Skip to content

Conversation

PlaidCat
Copy link
Collaborator

    bpf: Don't use tnum_range on array range checking for poke descriptors

    jira VULN-141362
    jira VULN-136651
    cve CVE-2022-49985
    commit-author Daniel Borkmann <[email protected]>
    commit a657182a5c5150cdfacb6640aad1d2712571a409
    ext4: avoid resizing to a partial cluster size

    jira VULN-141447
    jira VULN-69320
    cve CVE-2022-50020
    commit-author Kiselev, Oleg <[email protected]>
    commit 69cb8e9d8cd97cdf5e293b26d70a9dee3e35e6bd
    tunnels: fix out of bounds access when building IPv6 PMTU error

    jira VULN-8933
    jira VULN-8932
    cve CVE-2024-26665
    commit-author Antoine Tenart <[email protected]>
    commit d75abeec401f8c86b470e7028a13fcdc87e5dd06
    net: fix out-of-bounds access in ops_init

    jira VULN-8955
    jira VULN-8954
    cve CVE-2024-36883
    commit-author Thadeu Lima de Souza Cascardo <[email protected]>
    commit a26ff37e624d12e28077e5b24d2b264f62764ad6
    drm/amdgpu/mes: fix use-after-free issue

    jira VULN-8983
    jira VULN-8982
    cve CVE-2024-38581
    commit-author Jack Xiao <[email protected]>
    commit 948255282074d9367e01908b3f5dcf8c10fc9c3d
    xfs: don't walk off the end of a directory data block

    jira VULN-8989
    jira VULN-8988
    cve CVE-2024-41013
    commit-author lei lu <[email protected]>
    commit 0c7fcdb6d06cdf8b19b57c17605215b06afa864a
    net/iucv: Avoid explicit cpumask var allocation on stack

    jira VULN-44434
    jira VULN-44433
    cve CVE-2024-42094
    commit-author Dawei Li <[email protected]>
    commit be4e1304419c99a164b4c0e101c7c2a756b635b9
    tipc: Return non-zero value from tipc_udp_addr2str() on error

    jira VULN-9009
    jira VULN-9008
    cve CVE-2024-42284
    commit-author Shigeru Yoshida <[email protected]>
    commit fa96c6baef1b5385e2f0c0677b32b3839e716076
    wifi: rtw89: Fix array index mistake in rtw89_sta_info_get_iter()

    jira VULN-44676
    jira VULN-44675
    cve CVE-2024-43842
    commit-author Aleksandr Mishin <[email protected]>
    commit 85099c7ce4f9e64c66aa397cd9a37473637ab891
    net/mlx5e: SHAMPO, Fix invalid WQ linked list unlink

    jira VULN-39249
    jira VULN-39248
    cve CVE-2024-44970
    commit-author Dragos Tatulea <[email protected]>
    commit fba8334721e266f92079632598e46e5f89082f30
    mptcp: pm: Fix uaf in __timer_delete_sync

    jira VULN-9016
    jira VULN-9015
    cve CVE-2024-46858
    commit-author Edward Adam Davis <[email protected]>
    commit b4cd80b0338945a94972ac3ed54f8338d2da2076
    security/keys: fix slab-out-of-bounds in key_task_permission

    jira VULN-40830
    jira VULN-40829
    cve CVE-2024-50301
    commit-author Chen Ridong <[email protected]>
    commit 4a74da044ec9ec8679e6beccc4306b936b62873f

BUILD

[jmaple@devbox code]$ egrep -B 5 -A 5 "\[TIMER\]|^Starting Build" $(ls -t kbuild* | head -n1)
  CLEAN   scripts/selinux/genheaders
  CLEAN   scripts/selinux/mdp
  CLEAN   scripts
  CLEAN   include/config usr/include include/generated arch/x86/include/generated
  CLEAN   .config .config.old .version Module.symvers
[TIMER]{MRPROPER}: 9s
x86_64 architecture detected, copying config
'configs/kernel-x86_64.config' -> '.config'
Setting Local Version for build
CONFIG_LOCALVERSION="-jmaple_batch_12_fips-8-compliant_4.18.0-553.16.1-acb5"
Making olddefconfig
--
  HOSTLD  scripts/kconfig/conf
scripts/kconfig/conf  --olddefconfig Kconfig
#
# configuration written to .config
#
Starting Build
scripts/kconfig/conf  --syncconfig Kconfig
  SYSTBL  arch/x86/include/generated/asm/syscalls_32.h
  SYSHDR  arch/x86/include/generated/asm/unistd_32_ia32.h
  SYSHDR  arch/x86/include/generated/asm/unistd_64_x32.h
  SYSTBL  arch/x86/include/generated/asm/syscalls_64.h
--
  LD [M]  sound/usb/usx2y/snd-usb-usx2y.ko
  LD [M]  sound/virtio/virtio_snd.ko
  LD [M]  sound/x86/snd-hdmi-lpe-audio.ko
  LD [M]  sound/xen/snd_xen_front.ko
  LD [M]  virt/lib/irqbypass.ko
[TIMER]{BUILD}: 1908s
Making Modules
  INSTALL arch/x86/crypto/blowfish-x86_64.ko
  INSTALL arch/x86/crypto/camellia-aesni-avx-x86_64.ko
  INSTALL arch/x86/crypto/camellia-aesni-avx2.ko
  INSTALL arch/x86/crypto/camellia-x86_64.ko
--
  INSTALL sound/virtio/virtio_snd.ko
  INSTALL sound/x86/snd-hdmi-lpe-audio.ko
  INSTALL sound/xen/snd_xen_front.ko
  INSTALL virt/lib/irqbypass.ko
  DEPMOD  4.18.0-jmaple_batch_12_fips-8-compliant_4.18.0-553.16.1-acb5+
[TIMER]{MODULES}: 18s
Making Install
sh ./arch/x86/boot/install.sh 4.18.0-jmaple_batch_12_fips-8-compliant_4.18.0-553.16.1-acb5+ arch/x86/boot/bzImage \
        System.map "/boot"
[TIMER]{INSTALL}: 21s
Checking kABI
kABI check passed
Setting Default Kernel to /boot/vmlinuz-4.18.0-jmaple_batch_12_fips-8-compliant_4.18.0-553.16.1-acb5+ and Index to 0
Hopefully Grub2.0 took everything ... rebooting after time metrices
[TIMER]{MRPROPER}: 9s
[TIMER]{BUILD}: 1908s
[TIMER]{MODULES}: 18s
[TIMER]{INSTALL}: 21s
[TIMER]{TOTAL} 1962s
Rebooting in 10 seconds

KSelfTests

[jmaple@devbox code]$ ls -rt kselftest.* | tail -n4 | while read line; do echo $line; grep '^ok ' $line | wc -l ; done
kselftest.4.18.0-jmaple_fips-8-compliant_4.18.0-553.16.1-e75b49c17364+.log
204
kselftest.4.18.0-jmaple_fips-8-compliant_4.18.0-553.16.1-51dd39cc28f0+.log
204
kselftest.4.18.0-jmaple_20250910_fips-8-compliant_4.18.0-553.16.1-fdcf+.log
204
kselftest.4.18.0-jmaple_batch_12_fips-8-compliant_4.18.0-553.16.1-acb5+.log
204

jira VULN-141362
jira VULN-136651
cve CVE-2022-49985
commit-author Daniel Borkmann <[email protected]>
commit a657182

Hsin-Wei reported a KASAN splat triggered by their BPF runtime fuzzer which
is based on a customized syzkaller:

  BUG: KASAN: slab-out-of-bounds in bpf_int_jit_compile+0x1257/0x13f0
  Read of size 8 at addr ffff888004e90b58 by task syz-executor.0/1489
  CPU: 1 PID: 1489 Comm: syz-executor.0 Not tainted 5.19.0 #1
  Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS
  1.13.0-1ubuntu1.1 04/01/2014
  Call Trace:
   <TASK>
   dump_stack_lvl+0x9c/0xc9
   print_address_description.constprop.0+0x1f/0x1f0
   ? bpf_int_jit_compile+0x1257/0x13f0
   kasan_report.cold+0xeb/0x197
   ? kvmalloc_node+0x170/0x200
   ? bpf_int_jit_compile+0x1257/0x13f0
   bpf_int_jit_compile+0x1257/0x13f0
   ? arch_prepare_bpf_dispatcher+0xd0/0xd0
   ? rcu_read_lock_sched_held+0x43/0x70
   bpf_prog_select_runtime+0x3e8/0x640
   ? bpf_obj_name_cpy+0x149/0x1b0
   bpf_prog_load+0x102f/0x2220
   ? __bpf_prog_put.constprop.0+0x220/0x220
   ? find_held_lock+0x2c/0x110
   ? __might_fault+0xd6/0x180
   ? lock_downgrade+0x6e0/0x6e0
   ? lock_is_held_type+0xa6/0x120
   ? __might_fault+0x147/0x180
   __sys_bpf+0x137b/0x6070
   ? bpf_perf_link_attach+0x530/0x530
   ? new_sync_read+0x600/0x600
   ? __fget_files+0x255/0x450
   ? lock_downgrade+0x6e0/0x6e0
   ? fput+0x30/0x1a0
   ? ksys_write+0x1a8/0x260
   __x64_sys_bpf+0x7a/0xc0
   ? syscall_enter_from_user_mode+0x21/0x70
   do_syscall_64+0x3b/0x90
   entry_SYSCALL_64_after_hwframe+0x63/0xcd
  RIP: 0033:0x7f917c4e2c2d

The problem here is that a range of tnum_range(0, map->max_entries - 1) has
limited ability to represent the concrete tight range with the tnum as the
set of resulting states from value + mask can result in a superset of the
actual intended range, and as such a tnum_in(range, reg->var_off) check may
yield true when it shouldn't, for example tnum_range(0, 2) would result in
00XX -> v = 0000, m = 0011 such that the intended set of {0, 1, 2} is here
represented by a less precise superset of {0, 1, 2, 3}. As the register is
known const scalar, really just use the concrete reg->var_off.value for the
upper index check.

Fixes: d2e4c1e ("bpf: Constant map key tracking for prog array pokes")
	Reported-by: Hsin-Wei Hung <[email protected]>
	Signed-off-by: Daniel Borkmann <[email protected]>
	Cc: Shung-Hsi Yu <[email protected]>
	Acked-by: John Fastabend <[email protected]>
Link: https://lore.kernel.org/r/984b37f9fdf7ac36831d2137415a4a915744c1b6.1661462653.git.daniel@iogearbox.net
	Signed-off-by: Alexei Starovoitov <[email protected]>
(cherry picked from commit a657182)
	Signed-off-by: Jonathan Maple <[email protected]>
jira VULN-141447
jira VULN-69320
cve CVE-2022-50020
commit-author Kiselev, Oleg <[email protected]>
commit 69cb8e9

This patch avoids an attempt to resize the filesystem to an
unaligned cluster boundary.  An online resize to a size that is not
integral to cluster size results in the last iteration attempting to
grow the fs by a negative amount, which trips a BUG_ON and leaves the fs
with a corrupted in-memory superblock.

	Signed-off-by: Oleg Kiselev <[email protected]>
Link: https://lore.kernel.org/r/[email protected]
	Signed-off-by: Theodore Ts'o <[email protected]>
(cherry picked from commit 69cb8e9)
	Signed-off-by: Jonathan Maple <[email protected]>
jira VULN-8933
jira VULN-8932
cve CVE-2024-26665
commit-author Antoine Tenart <[email protected]>
commit d75abee

If the ICMPv6 error is built from a non-linear skb we get the following
splat,

  BUG: KASAN: slab-out-of-bounds in do_csum+0x220/0x240
  Read of size 4 at addr ffff88811d402c80 by task netperf/820
  CPU: 0 PID: 820 Comm: netperf Not tainted 6.8.0-rc1+ #543
  ...
   kasan_report+0xd8/0x110
   do_csum+0x220/0x240
   csum_partial+0xc/0x20
   skb_tunnel_check_pmtu+0xeb9/0x3280
   vxlan_xmit_one+0x14c2/0x4080
   vxlan_xmit+0xf61/0x5c00
   dev_hard_start_xmit+0xfb/0x510
   __dev_queue_xmit+0x7cd/0x32a0
   br_dev_queue_push_xmit+0x39d/0x6a0

Use skb_checksum instead of csum_partial who cannot deal with non-linear
SKBs.

Fixes: 4cb47a8 ("tunnels: PMTU discovery support for directly bridged IP packets")
	Signed-off-by: Antoine Tenart <[email protected]>
	Reviewed-by: Jiri Pirko <[email protected]>
	Signed-off-by: David S. Miller <[email protected]>
(cherry picked from commit d75abee)
	Signed-off-by: Jonathan Maple <[email protected]>
jira VULN-8955
jira VULN-8954
cve CVE-2024-36883
commit-author Thadeu Lima de Souza Cascardo <[email protected]>
commit a26ff37

net_alloc_generic is called by net_alloc, which is called without any
locking. It reads max_gen_ptrs, which is changed under pernet_ops_rwsem. It
is read twice, first to allocate an array, then to set s.len, which is
later used to limit the bounds of the array access.

It is possible that the array is allocated and another thread is
registering a new pernet ops, increments max_gen_ptrs, which is then used
to set s.len with a larger than allocated length for the variable array.

Fix it by reading max_gen_ptrs only once in net_alloc_generic. If
max_gen_ptrs is later incremented, it will be caught in net_assign_generic.

	Signed-off-by: Thadeu Lima de Souza Cascardo <[email protected]>
Fixes: 073862b ("netns: fix net_alloc_generic()")
	Reviewed-by: Eric Dumazet <[email protected]>
	Reviewed-by: Kuniyuki Iwashima <[email protected]>
	Cc: [email protected]
Link: https://lore.kernel.org/r/[email protected]
	Signed-off-by: Paolo Abeni <[email protected]>
(cherry picked from commit a26ff37)
	Signed-off-by: Jonathan Maple <[email protected]>
jira VULN-8983
jira VULN-8982
cve CVE-2024-38581
commit-author Jack Xiao <[email protected]>
commit 9482552

Delete fence fallback timer to fix the ramdom
use-after-free issue.

v2: move to amdgpu_mes.c

	Signed-off-by: Jack Xiao <[email protected]>
	Acked-by: Lijo Lazar <[email protected]>
	Acked-by: Christian König <[email protected]>
	Signed-off-by: Alex Deucher <[email protected]>
(cherry picked from commit 9482552)
	Signed-off-by: Jonathan Maple <[email protected]>
jira VULN-8989
jira VULN-8988
cve CVE-2024-41013
commit-author lei lu <[email protected]>
commit 0c7fcdb

This adds sanity checks for xfs_dir2_data_unused and xfs_dir2_data_entry
to make sure don't stray beyond valid memory region. Before patching, the
loop simply checks that the start offset of the dup and dep is within the
range. So in a crafted image, if last entry is xfs_dir2_data_unused, we
can change dup->length to dup->length-1 and leave 1 byte of space. In the
next traversal, this space will be considered as dup or dep. We may
encounter an out of bound read when accessing the fixed members.

In the patch, we make sure that the remaining bytes large enough to hold
an unused entry before accessing xfs_dir2_data_unused and
xfs_dir2_data_unused is XFS_DIR2_DATA_ALIGN byte aligned. We also make
sure that the remaining bytes large enough to hold a dirent with a
single-byte name before accessing xfs_dir2_data_entry.

	Signed-off-by: lei lu <[email protected]>
	Reviewed-by: Darrick J. Wong <[email protected]>
	Signed-off-by: Chandan Babu R <[email protected]>
(cherry picked from commit 0c7fcdb)
	Signed-off-by: Jonathan Maple <[email protected]>
jira VULN-44434
jira VULN-44433
cve CVE-2024-42094
commit-author Dawei Li <[email protected]>
commit be4e130

For CONFIG_CPUMASK_OFFSTACK=y kernel, explicit allocation of cpumask
variable on stack is not recommended since it can cause potential stack
overflow.

Instead, kernel code should always use *cpumask_var API(s) to allocate
cpumask var in config-neutral way, leaving allocation strategy to
CONFIG_CPUMASK_OFFSTACK.

Use *cpumask_var API(s) to address it.

	Signed-off-by: Dawei Li <[email protected]>
	Reviewed-by: Alexandra Winter <[email protected]>
Link: https://lore.kernel.org/r/[email protected]
	Signed-off-by: Jakub Kicinski <[email protected]>
(cherry picked from commit be4e130)
	Signed-off-by: Jonathan Maple <[email protected]>
jira VULN-9009
jira VULN-9008
cve CVE-2024-42284
commit-author Shigeru Yoshida <[email protected]>
commit fa96c6b

tipc_udp_addr2str() should return non-zero value if the UDP media
address is invalid. Otherwise, a buffer overflow access can occur in
tipc_media_addr_printf(). Fix this by returning 1 on an invalid UDP
media address.

Fixes: d0f9193 ("tipc: add ip/udp media type")
	Signed-off-by: Shigeru Yoshida <[email protected]>
	Reviewed-by: Tung Nguyen <[email protected]>
	Signed-off-by: David S. Miller <[email protected]>
(cherry picked from commit fa96c6b)
	Signed-off-by: Jonathan Maple <[email protected]>
jira VULN-44676
jira VULN-44675
cve CVE-2024-43842
commit-author Aleksandr Mishin <[email protected]>
commit 85099c7

In rtw89_sta_info_get_iter() 'status->he_gi' is compared to array size.
But then 'rate->he_gi' is used as array index instead of 'status->he_gi'.
This can lead to go beyond array boundaries in case of 'rate->he_gi' is
not equal to 'status->he_gi' and is bigger than array size. Looks like
"copy-paste" mistake.

Fix this mistake by replacing 'rate->he_gi' with 'status->he_gi'.

Found by Linux Verification Center (linuxtesting.org) with SVACE.

Fixes: e3ec701 ("rtw89: add Realtek 802.11ax driver")
	Signed-off-by: Aleksandr Mishin <[email protected]>
	Signed-off-by: Ping-Ke Shih <[email protected]>
Link: https://patch.msgid.link/[email protected]
(cherry picked from commit 85099c7)
	Signed-off-by: Jonathan Maple <[email protected]>
jira VULN-39249
jira VULN-39248
cve CVE-2024-44970
commit-author Dragos Tatulea <[email protected]>
commit fba8334

When all the strides in a WQE have been consumed, the WQE is unlinked
from the WQ linked list (mlx5_wq_ll_pop()). For SHAMPO, it is possible
to receive CQEs with 0 consumed strides for the same WQE even after the
WQE is fully consumed and unlinked. This triggers an additional unlink
for the same wqe which corrupts the linked list.

Fix this scenario by accepting 0 sized consumed strides without
unlinking the WQE again.

	Signed-off-by: Dragos Tatulea <[email protected]>
	Signed-off-by: Tariq Toukan <[email protected]>
Link: https://lore.kernel.org/r/[email protected]
	Signed-off-by: Jakub Kicinski <[email protected]>
(cherry picked from commit fba8334)
	Signed-off-by: Jonathan Maple <[email protected]>
jira VULN-9016
jira VULN-9015
cve CVE-2024-46858
commit-author Edward Adam Davis <[email protected]>
commit b4cd80b

There are two paths to access mptcp_pm_del_add_timer, result in a race
condition:

     CPU1				CPU2
     ====                               ====
     net_rx_action
     napi_poll                          netlink_sendmsg
     __napi_poll                        netlink_unicast
     process_backlog                    netlink_unicast_kernel
     __netif_receive_skb                genl_rcv
     __netif_receive_skb_one_core       netlink_rcv_skb
     NF_HOOK                            genl_rcv_msg
     ip_local_deliver_finish            genl_family_rcv_msg
     ip_protocol_deliver_rcu            genl_family_rcv_msg_doit
     tcp_v4_rcv                         mptcp_pm_nl_flush_addrs_doit
     tcp_v4_do_rcv                      mptcp_nl_remove_addrs_list
     tcp_rcv_established                mptcp_pm_remove_addrs_and_subflows
     tcp_data_queue                     remove_anno_list_by_saddr
     mptcp_incoming_options             mptcp_pm_del_add_timer
     mptcp_pm_del_add_timer             kfree(entry)

In remove_anno_list_by_saddr(running on CPU2), after leaving the critical
zone protected by "pm.lock", the entry will be released, which leads to the
occurrence of uaf in the mptcp_pm_del_add_timer(running on CPU1).

Keeping a reference to add_timer inside the lock, and calling
sk_stop_timer_sync() with this reference, instead of "entry->add_timer".

Move list_del(&entry->list) to mptcp_pm_del_add_timer and inside the pm lock,
do not directly access any members of the entry outside the pm lock, which
can avoid similar "entry->x" uaf.

Fixes: 00cfd77 ("mptcp: retransmit ADD_ADDR when timeout")
	Cc: [email protected]
Reported-and-tested-by: [email protected]
Closes: https://syzkaller.appspot.com/bug?extid=f3a31fb909db9b2a5c4d
	Signed-off-by: Matthieu Baerts (NGI0) <[email protected]>
	Signed-off-by: Edward Adam Davis <[email protected]>
	Acked-by: Paolo Abeni <[email protected]>
Link: https://patch.msgid.link/[email protected]
	Signed-off-by: Jakub Kicinski <[email protected]>
(cherry picked from commit b4cd80b)
	Signed-off-by: Jonathan Maple <[email protected]>
jira VULN-40830
jira VULN-40829
cve CVE-2024-50301
commit-author Chen Ridong <[email protected]>
commit 4a74da0

KASAN reports an out of bounds read:
BUG: KASAN: slab-out-of-bounds in __kuid_val include/linux/uidgid.h:36
BUG: KASAN: slab-out-of-bounds in uid_eq include/linux/uidgid.h:63 [inline]
BUG: KASAN: slab-out-of-bounds in key_task_permission+0x394/0x410
security/keys/permission.c:54
Read of size 4 at addr ffff88813c3ab618 by task stress-ng/4362

CPU: 2 PID: 4362 Comm: stress-ng Not tainted 5.10.0-14930-gafbffd6c3ede #15
Call Trace:
 __dump_stack lib/dump_stack.c:82 [inline]
 dump_stack+0x107/0x167 lib/dump_stack.c:123
 print_address_description.constprop.0+0x19/0x170 mm/kasan/report.c:400
 __kasan_report.cold+0x6c/0x84 mm/kasan/report.c:560
 kasan_report+0x3a/0x50 mm/kasan/report.c:585
 __kuid_val include/linux/uidgid.h:36 [inline]
 uid_eq include/linux/uidgid.h:63 [inline]
 key_task_permission+0x394/0x410 security/keys/permission.c:54
 search_nested_keyrings+0x90e/0xe90 security/keys/keyring.c:793

This issue was also reported by syzbot.

It can be reproduced by following these steps(more details [1]):
1. Obtain more than 32 inputs that have similar hashes, which ends with the
   pattern '0xxxxxxxe6'.
2. Reboot and add the keys obtained in step 1.

The reproducer demonstrates how this issue happened:
1. In the search_nested_keyrings function, when it iterates through the
   slots in a node(below tag ascend_to_node), if the slot pointer is meta
   and node->back_pointer != NULL(it means a root), it will proceed to
   descend_to_node. However, there is an exception. If node is the root,
   and one of the slots points to a shortcut, it will be treated as a
   keyring.
2. Whether the ptr is keyring decided by keyring_ptr_is_keyring function.
   However, KEYRING_PTR_SUBTYPE is 0x2UL, the same as
   ASSOC_ARRAY_PTR_SUBTYPE_MASK.
3. When 32 keys with the similar hashes are added to the tree, the ROOT
   has keys with hashes that are not similar (e.g. slot 0) and it splits
   NODE A without using a shortcut. When NODE A is filled with keys that
   all hashes are xxe6, the keys are similar, NODE A will split with a
   shortcut. Finally, it forms the tree as shown below, where slot 6 points
   to a shortcut.

                      NODE A
              +------>+---+
      ROOT    |       | 0 | xxe6
      +---+   |       +---+
 xxxx | 0 | shortcut  :   : xxe6
      +---+   |       +---+
 xxe6 :   :   |       |   | xxe6
      +---+   |       +---+
      | 6 |---+       :   : xxe6
      +---+           +---+
 xxe6 :   :           | f | xxe6
      +---+           +---+
 xxe6 | f |
      +---+

4. As mentioned above, If a slot(slot 6) of the root points to a shortcut,
   it may be mistakenly transferred to a key*, leading to a read
   out-of-bounds read.

To fix this issue, one should jump to descend_to_node if the ptr is a
shortcut, regardless of whether the node is root or not.

[1] https://lore.kernel.org/linux-kernel/[email protected]/

[jarkko: tweaked the commit message a bit to have an appropriate closes
 tag.]
Fixes: b2a4df2 ("KEYS: Expand the capacity of a keyring")
	Reported-by: [email protected]
Closes: https://lore.kernel.org/all/[email protected]/T/
	Signed-off-by: Chen Ridong <[email protected]>
	Reviewed-by: Jarkko Sakkinen <[email protected]>
	Signed-off-by: Jarkko Sakkinen <[email protected]>
(cherry picked from commit 4a74da0)
	Signed-off-by: Jonathan Maple <[email protected]>
@PlaidCat PlaidCat self-assigned this Sep 12, 2025
@PlaidCat PlaidCat changed the title [FIPS 8.6/8.10 compliant] Batch 12 2025-09-12 [FIPS 8.6/8.10 compliant] Batch of 12 2025-09-12 Sep 12, 2025
Copy link
Collaborator

@bmastbergen bmastbergen left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🥌

Copy link

@thefossguy-ciq thefossguy-ciq left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🚤

@PlaidCat PlaidCat merged commit acb5388 into fips-8-compliant/4.18.0-553.16.1 Sep 15, 2025
4 checks passed
@PlaidCat PlaidCat deleted the {jmaple}_batch_12_fips-8-compliant/4.18.0-553.16.1 branch September 15, 2025 13:43
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Development

Successfully merging this pull request may close these issues.

4 participants