"value":"In the Linux kernel, the following vulnerability has been resolved:\n\nplatform/x86: ISST: Fix the KASAN report slab-out-of-bounds bug\n\nAttaching SST PCI device to VM causes \"BUG: KASAN: slab-out-of-bounds\".\nkasanreport:\n[19.411889]==================================================================\n[19.413702]BUG:KASAN:slab-out-of-boundsin_isst_if_get_pci_dev+0x3d5/0x400[isst_if_common]\n[19.415634]Readofsize8ataddrffff888829e65200bytaskcpuhp/16/113\n[19.417368]\n[19.418627]CPU:16PID:113Comm:cpuhp/16Tainted:GE6.9.0#10\n[19.420435]Hardwarename:VMware,Inc.VMware20,1/440BXDesktopReferencePlatform,BIOSVMW201.00V.20192059.B64.220728071307/28/2022\n[19.422687]CallTrace:\n[19.424091]<TASK>\n[19.425448]dump_stack_lvl+0x5d/0x80\n[19.426963]?_isst_if_get_pci_dev+0x3d5/0x400[isst_if_common]\n[19.428694]print_report+0x19d/0x52e\n[19.430206]?__pfx__raw_spin_lock_irqsave+0x10/0x10\n[19.431837]?_isst_if_get_pci_dev+0x3d5/0x400[isst_if_common]\n[19.433539]kasan_report+0xf0/0x170\n[19.435019]?_isst_if_get_pci_dev+0x3d5/0x400[isst_if_common]\n[19.436709]_isst_if_get_pci_dev+0x3d5/0x400[isst_if_common]\n[19.438379]?__pfx_sched_clock_cpu+0x10/0x10\n[19.439910]isst_if_cpu_online+0x406/0x58f[isst_if_common]\n[19.441573]?__pfx_isst_if_cpu_online+0x10/0x10[isst_if_common]\n[19.443263]?ttwu_queue_wakelist+0x2c1/0x360\n[19.444797]cpuhp_invoke_callback+0x221/0xec0\n[19.446337]cpuhp_thread_fun+0x21b/0x610\n[19.447814]?__pfx_cpuhp_thread_fun+0x10/0x10\n[19.449354]smpboot_thread_fn+0x2e7/0x6e0\n[19.450859]?__pfx_smpboot_thread_fn+0x10/0x10\n[19.452405]kthread+0x29c/0x350\n[19.453817]?__pfx_kthread+0x10/0x10\n[19.455253]ret_from_fork+0x31/0x70\n[19.456685]?__pfx_kthread+0x10/0x10\n[19.458114]ret_from_fork_asm+0x1a/0x30\n[19.459573]</TASK>\n[19.460853]\n[19.462055]Allocatedbytask1198:\n[19.463410]kasan_save_stack+0x30/0x50\n[19.464788]kasan_save_track+0x14/0x30\n[19.466139]__kasan_kmalloc+0xaa/0xb0\n[19.467465]__kmalloc+0x1cd/0x470\n[19.468748]isst_if_cdev_register+0x1da/0x350[isst_if_common]\n[19.470233]isst_if_mbox_init+0x108/0xff0[isst_if_mbox_msr]\n[19.471670]do_one_initcall+0xa4/0x380\n[19.472903]do_init_module+0x238/0x760\n[19.474105]load_module+0x5239/0x6f00\n[19.475285]init_module_from_file+0xd1/0x130\n[19.476506]idempotent_init_module+0x23b/0x650\n[19.477725]__x64_sys_finit_module+0xbe/0x130\n[19.476506]idempotent_init_module+0x23b/0x650\n[19.477725]__x64_sys_finit_module+0xbe/0x130\n[19.478920]do_syscall_64+0x82/0x160\n[19.480036]entry_SYSCALL_64_after_hwframe+0x76/0x7e\n[19.481292]\n[19.482205]Thebuggyaddressbelongstotheobjectatffff888829e65000\nwhichbelongstothecachekmalloc-512ofsize512\n[19.484818]Thebuggyaddressislocated0bytestotherightof\nallocated512-byteregion[ffff888829e65000,ffff888829e65200)\n[19.487447]\n[19.488328]Thebuggyaddressbelongstothephysicalpage:\n[19.489569]page:refcount:1mapcount:0mapping:0000000000000000index:0xffff888829e60c00pfn:0x829e60\n[19.491140]head:order:3entire_mapcount:0nr_pages_mapped:0pincount:0\n[19.492466]anonflags:0x57ffffc0000840(slab|head|node=1|zone=2|lastcpupid=0x1fffff)\n[19.493914]page_type:0xffffffff()\n[19.494988]raw:0057ffffc0000840ffff88810004cc8000000000000000000000000000000001\n[19.496451]raw:ffff888829e60c00000000008020001800000001ffffffff0000000000000000\n[19.497906]head:0057ffffc0000840ffff88810004cc8000000000000000000000000000000001\n[19.499379]head:ffff888829e60c00000000008020001800000001ffffffff0000000000000000\n[19.500844]head:0057ffffc0000003ffffea0020a79801ffffea0020a7984800000000ffffffff\n[19.502316]head:0000000800000000000000000000000000000000ffffffff0000000000000000\n[19.503784]pagedumpedbecause:k\n---truncate