This bug was fixed in the package linux - 5.15.0-138.148 --------------- linux (5.15.0-138.148) jammy; urgency=medium
* jammy/linux: 5.15.0-138.148 -proposed tracker (LP: #2102587) * ipsec_offload in rtnetlink.sh from ubunsu_kselftests_net fails on O/J (LP: #2096976) - SAUCE: selftest: netfilter: fix null IP field in kci_test_ipsec_offload * CVE-2025-21756 - vsock: Keep the binding until socket destruction - vsock: Orphan socket after transport release * CVE-2024-50256 - netfilter: nf_reject_ipv6: fix potential crash in nf_send_reset6() * CVE-2025-21702 - pfifo_tail_enqueue: Drop new packet when sch->limit == 0 * CVE-2025-21703 - netem: Update sch->q.qlen before qdisc_tree_reduce_backlog() * CVE-2025-21700 - net: sched: Disallow replacing of child qdisc from one parent to another * CVE-2024-46826 - ELF: fix kernel.randomize_va_space double read * CVE-2024-56651 - can: hi311x: hi3110_can_ist(): fix potential use-after-free * iBFT iSCSI out-of-bounds shift UBSAN warning (LP: #2097824) - iscsi_ibft: Fix UBSAN shift-out-of-bounds warning in ibft_attr_show_nic() * CVE-2024-50248 - ntfs3: Add bounds checking to mi_enum_attr() - fs/ntfs3: Sequential field availability check in mi_enum_attr() * CVE-2022-0995 - watch_queue: Use the bitmap API when applicable * CVE-2024-26837 - net: bridge: switchdev: Skip MDB replays of deferred events on offload * CVE-2025-21701 - net: avoid race between device unregistration and ethnl ops * CVE-2024-57798 - drm/dp_mst: Skip CSN if topology probing is not done yet - drm/dp_mst: Ensure mst_primary pointer is valid in drm_dp_mst_handle_up_req() * CVE-2024-56658 - net: defer final 'struct net' free in netns dismantle * CVE-2024-35864 - smb: client: fix potential UAF in smb2_is_valid_lease_break() * CVE-2024-35864/CVE-2024-26928 - smb: client: fix potential UAF in cifs_debug_files_proc_show() -- Stefan Bader <stefan.ba...@canonical.com> Fri, 14 Mar 2025 15:32:05 +0100 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/2097824 Title: iBFT iSCSI out-of-bounds shift UBSAN warning Status in linux package in Ubuntu: In Progress Status in linux source package in Focal: Won't Fix Status in linux source package in Jammy: Fix Released Status in linux source package in Noble: Fix Committed Status in linux source package in Oracular: Fix Released Status in linux source package in Plucky: In Progress Bug description: [Impact] During an iSCSI boot in an IPv6 environment, `iscsistart` continues to access the `/sys/firmware/ibft/ethernetX/subnet-mask` entry, despite subnet masks being irrelevant for IPv6. Since the IPv6 prefix length is 64, this leads to a negative shift exponent, triggering a UBSAN warning. [Fix] A commit has been made to fix this issue. https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=07e0d99a2f701123ad3104c0f1a1e66bce74d6e5 [Test Plan] 1. Set up a machine with an iSCSI backend in an IPv6-only environment. 2. Power on the machine and verify that the following error does not occur: [ 105.283243] UBSAN: shift-out-of-bounds in /build/linux-oracle-cD7q0d/linux-oracle-6.8.0/drivers/firmware/iscsi_ibft.c:313:9 [ 105.432609] shift exponent -32 is negative [ 105.498209] CPU: 106 PID: 2536 Comm: iscsistart Not tainted 6.8.0-1008-oracle #8-Ubuntu [ 105.610611] Hardware name: Oracle Corporation ORACLE SERVER E4-2c/Asm,MB Tray,2U,E4-2c, BIOS 78016100 04/11/2024 [ 105.749047] Call Trace: [ 105.794939] <TASK> [ 105.832503] dump_stack_lvl+0x76/0xa0 [ 105.876679] dump_stack+0x10/0x20 [ 105.916742] __ubsan_handle_shift_out_of_bounds+0x199/0x370 [ 105.983788] ibft_attr_show_nic.cold+0x17/0x2c [iscsi_ibft] [ 106.050817] iscsi_boot_show_attribute+0x3f/0x70 [iscsi_boot_sysfs] [ 106.126167] sysfs_kf_seq_show+0xa7/0x120 [ 106.174475] kernfs_seq_show+0x27/0x40 [ 106.219654] seq_read_iter+0x132/0x4b0 [ 106.264824] kernfs_fop_read_iter+0x34/0x40 [ 106.315190] vfs_read+0x258/0x390 [ 106.355160] ksys_read+0x73/0x100 [ 106.395116] __x64_sys_read+0x19/0x30 [ 106.439234] x64_sys_call+0x1ada/0x25c0 [ 106.485422] do_syscall_64+0x7f/0x180 [ 106.529528] ? srso_alias_return_thunk+0x5/0xfbef5 [ 106.587154] ? syscall_exit_to_user_mode+0x89/0x260 [ 106.645810] ? srso_alias_return_thunk+0x5/0xfbef5 [ 106.703424] ? do_syscall_64+0x8c/0x180 [ 106.749594] ? srso_alias_return_thunk+0x5/0xfbef5 [ 106.807197] ? __do_sys_newfstatat+0x44/0x90 [ 106.858552] ? srso_alias_return_thunk+0x5/0xfbef5 [ 106.916147] ? syscall_exit_to_user_mode+0x89/0x260 [ 106.974771] ? srso_alias_return_thunk+0x5/0xfbef5 [ 107.032350] ? do_syscall_64+0x8c/0x180 [ 107.078488] ? do_syscall_64+0x8c/0x180 [ 107.124620] ? exc_page_fault+0x94/0x190 [ 107.171789] entry_SYSCALL_64_after_hwframe+0x78/0x80 [ 107.232475] RIP: 0033:0x764465a69a61 [ 107.275484] Code: 00 48 8b 15 b9 73 0e 00 f7 d8 64 89 02 b8 ff ff ff ff eb bd e8 40 c4 01 00 f3 0f 1e fa 80 3d e5 f5 0e 00 00 74 13 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 4f c3 66 0f 1f 44 00 00 55 48 89 e5 48 83 ec [ 107.500766] RSP: 002b:00007ffc83fa6798 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 107.591622] RAX: ffffffffffffffda RBX: 00007ffc83fa6840 RCX: 0000764465a69a61 [ 107.677276] RDX: 0000000000000100 RSI: 00007ffc83fa6840 RDI: 0000000000000003 [ 107.762929] RBP: 00007ffc83fa6f80 R08: 00005d0f5c8b7fb4 R09: 0000000000000007 [ 107.848624] R10: 0000000000000000 R11: 0000000000000246 R12: 00005d0f5c8b7fb4 [ 107.934283] R13: 00007ffc83fa6940 R14: 00005d0f5c8bf650 R15: 0000000000000003 [ 108.019949] </TASK> [Where problems could occur] The patch resolves the UBSAN warning that occurs when accessing the `/sys/firmware/ibft/ethernetX/subnet-mask` entry. However, if any regressions occur, the entry may display an incorrect value. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2097824/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp