Skip to content

Conversation

@roxanan1996
Copy link
Contributor

COMMITS

crypto: xts - Handle EBUSY correctly

jira VULN-157047
cve CVE-2023-53494
commit-author Herbert Xu <herbert@gondor.apana.org.au>
commit 51c082514c2dedf2711c99d93c196cc4eedceb40
sctp: linearize cloned gso packets in sctp_rcv

jira VULN-136342
cve CVE-2025-38718
commit-author Xin Long <lucien.xin@gmail.com>
commit fd60d8a086191fe33c2d719732d2482052fa6805
ALSA: usb-audio: Validate UAC3 power domain descriptors, too

jira VULN-136373
cve CVE-2025-38729
commit-author Takashi Iwai <tiwai@suse.de>
commit d832ccbc301fbd9e5a1d691bdcf461cdb514595f
ALSA: hda/ca0132: Fix buffer overflow in add_tuning_control

jira VULN-152899
cve CVE-2025-39751
commit-author Lucy Thrun <lucy.thrun@digital-rabbithole.de>
commit a409c60111e6bb98fcabab2aeaa069daa9434ca0
ALSA: usb-audio: Validate UAC3 cluster segment descriptors

jira VULN-152937
cve CVE-2025-39757
commit-author Takashi Iwai <tiwai@suse.de>
commit ecfd41166b72b67d3bdeb88d224ff445f6163869
ALSA: usb-audio: Fix size validation in convert_chmap_v3()

jira VULN-152937
cve-bf CVE-2025-39757
commit-author Dan Carpenter <dan.carpenter@linaro.org>
commit 89f0addeee3cb2dc49837599330ed9c4612f05b0
efivarfs: Fix slab-out-of-bounds in efivarfs_d_compare

jira VULN-155162
cve CVE-2025-39817
commit-author Li Nan <linan122@huawei.com>
commit a6358f8cf64850f3f27857b8ed8c1b08cfc4685c
wifi: cfg80211: sme: cap SSID length in __cfg80211_connect_result()

jira VULN-156052
cve CVE-2025-39849
commit-author Dan Carpenter <dan.carpenter@linaro.org>
commit 62b635dcd69c4fde7ce1de4992d71420a37e51e3
upstream-diff |
	Had to change the call from min to min_t due to type checking failure.
	This kernel is missing multiple improvements done in min, including
	the removal of type checking done in commit
	dc1c8034e31b1("minmax: simplify min()/max()/clamp() implementation").
	This was not backported because it required other changes as well,
	including making sure that all C constant expression context that use
	min() or max() had to be converted.
ipv6: sr: Fix MAC comparison to be constant-time

jira VULN-136545
cve CVE-2025-39702
commit-author Eric Biggers <ebiggers@kernel.org>
commit a458b2902115b26a25d67393b12ddd57d1216aaa
upstream-diff |
	Use crypto/algahi.h instead of crypto/utils.h

TESTING

BUILD

> grep -E -B 5 -A 5 '\[TIMER\]|^Starting Build' /home/rnicolescu/ciq/kernels/lts-9.4/kernel-build-after.log
  CLEAN   scripts/mod
  CLEAN   scripts/selinux/genheaders
  CLEAN   scripts/selinux/mdp
  CLEAN   scripts
  CLEAN   include/config include/generated arch/x86/include/generated .config .config.old .version Module.symvers certs/signing_key.pem certs/signing_key.x509 certs/x509.genkey
[TIMER]{MRPROPER}: 6s
x86_64 architecture detected, copying config
'configs/kernel-x86_64-rhel.config' -> '.config'
Setting Local Version for build
CONFIG_LOCALVERSION="-rnicolescu_ciqlts9_4-fb63bee55430e"
Making olddefconfig
--
  HOSTCC  scripts/kconfig/util.o
  HOSTLD  scripts/kconfig/conf
#
# configuration written to .config
#
Starting Build
  SYSHDR  arch/x86/include/generated/uapi/asm/unistd_32.h
  SYSHDR  arch/x86/include/generated/uapi/asm/unistd_64.h
  SYSHDR  arch/x86/include/generated/uapi/asm/unistd_x32.h
  SYSTBL  arch/x86/include/generated/asm/syscalls_32.h
  SYSHDR  arch/x86/include/generated/asm/unistd_32_ia32.h
--
  BTF [M] sound/usb/snd-usb-audio.ko
  BTF [M] sound/virtio/virtio_snd.ko
  BTF [M] sound/xen/snd_xen_front.ko
  LD [M]  virt/lib/irqbypass.ko
  BTF [M] virt/lib/irqbypass.ko
[TIMER]{BUILD}: 1445s
Making Modules
  INSTALL /lib/modules/5.14.0-rnicolescu_ciqlts9_4-fb63bee55430e+/kernel/arch/x86/crypto/blake2s-x86_64.ko
  INSTALL /lib/modules/5.14.0-rnicolescu_ciqlts9_4-fb63bee55430e+/kernel/arch/x86/crypto/blowfish-x86_64.ko
  INSTALL /lib/modules/5.14.0-rnicolescu_ciqlts9_4-fb63bee55430e+/kernel/arch/x86/crypto/camellia-aesni-avx-x86_64.ko
  INSTALL /lib/modules/5.14.0-rnicolescu_ciqlts9_4-fb63bee55430e+/kernel/arch/x86/crypto/camellia-aesni-avx2.ko
--
  SIGN    /lib/modules/5.14.0-rnicolescu_ciqlts9_4-fb63bee55430e+/kernel/sound/usb/usx2y/snd-usb-usx2y.ko
  INSTALL /lib/modules/5.14.0-rnicolescu_ciqlts9_4-fb63bee55430e+/kernel/drivers/hid/hid-primax.ko
  STRIP   /lib/modules/5.14.0-rnicolescu_ciqlts9_4-fb63bee55430e+/kernel/drivers/hid/hid-primax.ko
  SIGN    /lib/modules/5.14.0-rnicolescu_ciqlts9_4-fb63bee55430e+/kernel/drivers/hid/hid-primax.ko
  DEPMOD  /lib/modules/5.14.0-rnicolescu_ciqlts9_4-fb63bee55430e+
[TIMER]{MODULES}: 8s
Making Install
sh ./arch/x86/boot/install.sh 5.14.0-rnicolescu_ciqlts9_4-fb63bee55430e+ \
	arch/x86/boot/bzImage System.map "/boot"
[TIMER]{INSTALL}: 20s
Checking kABI
kABI check passed
Setting Default Kernel to /boot/vmlinuz-5.14.0-rnicolescu_ciqlts9_4-fb63bee55430e+ and Index to 1
The default is /boot/loader/entries/71ac16b68a8c47bab2f0e271710f9c5a-5.14.0-rnicolescu_ciqlts9_4-fb63bee55430e+.conf with index 1 and kernel /boot/vmlinuz-5.14.0-rnicolescu_ciqlts9_4-fb63bee55430e+
The default is /boot/loader/entries/71ac16b68a8c47bab2f0e271710f9c5a-5.14.0-rnicolescu_ciqlts9_4-fb63bee55430e+.conf with index 1 and kernel /boot/vmlinuz-5.14.0-rnicolescu_ciqlts9_4-fb63bee55430e+
Generating grub configuration file ...
Adding boot menu entry for UEFI Firmware Settings ...
done
Hopefully Grub2.0 took everything ... rebooting after time metrices
[TIMER]{MRPROPER}: 6s
[TIMER]{BUILD}: 1445s
[TIMER]{MODULES}: 8s
[TIMER]{INSTALL}: 20s
[TIMER]{TOTAL} 1484s
Rebooting in 10 seconds

Kselftests

> /home/rnicolescu/ciq/kernel-tools/kselftest-diff.sh /home/rnicolescu/ciq/kernels/lts-9.4
/home/rnicolescu/ciq/kernels/lts-9.4/kselftest-after.log
368
/home/rnicolescu/ciq/kernels/lts-9.4/kselftest-before.log
354
Before: /home/rnicolescu/ciq/kernels/lts-9.4/kselftest-after.log
After: /home/rnicolescu/ciq/kernels/lts-9.4/kselftest-before.log
Diff:
-ok 11 selftests: proc: proc-uptime-001
-ok 12 selftests: x86: fsgsbase_restore_64
-ok 13 selftests: x86: sigaltstack_64
-ok 14 selftests: x86: fsgsbase_64
-ok 15 selftests: x86: sysret_rip_64
-ok 16 selftests: x86: syscall_numbering_64
-ok 17 selftests: x86: corrupt_xstate_header_64
-ok 2 selftests: x86: sysret_ss_attrs_64
-ok 3 selftests: x86: syscall_nt_64
-ok 4 selftests: x86: test_mremap_vdso_64
-ok 5 selftests: x86: check_initial_reg_state_64
-ok 7 selftests: x86: iopl_64
-ok 8 selftests: x86: ioperm_64
-ok 9 selftests: x86: test_vsyscall_64

Check_kernel_commits

> python3 /home/rnicolescu/ciq/kernel-src-tree-tools/check_kernel_commits.py --repo /home/rnicolescu/ciq/kernels/lts-9.4/kernel-src-tree --pr_branch {rnicolescu}_ciqlts9_4 --base_branch origin/ciqlts9_4 --check-cves
All referenced commits exist upstream and have no Fixes: tags.

Run interdiff

> python3 /home/rnicolescu/ciq/kernel-src-tree-tools/run_interdiff.py --repo /home/rnicolescu/ciq/kernels/lts-9.4/kernel-src-tree --pr_branch {rnicolescu}_ciqlts9_4 --base_branch origin/ciqlts9_4
[DIFF] PR commit 62d5273fe8a49 (ALSA: usb-audio: Validate UAC3 cluster segment descriptors) → upstream ecfd41166b72
Differences found:

  diff -u b/sound/usb/stream.c b/sound/usb/stream.c
  --- b/sound/usb/stream.c
  +++ b/sound/usb/stream.c
  @@ -357,6 +362,9 @@ INTERDIFF: rejected hunk from patch1, cannot diff context
   			struct uac3_cluster_information_segment_descriptor *is = p;
   			unsigned char map;
   
  +			if (cs_len < sizeof(*is))
  +				break;
  +
   			/*
   			 * TODO: this conversion is not complete, update it
   			 * after adding UAC3 values to asound.h
  @@ -360,6 +365,9 @@ INTERDIFF: rejected hunk from patch2, cannot diff context
   			struct uac3_cluster_information_segment_descriptor *is = p;
   			unsigned char map;
   
  +			if (cs_len < sizeof(*is))
  +				break;
  +
   			/*
   			 * TODO: this conversion is not complete, update it
   			 * after adding UAC3 values to asound.h

[DIFF] PR commit e8c09c496b919 (wifi: cfg80211: sme: cap SSID length in __cfg80211_connect_result()) → upstream 62b635dcd69c
Differences found:

  diff -u b/net/wireless/sme.c b/net/wireless/sme.c
  --- b/net/wireless/sme.c
  +++ b/net/wireless/sme.c
  @@ -908,7 +908,7 @@
   			if (!ssid || !ssid->datalen)
   				continue;
   
  -			ssid_len = min_t(u32, ssid->datalen, IEEE80211_MAX_SSID_LEN);
  +			ssid_len = min(ssid->datalen, IEEE80211_MAX_SSID_LEN);
   			memcpy(wdev->u.client.ssid, ssid->data, ssid_len);
   			wdev->u.client.ssid_len = ssid->datalen;
   			break;

[DIFF] PR commit fb63bee55430e (ipv6: sr: Fix MAC comparison to be constant-time) → upstream a458b2902115
Differences found:

  diff -u b/net/ipv6/seg6_hmac.c b/net/ipv6/seg6_hmac.c
  --- b/net/ipv6/seg6_hmac.c
  +++ b/net/ipv6/seg6_hmac.c
  @@ -31,7 +31,7 @@
  +#include <net/addrconf.h>
   #include <net/xfrm.h>
   
  -#include <crypto/algapi.h>
   #include <crypto/hash.h>
  +#include <crypto/utils.h>
   #include <net/seg6.h>
   #include <net/genetlink.h>
  -#include <net/seg6_hmac.h>

Last 2 comments are correct, as they are not clean cherry picks. Technically they were but they had to be modified because the build would fail otherwise.
But first is out of place. Check colordiff output.
colordiff.log

Screenshot From 2025-12-08 17-56-17

Run jira_pr_check

> python3 /home/rnicolescu/ciq/kernel-src-tree-tools/jira_pr_check.py --kernel-src-tree /home/rnicolescu/ciq/kernels/lts-9.4/kernel-src-tree --merge-target {rnicolescu}_ciqlts9_4 --pr-branch origin/ciqlts9_4

## JIRA PR Check Results

✅ **No issues found!**


---
**Summary:** Checked 0 commit(s) total.

jira VULN-157047
cve CVE-2023-53494
commit-author Herbert Xu <herbert@gondor.apana.org.au>
commit 51c0825

As it is xts only handles the special return value of EINPROGRESS,
which means that in all other cases it will free data related to the
request.

However, as the caller of xts may specify MAY_BACKLOG, we also need
to expect EBUSY and treat it in the same way.  Otherwise backlogged
requests will trigger a use-after-free.

Fixes: 8083b1b ("crypto: xts - add support for ciphertext stealing")
	Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
	Acked-by: Ard Biesheuvel <ardb@kernel.org>
	Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
(cherry picked from commit 51c0825)
	Signed-off-by: Roxana Nicolescu <rnicolescu@ciq.com>
jira VULN-136342
cve CVE-2025-38718
commit-author Xin Long <lucien.xin@gmail.com>
commit fd60d8a

A cloned head skb still shares these frag skbs in fraglist with the
original head skb. It's not safe to access these frag skbs.

syzbot reported two use-of-uninitialized-memory bugs caused by this:

  BUG: KMSAN: uninit-value in sctp_inq_pop+0x15b7/0x1920 net/sctp/inqueue.c:211
   sctp_inq_pop+0x15b7/0x1920 net/sctp/inqueue.c:211
   sctp_assoc_bh_rcv+0x1a7/0xc50 net/sctp/associola.c:998
   sctp_inq_push+0x2ef/0x380 net/sctp/inqueue.c:88
   sctp_backlog_rcv+0x397/0xdb0 net/sctp/input.c:331
   sk_backlog_rcv+0x13b/0x420 include/net/sock.h:1122
   __release_sock+0x1da/0x330 net/core/sock.c:3106
   release_sock+0x6b/0x250 net/core/sock.c:3660
   sctp_wait_for_connect+0x487/0x820 net/sctp/socket.c:9360
   sctp_sendmsg_to_asoc+0x1ec1/0x1f00 net/sctp/socket.c:1885
   sctp_sendmsg+0x32b9/0x4a80 net/sctp/socket.c:2031
   inet_sendmsg+0x25a/0x280 net/ipv4/af_inet.c:851
   sock_sendmsg_nosec net/socket.c:718 [inline]

and

  BUG: KMSAN: uninit-value in sctp_assoc_bh_rcv+0x34e/0xbc0 net/sctp/associola.c:987
   sctp_assoc_bh_rcv+0x34e/0xbc0 net/sctp/associola.c:987
   sctp_inq_push+0x2a3/0x350 net/sctp/inqueue.c:88
   sctp_backlog_rcv+0x3c7/0xda0 net/sctp/input.c:331
   sk_backlog_rcv+0x142/0x420 include/net/sock.h:1148
   __release_sock+0x1d3/0x330 net/core/sock.c:3213
   release_sock+0x6b/0x270 net/core/sock.c:3767
   sctp_wait_for_connect+0x458/0x820 net/sctp/socket.c:9367
   sctp_sendmsg_to_asoc+0x223a/0x2260 net/sctp/socket.c:1886
   sctp_sendmsg+0x3910/0x49f0 net/sctp/socket.c:2032
   inet_sendmsg+0x269/0x2a0 net/ipv4/af_inet.c:851
   sock_sendmsg_nosec net/socket.c:712 [inline]

This patch fixes it by linearizing cloned gso packets in sctp_rcv().

Fixes: 90017ac ("sctp: Add GSO support")
	Reported-by: syzbot+773e51afe420baaf0e2b@syzkaller.appspotmail.com
	Reported-by: syzbot+70a42f45e76bede082be@syzkaller.appspotmail.com
	Signed-off-by: Xin Long <lucien.xin@gmail.com>
	Reviewed-by: Marcelo Ricardo Leitner <marcelo.leitner@gmail.com>
Link: https://patch.msgid.link/dd7dc337b99876d4132d0961f776913719f7d225.1754595611.git.lucien.xin@gmail.com
	Signed-off-by: Jakub Kicinski <kuba@kernel.org>
(cherry picked from commit fd60d8a)
	Signed-off-by: Roxana Nicolescu <rnicolescu@ciq.com>
jira VULN-136373
cve CVE-2025-38729
commit-author Takashi Iwai <tiwai@suse.de>
commit d832ccb

UAC3 power domain descriptors need to be verified with its variable
bLength for avoiding the unexpected OOB accesses by malicious
firmware, too.

Fixes: 9a2fe9b ("ALSA: usb: initial USB Audio Device Class 3.0 support")
Reported-and-tested-by: Youngjun Lee <yjjuny.lee@samsung.com>
	Cc: <stable@vger.kernel.org>
Link: https://patch.msgid.link/20250814081245.8902-1-tiwai@suse.de
	Signed-off-by: Takashi Iwai <tiwai@suse.de>
(cherry picked from commit d832ccb)
	Signed-off-by: Roxana Nicolescu <rnicolescu@ciq.com>
jira VULN-152899
cve CVE-2025-39751
commit-author Lucy Thrun <lucy.thrun@digital-rabbithole.de>
commit a409c60

The 'sprintf' call in 'add_tuning_control' may exceed the 44-byte
buffer if either string argument is too long. This triggers a compiler
warning.
Replaced 'sprintf' with 'snprintf' to limit string lengths to prevent
overflow.

	Reported-by: kernel test robot <lkp@intel.com>
Closes: https://lore.kernel.org/oe-kbuild-all/202506100642.95jpuMY1-lkp@intel.com/
	Signed-off-by: Lucy Thrun <lucy.thrun@digital-rabbithole.de>
Link: https://patch.msgid.link/20250610175012.918-3-lucy.thrun@digital-rabbithole.de
	Signed-off-by: Takashi Iwai <tiwai@suse.de>
(cherry picked from commit a409c60)
	Signed-off-by: Roxana Nicolescu <rnicolescu@ciq.com>
jira VULN-152937
cve CVE-2025-39757
commit-author Takashi Iwai <tiwai@suse.de>
commit ecfd411

UAC3 class segment descriptors need to be verified whether their sizes
match with the declared lengths and whether they fit with the
allocated buffer sizes, too.  Otherwise malicious firmware may lead to
the unexpected OOB accesses.

Fixes: 11785ef ("ALSA: usb-audio: Initial Power Domain support")
Reported-and-tested-by: Youngjun Lee <yjjuny.lee@samsung.com>
	Cc: <stable@vger.kernel.org>
Link: https://patch.msgid.link/20250814081245.8902-2-tiwai@suse.de
	Signed-off-by: Takashi Iwai <tiwai@suse.de>
(cherry picked from commit ecfd411)
	Signed-off-by: Roxana Nicolescu <rnicolescu@ciq.com>
jira VULN-152937
cve-bf CVE-2025-39757
commit-author Dan Carpenter <dan.carpenter@linaro.org>
commit 89f0add

The "p" pointer is void so sizeof(*p) is 1.  The intent was to check
sizeof(*cs_desc), which is 3, instead.

Fixes: ecfd411 ("ALSA: usb-audio: Validate UAC3 cluster segment descriptors")
	Signed-off-by: Dan Carpenter <dan.carpenter@linaro.org>
Link: https://patch.msgid.link/aKL5kftC1qGt6lpv@stanley.mountain
	Signed-off-by: Takashi Iwai <tiwai@suse.de>
(cherry picked from commit 89f0add)
	Signed-off-by: Roxana Nicolescu <rnicolescu@ciq.com>
jira VULN-155162
cve CVE-2025-39817
commit-author Li Nan <linan122@huawei.com>
commit a6358f8

Observed on kernel 6.6 (present on master as well):

  BUG: KASAN: slab-out-of-bounds in memcmp+0x98/0xd0
  Call trace:
   kasan_check_range+0xe8/0x190
   __asan_loadN+0x1c/0x28
   memcmp+0x98/0xd0
   efivarfs_d_compare+0x68/0xd8
   __d_lookup_rcu_op_compare+0x178/0x218
   __d_lookup_rcu+0x1f8/0x228
   d_alloc_parallel+0x150/0x648
   lookup_open.isra.0+0x5f0/0x8d0
   open_last_lookups+0x264/0x828
   path_openat+0x130/0x3f8
   do_filp_open+0x114/0x248
   do_sys_openat2+0x340/0x3c0
   __arm64_sys_openat+0x120/0x1a0

If dentry->d_name.len < EFI_VARIABLE_GUID_LEN , 'guid' can become
negative, leadings to oob. The issue can be triggered by parallel
lookups using invalid filename:

  T1			T2
  lookup_open
   ->lookup
    simple_lookup
     d_add
     // invalid dentry is added to hash list

			lookup_open
			 d_alloc_parallel
			  __d_lookup_rcu
			   __d_lookup_rcu_op_compare
			    hlist_bl_for_each_entry_rcu
			    // invalid dentry can be retrieved
			     ->d_compare
			      efivarfs_d_compare
			      // oob

Fix it by checking 'guid' before cmp.

Fixes: da27a24 ("efivarfs: guid part of filenames are case-insensitive")
	Signed-off-by: Li Nan <linan122@huawei.com>
	Signed-off-by: Wu Guanghao <wuguanghao3@huawei.com>
	Signed-off-by: Ard Biesheuvel <ardb@kernel.org>
(cherry picked from commit a6358f8)
	Signed-off-by: Roxana Nicolescu <rnicolescu@ciq.com>
jira VULN-156052
cve CVE-2025-39849
commit-author Dan Carpenter <dan.carpenter@linaro.org>
commit 62b635d
upstream-diff |
	Had to change the call from min to min_t due to type checking failure.
	This kernel is missing multiple improvements done in min, including
	the removal of type checking done in commit
	dc1c803("minmax: simplify min()/max()/clamp() implementation").
	This was not backported because it required other changes as well,
	including making sure that all C constant expression context that use
	min() or max() had to be converted.

If the ssid->datalen is more than IEEE80211_MAX_SSID_LEN (32) it would
lead to memory corruption so add some bounds checking.

Fixes: c38c701 ("wifi: cfg80211: Set SSID if it is not already set")
	Signed-off-by: Dan Carpenter <dan.carpenter@linaro.org>
Link: https://patch.msgid.link/0aaaae4a3ed37c6252363c34ae4904b1604e8e32.1756456951.git.dan.carpenter@linaro.org
	Signed-off-by: Johannes Berg <johannes.berg@intel.com>
(cherry picked from commit 62b635d)
	Signed-off-by: Roxana Nicolescu <rnicolescu@ciq.com>
jira VULN-136545
cve CVE-2025-39702
commit-author Eric Biggers <ebiggers@kernel.org>
commit a458b29
upstream-diff |
	Use crypto/algahi.h instead of crypto/utils.h

To prevent timing attacks, MACs need to be compared in constant time.
Use the appropriate helper function for this.

Fixes: bf355b8 ("ipv6: sr: add core files for SR HMAC support")
	Cc: stable@vger.kernel.org
	Signed-off-by: Eric Biggers <ebiggers@kernel.org>
	Reviewed-by: Andrea Mayer <andrea.mayer@uniroma2.it>
Link: https://patch.msgid.link/20250818202724.15713-1-ebiggers@kernel.org
	Signed-off-by: Jakub Kicinski <kuba@kernel.org>
(cherry picked from commit a458b29)
	Signed-off-by: Roxana Nicolescu <rnicolescu@ciq.com>
@github-actions
Copy link

github-actions bot commented Dec 8, 2025

🔍 Interdiff Analysis

  • ⚠️ PR commit 62d5273fe8a (ALSA: usb-audio: Validate UAC3 cluster segment descriptors) → upstream ecfd41166b72
    Differences found:
diff -u b/sound/usb/stream.c b/sound/usb/stream.c
--- b/sound/usb/stream.c
+++ b/sound/usb/stream.c
@@ -357,6 +362,9 @@ INTERDIFF: rejected hunk from patch1, cannot diff context
 			struct uac3_cluster_information_segment_descriptor *is = p;
 			unsigned char map;
 
+			if (cs_len < sizeof(*is))
+				break;
+
 			/*
 			 * TODO: this conversion is not complete, update it
 			 * after adding UAC3 values to asound.h
@@ -360,6 +365,9 @@ INTERDIFF: rejected hunk from patch2, cannot diff context
 			struct uac3_cluster_information_segment_descriptor *is = p;
 			unsigned char map;
 
+			if (cs_len < sizeof(*is))
+				break;
+
 			/*
 			 * TODO: this conversion is not complete, update it
 			 * after adding UAC3 values to asound.h
  • ⚠️ PR commit e8c09c496b9 (wifi: cfg80211: sme: cap SSID length in __cfg80211_connect_result()) → upstream 62b635dcd69c
    Differences found:
diff -u b/net/wireless/sme.c b/net/wireless/sme.c
--- b/net/wireless/sme.c
+++ b/net/wireless/sme.c
@@ -908,7 +908,7 @@
 			if (!ssid || !ssid->datalen)
 				continue;
 
-			ssid_len = min_t(u32, ssid->datalen, IEEE80211_MAX_SSID_LEN);
+			ssid_len = min(ssid->datalen, IEEE80211_MAX_SSID_LEN);
 			memcpy(wdev->u.client.ssid, ssid->data, ssid_len);
 			wdev->u.client.ssid_len = ssid->datalen;
 			break;
  • ⚠️ PR commit fb63bee5543 (ipv6: sr: Fix MAC comparison to be constant-time) → upstream a458b2902115
    Differences found:
diff -u b/net/ipv6/seg6_hmac.c b/net/ipv6/seg6_hmac.c
--- b/net/ipv6/seg6_hmac.c
+++ b/net/ipv6/seg6_hmac.c
@@ -31,7 +31,7 @@
+#include <net/addrconf.h>
 #include <net/xfrm.h>
 
-#include <crypto/algapi.h>
 #include <crypto/hash.h>
+#include <crypto/utils.h>
 #include <net/seg6.h>
 #include <net/genetlink.h>
-#include <net/seg6_hmac.h>

This is an automated interdiff check for backported commits.

@roxanan1996 roxanan1996 requested a review from a team December 8, 2025 18:06
Copy link
Collaborator

@bmastbergen bmastbergen left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🥌

@roxanan1996 roxanan1996 requested a review from a team December 9, 2025 09:33
@roxanan1996 roxanan1996 merged commit 1498d82 into ciqlts9_4 Dec 9, 2025
5 checks passed
@roxanan1996 roxanan1996 deleted the {rnicolescu}_ciqlts9_4 branch December 9, 2025 11:58
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Development

Successfully merging this pull request may close these issues.

4 participants