LSN-0115-1: Kernel Live Patch Security Notice
In the Linux kernel, the following vulnerability has been
resolved: fs/ntfs3: Fixed overflow check in mi_enum_attr())(CVE-2024-27407).
In the Linux kernel, the following vulnerability has been
resolved: netfilter: nf_reject_ipv6: fix nf_reject_ip6_tcphdr_put() syzbot
reported that nf_reject_ip6_tcphdr_put() was possibly sending garbage on
the four reserved tcp bits (th->res1) Use skb_put_zero() to clear the whole
TCP header, as done in nf_reject_ip_tcphdr_put() BUG: KMSAN: uninit-value
in nf_reject_ip6_tcphdr_put+0x688/0x6c0
net/ipv6/netfilter/nf_reject_ipv6.c:255
nf_reject_ip6_tcphdr_put+0x688/0x6c0
net/ipv6/netfilter/nf_reject_ipv6.c:255 nf_send_reset6+0xd84/0x15b0
net/ipv6/netfilter/nf_reject_ipv6.c:344 nft_reject_inet_eval+0x3c1/0x880
net/netfilter/nft_reject_inet.c:48 expr_call_ops_eval
net/netfilter/nf_tables_core.c:240 .
In the Linux kernel, the following vulnerability has been
resolved: smb: client: fix UAF in async decryption Doing an async
decryption (large read) crashes with a slab-use-after-free way down in the
crypto API.
In the Linux kernel, the following vulnerability has been
resolved: ovl: fix UAF in ovl_dentry_update_reval by moving dput() in
ovl_link_up The issue was caused by dput(upper) being called before
ovl_dentry_update_reval(), while upper->d_flags was still accessed in
ovl_dentry_remote().
In the Linux kernel, the following vulnerability has been
resolved: RDMA/erdma: Prevent use-after-free in erdma_accept_newconn()
After the erdma_cep_put(new_cep) being called, new_cep will be freed, and
the following dereference will cause a UAF problem.