap_core.c
--- b/net/bluetooth/l2cap_core.c
+++ b/net/bluetooth/l2cap_core.c
@@ -4680,5 +4680,5 @@
 
-	chan = l2cap_get_chan_by_scid(conn, scid);
+	chan = __l2cap_get_chan_by_scid(conn, scid);
 	if (!chan) {
 		return 0;
 	}
  • ⚠️ PR commit 1d1cc24105b (ALSA: usb-audio: Validate UAC3 cluster segment descriptors) → upstream ecfd41166b72
    Differences found:
diff -u b/sound/usb/stream.c b/sound/usb/stream.c
--- b/sound/usb/stream.c
+++ b/sound/usb/stream.c
@@ -357,6 +362,9 @@ INTERDIFF: rejected hunk from patch1, cannot diff context
 			struct uac3_cluster_information_segment_descriptor *is = p;
 			unsigned char map;
 
+			if (cs_len < sizeof(*is))
+				break;
+
 			/*
 			 * TODO: this conversion is not complete, update it
 			 * after adding UAC3 values to asound.h
@@ -360,6 +365,9 @@ INTERDIFF: rejected hunk from patch2, cannot diff context
 			struct uac3_cluster_information_segment_descriptor *is = p;
 			unsigned char map;
 
+			if (cs_len < sizeof(*is))
+				break;
+
 			/*
 			 * TODO: this conversion is not complete, update it
 			 * after adding UAC3 values to asound.h

This is an automated interdiff check for backported commits.

@bmastbergen bmastbergen requested a review from a team December 9, 2025 17:48
@shreeya-patel98
Copy link
Collaborator Author

When I worked on fips-9.2, following were the prerequisite for Bluetooth: L2CAP: fix "bad unlock balance" in l2cap_disconnect_rsp


    Bluetooth: L2CAP: fix "bad unlock balance" in l2cap_disconnect_rsp
    
    jira VULN-155003
    cve CVE-2023-53297
    commit-author Min Li <lm0963hack@gmail.com>
    commit 25e97f7b1866e6b8503be349eeea44bb52d661ce
    Bluetooth: Fix l2cap_disconnect_req deadlock
    
    Bluetooth: Fix l2cap_disconnect_req deadlock

    jira VULN-155003
    cve-pre CVE-2023-53297
    commit-author Ying Hsu <yinghsu@chromium.org>
    commit 02c5ea5246a44d6ffde0fddebfc1d56188052976
    

    Bluetooth: L2CAP: Fix use-after-free in l2cap_disconnect_{req,rsp}
    
    jira VULN-155003
    cve-pre CVE-2023-53297
    commit-author Luiz Augusto von Dentz <luiz.von.dentz@intel.com>
    commit a2a9339e1c9deb7e1e079e12e27a0265aea8421a
    

Are these patches already present for 9.2 or we don't require them here?

@bmastbergen
Copy link
Collaborator

When I worked on fips-9.2, following were the prerequisite for Bluetooth: L2CAP: fix "bad unlock balance" in l2cap_disconnect_rsp


    Bluetooth: L2CAP: fix "bad unlock balance" in l2cap_disconnect_rsp
    
    jira VULN-155003
    cve CVE-2023-53297
    commit-author Min Li <lm0963hack@gmail.com>
    commit 25e97f7b1866e6b8503be349eeea44bb52d661ce
    Bluetooth: Fix l2cap_disconnect_req deadlock
    
    Bluetooth: Fix l2cap_disconnect_req deadlock

    jira VULN-155003
    cve-pre CVE-2023-53297
    commit-author Ying Hsu <yinghsu@chromium.org>
    commit 02c5ea5246a44d6ffde0fddebfc1d56188052976
    

    Bluetooth: L2CAP: Fix use-after-free in l2cap_disconnect_{req,rsp}
    
    jira VULN-155003
    cve-pre CVE-2023-53297
    commit-author Luiz Augusto von Dentz <luiz.von.dentz@intel.com>
    commit a2a9339e1c9deb7e1e079e12e27a0265aea8421a
    

Are these patches already present for 9.2 or we don't require them here?

No, they are not present and I think we want them here. Will add. Good catch!

@bmastbergen bmastbergen force-pushed the {bmastbergen}_ciqlts9_2 branch from a69ec6f to d1e3e45 Compare December 10, 2025 15:31
@github-actions
Copy link

🔍 Upstream Linux Kernel Commit Check

  • ⚠️ PR commit 28f40b05b92 (Bluetooth: L2CAP: Fix use-after-free in l2cap_disconnect_{req,rsp}) does not reference a CVE but
    upstream commit a2a9339e1c9d is associated with CVE-2023-53827

This is an automated message from the kernel commit checker workflow.

@github-actions
Copy link

🔍 Interdiff Analysis

  • ⚠️ PR commit 5dfa54ae461 (ALSA: usb-audio: Validate UAC3 cluster segment descriptors) → upstream ecfd41166b72
    Differences found:
diff -u b/sound/usb/stream.c b/sound/usb/stream.c
--- b/sound/usb/stream.c
+++ b/sound/usb/stream.c
@@ -357,6 +362,9 @@ INTERDIFF: rejected hunk from patch1, cannot diff context
 			struct uac3_cluster_information_segment_descriptor *is = p;
 			unsigned char map;
 
+			if (cs_len < sizeof(*is))
+				break;
+
 			/*
 			 * TODO: this conversion is not complete, update it
 			 * after adding UAC3 values to asound.h
@@ -360,6 +365,9 @@ INTERDIFF: rejected hunk from patch2, cannot diff context
 			struct uac3_cluster_information_segment_descriptor *is = p;
 			unsigned char map;
 
+			if (cs_len < sizeof(*is))
+				break;
+
 			/*
 			 * TODO: this conversion is not complete, update it
 			 * after adding UAC3 values to asound.h

This is an automated interdiff check for backported commits.

jira VULN-168834
cve CVE-2023-53827
commit-author Luiz Augusto von Dentz <luiz.von.dentz@intel.com>
commit a2a9339

Similar to commit d0be834 ("Bluetooth: L2CAP: Fix use-after-free
caused by l2cap_chan_put"), just use l2cap_chan_hold_unless_zero to
prevent referencing a channel that is about to be destroyed.

	Cc: stable@kernel.org
	Signed-off-by: Luiz Augusto von Dentz <luiz.von.dentz@intel.com>
	Signed-off-by: Min Li <lm0963hack@gmail.com>
(cherry picked from commit a2a9339)
	Signed-off-by: Brett Mastbergen <bmastbergen@ciq.com>
jira VULN-155001
cve-pre CVE-2023-53297
commit-author Ying Hsu <yinghsu@chromium.org>
commit 02c5ea5

L2CAP assumes that the locks conn->chan_lock and chan->lock are
acquired in the order conn->chan_lock, chan->lock to avoid
potential deadlock.
For example, l2sock_shutdown acquires these locks in the order:
  mutex_lock(&conn->chan_lock)
  l2cap_chan_lock(chan)

However, l2cap_disconnect_req acquires chan->lock in
l2cap_get_chan_by_scid first and then acquires conn->chan_lock
before calling l2cap_chan_del. This means that these locks are
acquired in unexpected order, which leads to potential deadlock:
  l2cap_chan_lock(c)
  mutex_lock(&conn->chan_lock)

This patch releases chan->lock before acquiring the conn_chan_lock
to avoid the potential deadlock.

Fixes: a2a9339 ("Bluetooth: L2CAP: Fix use-after-free in l2cap_disconnect_{req,rsp}")
	Signed-off-by: Ying Hsu <yinghsu@chromium.org>
	Signed-off-by: Luiz Augusto von Dentz <luiz.von.dentz@intel.com>
(cherry picked from commit 02c5ea5)
	Signed-off-by: Brett Mastbergen <bmastbergen@ciq.com>
jira VULN-155001
cve CVE-2023-53297
commit-author Min Li <lm0963hack@gmail.com>
commit 25e97f7

conn->chan_lock isn't acquired before l2cap_get_chan_by_scid,
if l2cap_get_chan_by_scid returns NULL, then 'bad unlock balance'
is triggered.

	Reported-by: syzbot+9519d6b5b79cf7787cf3@syzkaller.appspotmail.com
Link: https://lore.kernel.org/all/000000000000894f5f05f95e9f4d@google.com/
	Signed-off-by: Min Li <lm0963hack@gmail.com>
	Signed-off-by: Luiz Augusto von Dentz <luiz.von.dentz@intel.com>
(cherry picked from commit 25e97f7)
	Signed-off-by: Brett Mastbergen <bmastbergen@ciq.com>
jira VULN-155441
cve CVE-2023-53365
commit-author Yue Haibing <yuehaibing@huawei.com>
commit 30e0191

skbuff: skb_under_panic: text:ffffffff88771f69 len:56 put:-4
 head:ffff88805f86a800 data:ffff887f5f86a850 tail:0x88 end:0x2c0 dev:pim6reg
 ------------[ cut here ]------------
 kernel BUG at net/core/skbuff.c:192!
 invalid opcode: 0000 [#1] PREEMPT SMP KASAN
 CPU: 2 PID: 22968 Comm: kworker/2:11 Not tainted 6.5.0-rc3-00044-g0a8db05b571a #236
 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014
 Workqueue: ipv6_addrconf addrconf_dad_work
 RIP: 0010:skb_panic+0x152/0x1d0
 Call Trace:
  <TASK>
  skb_push+0xc4/0xe0
  ip6mr_cache_report+0xd69/0x19b0
  reg_vif_xmit+0x406/0x690
  dev_hard_start_xmit+0x17e/0x6e0
  __dev_queue_xmit+0x2d6a/0x3d20
  vlan_dev_hard_start_xmit+0x3ab/0x5c0
  dev_hard_start_xmit+0x17e/0x6e0
  __dev_queue_xmit+0x2d6a/0x3d20
  neigh_connected_output+0x3ed/0x570
  ip6_finish_output2+0x5b5/0x1950
  ip6_finish_output+0x693/0x11c0
  ip6_output+0x24b/0x880
  NF_HOOK.constprop.0+0xfd/0x530
  ndisc_send_skb+0x9db/0x1400
  ndisc_send_rs+0x12a/0x6c0
  addrconf_dad_completed+0x3c9/0xea0
  addrconf_dad_work+0x849/0x1420
  process_one_work+0xa22/0x16e0
  worker_thread+0x679/0x10c0
  ret_from_fork+0x28/0x60
  ret_from_fork_asm+0x11/0x20

When setup a vlan device on dev pim6reg, DAD ns packet may sent on reg_vif_xmit().
reg_vif_xmit()
    ip6mr_cache_report()
        skb_push(skb, -skb_network_offset(pkt));//skb_network_offset(pkt) is 4
And skb_push declared as:
	void *skb_push(struct sk_buff *skb, unsigned int len);
		skb->data -= len;
		//0xffff88805f86a84c - 0xfffffffc = 0xffff887f5f86a850
skb->data is set to 0xffff887f5f86a850, which is invalid mem addr, lead to skb_push() fails.

Fixes: 14fb64e ("[IPV6] MROUTE: Support PIM-SM (SSM).")
	Signed-off-by: Yue Haibing <yuehaibing@huawei.com>
	Reviewed-by: Eric Dumazet <edumazet@google.com>
	Signed-off-by: David S. Miller <davem@davemloft.net>
(cherry picked from commit 30e0191)
	Signed-off-by: Brett Mastbergen <bmastbergen@ciq.com>
jira VULN-157131
cve CVE-2023-53513
commit-author Zhong Jinghua <zhongjinghua@huawei.com>
commit 55793ea

We tested and found an alarm caused by nbd_ioctl arg without verification.
The UBSAN warning calltrace like below:

UBSAN: Undefined behaviour in fs/buffer.c:1709:35
signed integer overflow:
-9223372036854775808 - 1 cannot be represented in type 'long long int'
CPU: 3 PID: 2523 Comm: syz-executor.0 Not tainted 4.19.90 #1
Hardware name: linux,dummy-virt (DT)
Call trace:
 dump_backtrace+0x0/0x3f0 arch/arm64/kernel/time.c:78
 show_stack+0x28/0x38 arch/arm64/kernel/traps.c:158
 __dump_stack lib/dump_stack.c:77 [inline]
 dump_stack+0x170/0x1dc lib/dump_stack.c:118
 ubsan_epilogue+0x18/0xb4 lib/ubsan.c:161
 handle_overflow+0x188/0x1dc lib/ubsan.c:192
 __ubsan_handle_sub_overflow+0x34/0x44 lib/ubsan.c:206
 __block_write_full_page+0x94c/0xa20 fs/buffer.c:1709
 block_write_full_page+0x1f0/0x280 fs/buffer.c:2934
 blkdev_writepage+0x34/0x40 fs/block_dev.c:607
 __writepage+0x68/0xe8 mm/page-writeback.c:2305
 write_cache_pages+0x44c/0xc70 mm/page-writeback.c:2240
 generic_writepages+0xdc/0x148 mm/page-writeback.c:2329
 blkdev_writepages+0x2c/0x38 fs/block_dev.c:2114
 do_writepages+0xd4/0x250 mm/page-writeback.c:2344

The reason for triggering this warning is __block_write_full_page()
-> i_size_read(inode) - 1 overflow.
inode->i_size is assigned in __nbd_ioctl() -> nbd_set_size() -> bytesize.
We think it is necessary to limit the size of arg to prevent errors.

Moreover, __nbd_ioctl() -> nbd_add_socket(), arg will be cast to int.
Assuming the value of arg is 0x80000000000000001) (on a 64-bit machine),
it will become 1 after the coercion, which will return unexpected results.

Fix it by adding checks to prevent passing in too large numbers.

	Signed-off-by: Zhong Jinghua <zhongjinghua@huawei.com>
	Reviewed-by: Yu Kuai <yukuai3@huawei.com>
	Reviewed-by: Josef Bacik <josef@toxicpanda.com>
Link: https://lore.kernel.org/r/20230206145805.2645671-1-zhongjinghua@huawei.com
	Signed-off-by: Jens Axboe <axboe@kernel.dk>
(cherry picked from commit 55793ea)
	Signed-off-by: Brett Mastbergen <bmastbergen@ciq.com>
jira VULN-136372
cve CVE-2025-38729
commit-author Takashi Iwai <tiwai@suse.de>
commit d832ccb

UAC3 power domain descriptors need to be verified with its variable
bLength for avoiding the unexpected OOB accesses by malicious
firmware, too.

Fixes: 9a2fe9b ("ALSA: usb: initial USB Audio Device Class 3.0 support")
Reported-and-tested-by: Youngjun Lee <yjjuny.lee@samsung.com>
	Cc: <stable@vger.kernel.org>
Link: https://patch.msgid.link/20250814081245.8902-1-tiwai@suse.de
	Signed-off-by: Takashi Iwai <tiwai@suse.de>
(cherry picked from commit d832ccb)
	Signed-off-by: Brett Mastbergen <bmastbergen@ciq.com>
jira VULN-136544
cve CVE-2025-39702
commit-author Eric Biggers <ebiggers@kernel.org>
commit a458b29

To prevent timing attacks, MACs need to be compared in constant time.
Use the appropriate helper function for this.

Fixes: bf355b8 ("ipv6: sr: add core files for SR HMAC support")
	Cc: stable@vger.kernel.org
	Signed-off-by: Eric Biggers <ebiggers@kernel.org>
	Reviewed-by: Andrea Mayer <andrea.mayer@uniroma2.it>
Link: https://patch.msgid.link/20250818202724.15713-1-ebiggers@kernel.org
	Signed-off-by: Jakub Kicinski <kuba@kernel.org>
(cherry picked from commit a458b29)
	Signed-off-by: Brett Mastbergen <bmastbergen@ciq.com>
jira VULN-152936
cve CVE-2025-39757
commit-author Takashi Iwai <tiwai@suse.de>
commit ecfd411

UAC3 class segment descriptors need to be verified whether their sizes
match with the declared lengths and whether they fit with the
allocated buffer sizes, too.  Otherwise malicious firmware may lead to
the unexpected OOB accesses.

Fixes: 11785ef ("ALSA: usb-audio: Initial Power Domain support")
Reported-and-tested-by: Youngjun Lee <yjjuny.lee@samsung.com>
	Cc: <stable@vger.kernel.org>
Link: https://patch.msgid.link/20250814081245.8902-2-tiwai@suse.de
	Signed-off-by: Takashi Iwai <tiwai@suse.de>
(cherry picked from commit ecfd411)
	Signed-off-by: Brett Mastbergen <bmastbergen@ciq.com>
jira VULN-152936
cve-bf CVE-2025-39757
commit-author Dan Carpenter <dan.carpenter@linaro.org>
commit 89f0add

The "p" pointer is void so sizeof(*p) is 1.  The intent was to check
sizeof(*cs_desc), which is 3, instead.

Fixes: ecfd411 ("ALSA: usb-audio: Validate UAC3 cluster segment descriptors")
	Signed-off-by: Dan Carpenter <dan.carpenter@linaro.org>
Link: https://patch.msgid.link/aKL5kftC1qGt6lpv@stanley.mountain
	Signed-off-by: Takashi Iwai <tiwai@suse.de>
(cherry picked from commit 89f0add)
	Signed-off-by: Brett Mastbergen <bmastbergen@ciq.com>
jira VULN-155161
cve CVE-2025-39817
commit-author Li Nan <linan122@huawei.com>
commit a6358f8

Observed on kernel 6.6 (present on master as well):

  BUG: KASAN: slab-out-of-bounds in memcmp+0x98/0xd0
  Call trace:
   kasan_check_range+0xe8/0x190
   __asan_loadN+0x1c/0x28
   memcmp+0x98/0xd0
   efivarfs_d_compare+0x68/0xd8
   __d_lookup_rcu_op_compare+0x178/0x218
   __d_lookup_rcu+0x1f8/0x228
   d_alloc_parallel+0x150/0x648
   lookup_open.isra.0+0x5f0/0x8d0
   open_last_lookups+0x264/0x828
   path_openat+0x130/0x3f8
   do_filp_open+0x114/0x248
   do_sys_openat2+0x340/0x3c0
   __arm64_sys_openat+0x120/0x1a0

If dentry->d_name.len < EFI_VARIABLE_GUID_LEN , 'guid' can become
negative, leadings to oob. The issue can be triggered by parallel
lookups using invalid filename:

  T1			T2
  lookup_open
   ->lookup
    simple_lookup
     d_add
     // invalid dentry is added to hash list

			lookup_open
			 d_alloc_parallel
			  __d_lookup_rcu
			   __d_lookup_rcu_op_compare
			    hlist_bl_for_each_entry_rcu
			    // invalid dentry can be retrieved
			     ->d_compare
			      efivarfs_d_compare
			      // oob

Fix it by checking 'guid' before cmp.

Fixes: da27a24 ("efivarfs: guid part of filenames are case-insensitive")
	Signed-off-by: Li Nan <linan122@huawei.com>
	Signed-off-by: Wu Guanghao <wuguanghao3@huawei.com>
	Signed-off-by: Ard Biesheuvel <ardb@kernel.org>
(cherry picked from commit a6358f8)
	Signed-off-by: Brett Mastbergen <bmastbergen@ciq.com>
@bmastbergen bmastbergen force-pushed the {bmastbergen}_ciqlts9_2 branch from d1e3e45 to 71b2416 Compare December 10, 2025 15:45
@bmastbergen
Copy link
Collaborator

🔍 Upstream Linux Kernel Commit Check

  • ⚠️ PR commit 28f40b05b92 (Bluetooth: L2CAP: Fix use-after-free in l2cap_disconnect_{req,rsp}) does not reference a CVE but
    upstream commit a2a9339e1c9d is associated with CVE-2023-53827

This is an automated message from the kernel commit checker workflow.

Fixed

@github-actions
Copy link

🔍 Interdiff Analysis

  • ⚠️ PR commit 7f21103f70d (ALSA: usb-audio: Validate UAC3 cluster segment descriptors) → upstream ecfd41166b72
    Differences found:
diff -u b/sound/usb/stream.c b/sound/usb/stream.c
--- b/sound/usb/stream.c
+++ b/sound/usb/stream.c
@@ -357,6 +362,9 @@ INTERDIFF: rejected hunk from patch1, cannot diff context
 			struct uac3_cluster_information_segment_descriptor *is = p;
 			unsigned char map;
 
+			if (cs_len < sizeof(*is))
+				break;
+
 			/*
 			 * TODO: this conversion is not complete, update it
 			 * after adding UAC3 values to asound.h
@@ -360,6 +365,9 @@ INTERDIFF: rejected hunk from patch2, cannot diff context
 			struct uac3_cluster_information_segment_descriptor *is = p;
 			unsigned char map;
 
+			if (cs_len < sizeof(*is))
+				break;
+
 			/*
 			 * TODO: this conversion is not complete, update it
 			 * after adding UAC3 values to asound.h

This is an automated interdiff check for backported commits.

@ciq-kernel-automation ciq-kernel-automation bot changed the title [ciqlts9_2] Multiple patches tested (10 commits) [ciqlts9_2] Multiple patches tested (12 commits) Dec 10, 2025
@shreeya-patel98
Copy link
Collaborator Author

Approved from my side.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Development

Successfully merging this pull request may close these issues.

3 participants