Skip to content

Conversation

@roxanan1996
Copy link

@roxanan1996 roxanan1996 commented Oct 22, 2025

DESCRIPTION

7 clean cherry picks:

netfilter: nf_conntrack: fix crash due to removal of uninitialised entry

jira VULN-89210
cve CVE-2025-38472
commit-author Florian Westphal <fw@strlen.de>
commit 2d72afb340657f03f7261e9243b44457a9228ac7
idpf: convert control queue mutex to a spinlock

jira VULN-136700
cve CVE-2025-38392
commit-author Ahmed Zaki <ahmed.zaki@intel.com>
commit b2beb5bb2cd90d7939e470ed4da468683f41baa3
i40e: fix MMIO write access to an invalid page in i40e_clear_hw

jira VULN-72065
cve CVE-2025-38200
commit-author Kyungwook Boo <bookyungwook@gmail.com>
commit 015bac5daca978448f2671478c553ce1f300c21e
net_sched: hfsc: Fix a potential UAF in hfsc_dequeue() too

jira VULN-67737
cve CVE-2025-37823
commit-author Cong Wang <xiyou.wangcong@gmail.com>
commit 6ccbda44e2cc3d26fd22af54c650d6d5d801addf
net: usb: smsc75xx: Move packet length check to prevent kernel panic in skb_pull

jira VULN-67490
cve-bf CVE-2023-53125
commit-author Szymon Heidrich <szymon.heidrich@gmail.com>
commit 43ffe6caccc7a1bb9d7442fbab521efbf6c1378c
net: usb: smsc75xx: Limit packet length to skb->len

jira VULN-67490
cve CVE-2023-53125
commit-author Szymon Heidrich <szymon.heidrich@gmail.com>
commit d8b228318935044dafe3a5bc07ee71a1f1424b8d
firmware: arm_scpi: Ensure scpi_info is not assigned if the probe fails

jira VULN-70088
cve CVE-2022-50087
commit-author Sudeep Holla <sudeep.holla@arm.com>
commit 689640efc0a2c4e07e6f88affe6d42cd40cc3f85

Commit efc8e72 ("net: usb: smsc75xx: Move packet length check to prevent kernel panic in skb_pull") had to be cherry-picked because it had a "Fix" reference to 851bb9d ("net: usb: smsc75xx: Limit packet length to skb->len")

TEST RESULTS

BUILD

> grep -E -B 5 -A 5 '\[TIMER\]|^Starting Build' ~/ciq/vms/ciqlts9_4/kernel-build-after.log
  CLEAN   scripts/mod
  CLEAN   scripts/selinux/genheaders
  CLEAN   scripts/selinux/mdp
  CLEAN   scripts
  CLEAN   include/config include/generated arch/x86/include/generated .config .config.old .version Module.symvers certs/signing_key.pem certs/signing_key.x509 certs/x509.genkey
[TIMER]{MRPROPER}: 8s
x86_64 architecture detected, copying config
'configs/kernel-x86_64-rhel.config' -> '.config'
Setting Local Version for build
CONFIG_LOCALVERSION="-rnicolescu_ciqlts9_4-2a15422fed93"
Making olddefconfig
--
  HOSTCC  scripts/kconfig/util.o
  HOSTLD  scripts/kconfig/conf
#
# configuration written to .config
#
Starting Build
  SYSHDR  arch/x86/include/generated/uapi/asm/unistd_32.h
  SYSHDR  arch/x86/include/generated/uapi/asm/unistd_64.h
  SYSHDR  arch/x86/include/generated/uapi/asm/unistd_x32.h
  SYSTBL  arch/x86/include/generated/asm/syscalls_32.h
  SYSHDR  arch/x86/include/generated/asm/unistd_32_ia32.h
--
  BTF [M] sound/x86/snd-hdmi-lpe-audio.ko
  BTF [M] sound/virtio/virtio_snd.ko
  BTF [M] virt/lib/irqbypass.ko
  BTF [M] sound/xen/snd_xen_front.ko
  BTF [M] sound/usb/snd-usb-audio.ko
[TIMER]{BUILD}: 1453s
Making Modules
  INSTALL /lib/modules/5.14.0-rnicolescu_ciqlts9_4-2a15422fed93+/kernel/arch/x86/crypto/blake2s-x86_64.ko
  INSTALL /lib/modules/5.14.0-rnicolescu_ciqlts9_4-2a15422fed93+/kernel/arch/x86/crypto/blowfish-x86_64.ko
  INSTALL /lib/modules/5.14.0-rnicolescu_ciqlts9_4-2a15422fed93+/kernel/arch/x86/crypto/camellia-aesni-avx-x86_64.ko
  INSTALL /lib/modules/5.14.0-rnicolescu_ciqlts9_4-2a15422fed93+/kernel/arch/x86/crypto/camellia-aesni-avx2.ko
--
  SIGN    /lib/modules/5.14.0-rnicolescu_ciqlts9_4-2a15422fed93+/kernel/sound/x86/snd-hdmi-lpe-audio.ko
  SIGN    /lib/modules/5.14.0-rnicolescu_ciqlts9_4-2a15422fed93+/kernel/sound/usb/snd-usb-audio.ko
  STRIP   /lib/modules/5.14.0-rnicolescu_ciqlts9_4-2a15422fed93+/kernel/drivers/hid/hid-logitech-dj.ko
  SIGN    /lib/modules/5.14.0-rnicolescu_ciqlts9_4-2a15422fed93+/kernel/drivers/hid/hid-logitech-dj.ko
  DEPMOD  /lib/modules/5.14.0-rnicolescu_ciqlts9_4-2a15422fed93+
[TIMER]{MODULES}: 8s
Making Install
sh ./arch/x86/boot/install.sh 5.14.0-rnicolescu_ciqlts9_4-2a15422fed93+ \
	arch/x86/boot/bzImage System.map "/boot"
[TIMER]{INSTALL}: 20s
Checking kABI
kABI check passed
Setting Default Kernel to /boot/vmlinuz-5.14.0-rnicolescu_ciqlts9_4-2a15422fed93+ and Index to 4
The default is /boot/loader/entries/3894cdebe7764464a6bb5aa6743dc10c-5.14.0-rnicolescu_ciqlts9_4-2a15422fed93+.conf with index 4 and kernel /boot/vmlinuz-5.14.0-rnicolescu_ciqlts9_4-2a15422fed93+
The default is /boot/loader/entries/3894cdebe7764464a6bb5aa6743dc10c-5.14.0-rnicolescu_ciqlts9_4-2a15422fed93+.conf with index 4 and kernel /boot/vmlinuz-5.14.0-rnicolescu_ciqlts9_4-2a15422fed93+
Generating grub configuration file ...
Adding boot menu entry for UEFI Firmware Settings ...
done
Hopefully Grub2.0 took everything ... rebooting after time metrices
[TIMER]{MRPROPER}: 8s
[TIMER]{BUILD}: 1453s
[TIMER]{MODULES}: 8s
[TIMER]{INSTALL}: 20s
[TIMER]{TOTAL} 1494s
Rebooting in 10 seconds

kernel-build-before.log
kernel-build-after.log

Kselftests

> ~/ciq/vms/ciqlts9_4/kernel-tools/kselftest-diff.sh ~/ciq/vms/ciqlts9_4
/home/rnicolescu/ciq/vms/ciqlts9_4/kselftest-before.log
354
/home/rnicolescu/ciq/vms/ciqlts9_4/kselftest-after.log
367
Before: /home/rnicolescu/ciq/vms/ciqlts9_4/kselftest-before.log
After: /home/rnicolescu/ciq/vms/ciqlts9_4/kselftest-after.log
Diff:
+ok 12 selftests: x86: fsgsbase_restore_64
+ok 13 selftests: x86: sigaltstack_64
+ok 14 selftests: x86: fsgsbase_64
+ok 15 selftests: x86: sysret_rip_64
+ok 16 selftests: x86: syscall_numbering_64
+ok 17 selftests: x86: corrupt_xstate_header_64
+ok 2 selftests: x86: sysret_ss_attrs_64
+ok 3 selftests: x86: syscall_nt_64
+ok 4 selftests: x86: test_mremap_vdso_64
+ok 5 selftests: x86: check_initial_reg_state_64
+ok 7 selftests: x86: iopl_64
+ok 8 selftests: x86: ioperm_64
+ok 9 selftests: x86: test_vsyscall_64

kselftest-after.log
kselftest-before.log

Check_kernel_commits including interdiff

> check_kernel_commits.py --repo ~/ciq/vms/ciqlts9_4/kernel-src-tree-fix --pr_branch {rnicolescu}_ciqlts9_4 --base_branch ciqlts9_4
Comparing commits aed237f645caaa7ae183dc70856c318058003358 and 689640efc0a2c4e07e6f88affe6d42cd40cc3f85...
interdiff result:
No diff between aed237f645caaa7ae183dc70856c318058003358 and 689640efc0a2c4e07e6f88affe6d42cd40cc3f85
Comparing commits 851bb9db07fde503e3c9f80c51ee855bbe3132dd and d8b228318935044dafe3a5bc07ee71a1f1424b8d...
interdiff result:
No diff between 851bb9db07fde503e3c9f80c51ee855bbe3132dd and d8b228318935044dafe3a5bc07ee71a1f1424b8d
Comparing commits efc8e7271d83e4e4c94b4ce8d050e8f051bc3d9d and 43ffe6caccc7a1bb9d7442fbab521efbf6c1378c...
interdiff result:
No diff between efc8e7271d83e4e4c94b4ce8d050e8f051bc3d9d and 43ffe6caccc7a1bb9d7442fbab521efbf6c1378c
Comparing commits 8eb0e45cb5194338cce52d3ad3cd79c510637637 and 6ccbda44e2cc3d26fd22af54c650d6d5d801addf...
interdiff result:
No diff between 8eb0e45cb5194338cce52d3ad3cd79c510637637 and 6ccbda44e2cc3d26fd22af54c650d6d5d801addf
Comparing commits a22d3872336d727d1d09727a8cf1a6959859f4b7 and 015bac5daca978448f2671478c553ce1f300c21e...
interdiff result:
No diff between a22d3872336d727d1d09727a8cf1a6959859f4b7 and 015bac5daca978448f2671478c553ce1f300c21e
Comparing commits 8b5c04f568ed0b9439ec1ed9a7e398c8db163325 and b2beb5bb2cd90d7939e470ed4da468683f41baa3...
interdiff result:
No diff between 8b5c04f568ed0b9439ec1ed9a7e398c8db163325 and b2beb5bb2cd90d7939e470ed4da468683f41baa3
Comparing commits 2a15422fed934f073e84849ee3e7b2d8cf9dd004 and 2d72afb340657f03f7261e9243b44457a9228ac7...
interdiff result:
No diff between 2a15422fed934f073e84849ee3e7b2d8cf9dd004 and 2d72afb340657f03f7261e9243b44457a9228ac7
All referenced commits exist upstream and have no Fixes: tags.

jira VULN-70088
cve CVE-2022-50087
commit-author Sudeep Holla <sudeep.holla@arm.com>
commit 689640e

When scpi probe fails, at any point, we need to ensure that the scpi_info
is not set and will remain NULL until the probe succeeds. If it is not
taken care, then it could result use-after-free as the value is exported
via get_scpi_ops() and could refer to a memory allocated via devm_kzalloc()
but freed when the probe fails.

Link: https://lore.kernel.org/r/20220701160310.148344-1-sudeep.holla@arm.com
	Cc: stable@vger.kernel.org # 4.19+
	Reported-by: huhai <huhai@kylinos.cn>
	Reviewed-by: Jackie Liu <liuyun01@kylinos.cn>
	Signed-off-by: Sudeep Holla <sudeep.holla@arm.com>
(cherry picked from commit 689640e)
	Signed-off-by: Roxana Nicolescu <rnicolescu@ciq.com>
jira VULN-67490
cve CVE-2023-53125
commit-author Szymon Heidrich <szymon.heidrich@gmail.com>
commit d8b2283

Packet length retrieved from skb data may be larger than
the actual socket buffer length (up to 9026 bytes). In such
case the cloned skb passed up the network stack will leak
kernel memory contents.

Fixes: d0cad87 ("smsc75xx: SMSC LAN75xx USB gigabit ethernet adapter driver")
	Signed-off-by: Szymon Heidrich <szymon.heidrich@gmail.com>
	Signed-off-by: David S. Miller <davem@davemloft.net>
(cherry picked from commit d8b2283)
	Signed-off-by: Roxana Nicolescu <rnicolescu@ciq.com>
…in skb_pull

jira VULN-67490
cve-bf CVE-2023-53125
commit-author Szymon Heidrich <szymon.heidrich@gmail.com>
commit 43ffe6c

Packet length check needs to be located after size and align_count
calculation to prevent kernel panic in skb_pull() in case
rx_cmd_a & RX_CMD_A_RED evaluates to true.

Fixes: d8b2283 ("net: usb: smsc75xx: Limit packet length to skb->len")
	Signed-off-by: Szymon Heidrich <szymon.heidrich@gmail.com>
Link: https://lore.kernel.org/r/20230316110540.77531-1-szymon.heidrich@gmail.com
	Signed-off-by: Jakub Kicinski <kuba@kernel.org>
(cherry picked from commit 43ffe6c)
	Signed-off-by: Roxana Nicolescu <rnicolescu@ciq.com>
jira VULN-67737
cve CVE-2025-37823
commit-author Cong Wang <xiyou.wangcong@gmail.com>
commit 6ccbda4

Similarly to the previous patch, we need to safe guard hfsc_dequeue()
too. But for this one, we don't have a reliable reproducer.

Fixes: 1da177e ("Linux-2.6.12-rc2")
	Reported-by: Gerrard Tai <gerrard.tai@starlabs.sg>
	Signed-off-by: Cong Wang <xiyou.wangcong@gmail.com>
	Reviewed-by: Jamal Hadi Salim <jhs@mojatatu.com>
Link: https://patch.msgid.link/20250417184732.943057-3-xiyou.wangcong@gmail.com
	Signed-off-by: Jakub Kicinski <kuba@kernel.org>
(cherry picked from commit 6ccbda4)
	Signed-off-by: Roxana Nicolescu <rnicolescu@ciq.com>
jira VULN-72065
cve CVE-2025-38200
commit-author Kyungwook Boo <bookyungwook@gmail.com>
commit 015bac5

When the device sends a specific input, an integer underflow can occur, leading
to MMIO write access to an invalid page.

Prevent the integer underflow by changing the type of related variables.

	Signed-off-by: Kyungwook Boo <bookyungwook@gmail.com>
Link: https://lore.kernel.org/lkml/ffc91764-1142-4ba2-91b6-8c773f6f7095@gmail.com/T/
	Reviewed-by: Przemek Kitszel <przemyslaw.kitszel@intel.com>
	Reviewed-by: Simon Horman <horms@kernel.org>
	Reviewed-by: Aleksandr Loktionov <aleksandr.loktionov@intel.com>
	Tested-by: Rinitha S <sx.rinitha@intel.com> (A Contingent worker at Intel)
	Signed-off-by: Tony Nguyen <anthony.l.nguyen@intel.com>
(cherry picked from commit 015bac5)
	Signed-off-by: Roxana Nicolescu <rnicolescu@ciq.com>
jira VULN-136700
cve CVE-2025-38392
commit-author Ahmed Zaki <ahmed.zaki@intel.com>
commit b2beb5b

With VIRTCHNL2_CAP_MACFILTER enabled, the following warning is generated
on module load:

[  324.701677] BUG: sleeping function called from invalid context at kernel/locking/mutex.c:578
[  324.701684] in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 1582, name: NetworkManager
[  324.701689] preempt_count: 201, expected: 0
[  324.701693] RCU nest depth: 0, expected: 0
[  324.701697] 2 locks held by NetworkManager/1582:
[  324.701702]  #0: ffffffff9f7be770 (rtnl_mutex){....}-{3:3}, at: rtnl_newlink+0x791/0x21e0
[  324.701730]  #1: ff1100216c380368 (_xmit_ETHER){....}-{2:2}, at: __dev_open+0x3f0/0x870
[  324.701749] Preemption disabled at:
[  324.701752] [<ffffffff9cd23b9d>] __dev_open+0x3dd/0x870
[  324.701765] CPU: 30 UID: 0 PID: 1582 Comm: NetworkManager Not tainted 6.15.0-rc5+ #2 PREEMPT(voluntary)
[  324.701771] Hardware name: Intel Corporation M50FCP2SBSTD/M50FCP2SBSTD, BIOS SE5C741.86B.01.01.0001.2211140926 11/14/2022
[  324.701774] Call Trace:
[  324.701777]  <TASK>
[  324.701779]  dump_stack_lvl+0x5d/0x80
[  324.701788]  ? __dev_open+0x3dd/0x870
[  324.701793]  __might_resched.cold+0x1ef/0x23d
<..>
[  324.701818]  __mutex_lock+0x113/0x1b80
<..>
[  324.701917]  idpf_ctlq_clean_sq+0xad/0x4b0 [idpf]
[  324.701935]  ? kasan_save_track+0x14/0x30
[  324.701941]  idpf_mb_clean+0x143/0x380 [idpf]
<..>
[  324.701991]  idpf_send_mb_msg+0x111/0x720 [idpf]
[  324.702009]  idpf_vc_xn_exec+0x4cc/0x990 [idpf]
[  324.702021]  ? rcu_is_watching+0x12/0xc0
[  324.702035]  idpf_add_del_mac_filters+0x3ed/0xb50 [idpf]
<..>
[  324.702122]  __hw_addr_sync_dev+0x1cf/0x300
[  324.702126]  ? find_held_lock+0x32/0x90
[  324.702134]  idpf_set_rx_mode+0x317/0x390 [idpf]
[  324.702152]  __dev_open+0x3f8/0x870
[  324.702159]  ? __pfx___dev_open+0x10/0x10
[  324.702174]  __dev_change_flags+0x443/0x650
<..>
[  324.702208]  netif_change_flags+0x80/0x160
[  324.702218]  do_setlink.isra.0+0x16a0/0x3960
<..>
[  324.702349]  rtnl_newlink+0x12fd/0x21e0

The sequence is as follows:
	rtnl_newlink()->
	__dev_change_flags()->
	__dev_open()->
	dev_set_rx_mode() - >  # disables BH and grabs "dev->addr_list_lock"
	idpf_set_rx_mode() ->  # proceed only if VIRTCHNL2_CAP_MACFILTER is ON
	__dev_uc_sync() ->
	idpf_add_mac_filter ->
	idpf_add_del_mac_filters ->
	idpf_send_mb_msg() ->
	idpf_mb_clean() ->
	idpf_ctlq_clean_sq()   # mutex_lock(cq_lock)

Fix by converting cq_lock to a spinlock. All operations under the new
lock are safe except freeing the DMA memory, which may use vunmap(). Fix
by requesting a contiguous physical memory for the DMA mapping.

Fixes: a251eee ("idpf: add SRIOV support and other ndo_ops")
	Reviewed-by: Aleksandr Loktionov <aleksandr.loktionov@intel.com>
	Signed-off-by: Ahmed Zaki <ahmed.zaki@intel.com>
	Reviewed-by: Simon Horman <horms@kernel.org>
	Tested-by: Samuel Salin <Samuel.salin@intel.com>
	Signed-off-by: Tony Nguyen <anthony.l.nguyen@intel.com>
(cherry picked from commit b2beb5b)
	Signed-off-by: Roxana Nicolescu <rnicolescu@ciq.com>
jira VULN-89210
cve CVE-2025-38472
commit-author Florian Westphal <fw@strlen.de>
commit 2d72afb

A crash in conntrack was reported while trying to unlink the conntrack
entry from the hash bucket list:
    [exception RIP: __nf_ct_delete_from_lists+172]
    [..]
 #7 [ff539b5a2b043aa0] nf_ct_delete at ffffffffc124d421 [nf_conntrack]
 #8 [ff539b5a2b043ad0] nf_ct_gc_expired at ffffffffc124d999 [nf_conntrack]
 #9 [ff539b5a2b043ae0] __nf_conntrack_find_get at ffffffffc124efbc [nf_conntrack]
    [..]

The nf_conn struct is marked as allocated from slab but appears to be in
a partially initialised state:

 ct hlist pointer is garbage; looks like the ct hash value
 (hence crash).
 ct->status is equal to IPS_CONFIRMED|IPS_DYING, which is expected
 ct->timeout is 30000 (=30s), which is unexpected.

Everything else looks like normal udp conntrack entry.  If we ignore
ct->status and pretend its 0, the entry matches those that are newly
allocated but not yet inserted into the hash:
  - ct hlist pointers are overloaded and store/cache the raw tuple hash
  - ct->timeout matches the relative time expected for a new udp flow
    rather than the absolute 'jiffies' value.

If it were not for the presence of IPS_CONFIRMED,
__nf_conntrack_find_get() would have skipped the entry.

Theory is that we did hit following race:

cpu x 			cpu y			cpu z
 found entry E		found entry E
 E is expired		<preemption>
 nf_ct_delete()
 return E to rcu slab
					init_conntrack
					E is re-inited,
					ct->status set to 0
					reply tuplehash hnnode.pprev
					stores hash value.

cpu y found E right before it was deleted on cpu x.
E is now re-inited on cpu z.  cpu y was preempted before
checking for expiry and/or confirm bit.

					->refcnt set to 1
					E now owned by skb
					->timeout set to 30000

If cpu y were to resume now, it would observe E as
expired but would skip E due to missing CONFIRMED bit.

					nf_conntrack_confirm gets called
					sets: ct->status |= CONFIRMED
					This is wrong: E is not yet added
					to hashtable.

cpu y resumes, it observes E as expired but CONFIRMED:
			<resumes>
			nf_ct_expired()
			 -> yes (ct->timeout is 30s)
			confirmed bit set.

cpu y will try to delete E from the hashtable:
			nf_ct_delete() -> set DYING bit
			__nf_ct_delete_from_lists

Even this scenario doesn't guarantee a crash:
cpu z still holds the table bucket lock(s) so y blocks:

			wait for spinlock held by z

					CONFIRMED is set but there is no
					guarantee ct will be added to hash:
					"chaintoolong" or "clash resolution"
					logic both skip the insert step.
					reply hnnode.pprev still stores the
					hash value.

					unlocks spinlock
					return NF_DROP
			<unblocks, then
			 crashes on hlist_nulls_del_rcu pprev>

In case CPU z does insert the entry into the hashtable, cpu y will unlink
E again right away but no crash occurs.

Without 'cpu y' race, 'garbage' hlist is of no consequence:
ct refcnt remains at 1, eventually skb will be free'd and E gets
destroyed via: nf_conntrack_put -> nf_conntrack_destroy -> nf_ct_destroy.

To resolve this, move the IPS_CONFIRMED assignment after the table
insertion but before the unlock.

Pablo points out that the confirm-bit-store could be reordered to happen
before hlist add resp. the timeout fixup, so switch to set_bit and
before_atomic memory barrier to prevent this.

It doesn't matter if other CPUs can observe a newly inserted entry right
before the CONFIRMED bit was set:

Such event cannot be distinguished from above "E is the old incarnation"
case: the entry will be skipped.

Also change nf_ct_should_gc() to first check the confirmed bit.

The gc sequence is:
 1. Check if entry has expired, if not skip to next entry
 2. Obtain a reference to the expired entry.
 3. Call nf_ct_should_gc() to double-check step 1.

nf_ct_should_gc() is thus called only for entries that already failed an
expiry check. After this patch, once the confirmed bit check passes
ct->timeout has been altered to reflect the absolute 'best before' date
instead of a relative time.  Step 3 will therefore not remove the entry.

Without this change to nf_ct_should_gc() we could still get this sequence:

 1. Check if entry has expired.
 2. Obtain a reference.
 3. Call nf_ct_should_gc() to double-check step 1:
    4 - entry is still observed as expired
    5 - meanwhile, ct->timeout is corrected to absolute value on other CPU
      and confirm bit gets set
    6 - confirm bit is seen
    7 - valid entry is removed again

First do check 6), then 4) so the gc expiry check always picks up either
confirmed bit unset (entry gets skipped) or expiry re-check failure for
re-inited conntrack objects.

This change cannot be backported to releases before 5.19. Without
commit 8a75a2c ("netfilter: conntrack: remove unconfirmed list")
|= IPS_CONFIRMED line cannot be moved without further changes.

	Cc: Razvan Cojocaru <rzvncj@gmail.com>
Link: https://lore.kernel.org/netfilter-devel/20250627142758.25664-1-fw@strlen.de/
Link: https://lore.kernel.org/netfilter-devel/4239da15-83ff-4ca4-939d-faef283471bb@gmail.com/
Fixes: 1397af5 ("netfilter: conntrack: remove the percpu dying list")
	Signed-off-by: Florian Westphal <fw@strlen.de>
	Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
(cherry picked from commit 2d72afb)
	Signed-off-by: Roxana Nicolescu <rnicolescu@ciq.com>
@roxanan1996 roxanan1996 requested a review from a team October 22, 2025 15:11
@PlaidCat PlaidCat requested review from a team and kerneltoast October 22, 2025 15:29
@PlaidCat
Copy link
Collaborator

I have no direct issues but have a questions about a specific context that is not 1:1 but inter-diff said there is no difference.

@roxanan1996
Copy link
Author

I have no direct issues but have a questions about a specific context that is not 1:1 but inter-diff said there is no difference.

May I ask what tool you use? Because I did not catch this

@PlaidCat
Copy link
Collaborator

PlaidCat commented Oct 22, 2025

I have no direct issues but have a questions about a specific context that is not 1:1 but inter-diff said there is no difference.

May I ask what tool you use? Because I did not catch this

Eyeballs and side by side FIrefox browsers ... super high tech tools /s

Copy link
Collaborator

@bmastbergen bmastbergen left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🥌

Copy link
Collaborator

@PlaidCat PlaidCat left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

:shipit:

@roxanan1996 roxanan1996 merged commit 7e36188 into ciqlts9_4 Oct 24, 2025
5 of 8 checks passed
@roxanan1996 roxanan1996 changed the title [lts9-2] Adress multiple VULNS [lts9-4] Adress multiple VULNS Oct 27, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Development

Successfully merging this pull request may close these issues.

5 participants