diff --git a/sig/Cloud_Kernel_Sig/content/ReleaseNotes/5.10/5.10-019.y.md b/sig/Cloud_Kernel_Sig/content/ReleaseNotes/5.10/5.10-019.y.md new file mode 100644 index 0000000000000000000000000000000000000000..2544524770cb8fa689f90824370a86d211c3cf2d --- /dev/null +++ b/sig/Cloud_Kernel_Sig/content/ReleaseNotes/5.10/5.10-019.y.md @@ -0,0 +1,282 @@ +# 5.10-019 +发布时间: 2025-05-22 +发布链接: +- [anolis8](https://anas.openanolis.cn/errata/detail/ANSA-2025:0276) + +## 引言 +ANCK 5.10-019 是 ANCK 5.10 的第 19 个大版本,基于 LTS 5.10.134 版本内核。 + +## 使用方法 +使用以下命令安装最新内核: +`yum install -y --releasever 8.10 --enable "kernel-5.10" kernel-5.10.134-19.an8` +或者 +`yum update -y --releasever 8.10 --enable "kernel-5.10" kernel` + +## 新硬件使能支持 +- 正式支持 kunpeng-920 平台 + +## 新特性及重要 Bugfix +- 调度: + - 回合 cluster 调度特性 + - 支持为根组的不可移动线程配置 bvt + - core sched 支持对每个 cookie 独立配置特殊属性: + - 可与不带 cookie 的普通任务共享 core + - 防止负载均衡自动聚拢相同 cookie 的任务,呈现打散在不同 core 的效果 +- 内存: + - kfence 修复稳定性问题 + - 代码大页 THP 计数问题修复。 + - mmap() 支持 THP 对齐地址空间分配。 + - virtio-mem 支持 memmap_on_memory 特性,帮助容器内存快速扩缩容。 + - 其它内存 CVE 补丁合入。 +- 网络: + - smc: + - 修复 link group 和 link use-after-free 问题。 + - 修复容器场景 smc-r 设备查找失败问题。 +- 存储: + - erofs: + - 回合了若干主线的 erofs 文件系统的修复。 + - 新增文件备份挂载和48位布局支持。 + - 添加压缩文件的 sub-page 块支持。 + - ext4、 block、 blk-mq、io_uring 等组件的主线 stable 分支补丁回合。 + - 新增 virtio-blk passthrough 特性,为 virtio-blk 设备添加直通能力支持: + - 为每个 virtio-blk 块设备新增一个通用字符设备,命名为 /dev/vdXc0 ,允许用户使用 io_uring 框架提供的 uring_cmd 方式,直接向 virtio-blk 驱动层发送读写命令。 + - 基于上述能力,新增 virtio-blk 设备的双向命令支持,基于同一个 sector 基址,可以在向量类读写中,指定写缓冲区个数和读缓冲区个数,实现一条 I/O 指令同时完成读、写操作(目前仅支持先写后读) + - 基于 virtio-blk,提供一种 virtio_ring 的扩展,命名为 ring_pair。此时 virtio-blk 的每个请求硬件队列实际对应两个 virtio_ring 队列,分别为请求队列(SQ)和完成队列(CQ)。请求下发后,驱动可以主动回收已经下发的 I/O 命令所在的 slot,继续下发其它请求。 I/O 完成时,由后端回填 CQ,驱动端负责响应收割。该特性需要后端支持 ring_pair 这种运行方式,且当前仅支持 vring split_queue + Indirect descriptor 模式。 +- 驱动: + - NVMe 驱动支持批量处理完成的 polled IO 命令。 + - 修复 SCSI 海思 sas 驱动以及 libsas 的大量问题。 + - 回合 PCIe 驱动 bugfix 补丁,修复空间大小计算错误、root bus 分配等问题。 +- BPF: + - 回合 stable 社区 bugfix 及 CVE 修复补丁 + +## 重要 CVE 修复列表 +- CVE-2025-21887 ([PR#5029](https://gitee.com/anolis/cloud-kernel/pulls/5029)) +- CVE-2025-21734 ([PR#4951](https://gitee.com/anolis/cloud-kernel/pulls/4951)) +- CVE-2025-21726 ([PR#4942](https://gitee.com/anolis/cloud-kernel/pulls/4942)) +- CVE-2022-48651 ([PR#4940](https://gitee.com/anolis/cloud-kernel/pulls/4940)) +- CVE-2024-26810 ([PR#4390](https://gitee.com/anolis/cloud-kernel/pulls/4390)) +- CVE-2024-57889 ([PR#4887](https://gitee.com/anolis/cloud-kernel/pulls/4887)) +- CVE-2025-21689 ([PR#4883](https://gitee.com/anolis/cloud-kernel/pulls/4883)) +- CVE-2025-21704 ([PR#4877](https://gitee.com/anolis/cloud-kernel/pulls/4877)) +- CVE-2025-21804 ([PR#4876](https://gitee.com/anolis/cloud-kernel/pulls/4876)) +- CVE-2024-26934 ([PR#4938](https://gitee.com/anolis/cloud-kernel/pulls/4938)) +- CVE-2024-26970 ([PR#4937](https://gitee.com/anolis/cloud-kernel/pulls/4937)) +- CVE-2022-48993 ([PR#4936](https://gitee.com/anolis/cloud-kernel/pulls/4936)) +- CVE-2024-47755 ([PR#4935](https://gitee.com/anolis/cloud-kernel/pulls/4935)) +- CVE-2024-26749 ([PR#4934](https://gitee.com/anolis/cloud-kernel/pulls/4934)) +- CVE-2024-49954 ([PR#4892](https://gitee.com/anolis/cloud-kernel/pulls/4892)) +- CVE-2024-47739 ([PR#4928](https://gitee.com/anolis/cloud-kernel/pulls/4928)) +- CVE-2025-21853 ([PR#4922](https://gitee.com/anolis/cloud-kernel/pulls/4922)) +- CVE-2025-21727 ([PR#4885](https://gitee.com/anolis/cloud-kernel/pulls/4885)) +- CVE-2024-26778 ([PR#4295](https://gitee.com/anolis/cloud-kernel/pulls/4295)) +- CVE-2024-50301 ([PR#4931](https://gitee.com/anolis/cloud-kernel/pulls/4931)) +- CVE-2022-49562 ([PR#4932](https://gitee.com/anolis/cloud-kernel/pulls/4932)) +- CVE-2024-50180 ([PR#4262](https://gitee.com/anolis/cloud-kernel/pulls/4262)) +- CVE-2024-50181 ([PR#4264](https://gitee.com/anolis/cloud-kernel/pulls/4264)) +- CVE-2024-50267 ([PR#4259](https://gitee.com/anolis/cloud-kernel/pulls/4259)) +- CVE-2022-49562 ([PR#4913](https://gitee.com/anolis/cloud-kernel/pulls/4913)) +- CVE-2022-49046 ([PR#4908](https://gitee.com/anolis/cloud-kernel/pulls/4908)) +- CVE-2024-36476 ([PR#4903](https://gitee.com/anolis/cloud-kernel/pulls/4903)) +- CVE-2022-49711 ([PR#4907](https://gitee.com/anolis/cloud-kernel/pulls/4907)) +- CVE-2024-57981 ([PR#4906](https://gitee.com/anolis/cloud-kernel/pulls/4906)) +- CVE-2024-57913 ([PR#4905](https://gitee.com/anolis/cloud-kernel/pulls/4905)) +- CVE-2025-21814 ([PR#4918](https://gitee.com/anolis/cloud-kernel/pulls/4918)) +- CVE-2024-57917 ([PR#4917](https://gitee.com/anolis/cloud-kernel/pulls/4917)) +- CVE-2024-56610 ([PR#4898](https://gitee.com/anolis/cloud-kernel/pulls/4898)) +- CVE-2024-50002 ([PR#4893](https://gitee.com/anolis/cloud-kernel/pulls/4893)) +- CVE-2024-43889 ([PR#4890](https://gitee.com/anolis/cloud-kernel/pulls/4890)) +- CVE-2022-49444 ([PR#4919](https://gitee.com/anolis/cloud-kernel/pulls/4919)) +- CVE-2022-49190 ([PR#4910](https://gitee.com/anolis/cloud-kernel/pulls/4910)) +- CVE-2023-52486 ([PR#4255](https://gitee.com/anolis/cloud-kernel/pulls/4255)) +- CVE-2025-21656 ([PR#4916](https://gitee.com/anolis/cloud-kernel/pulls/4916)) +- CVE-2025-21787 ([PR#4915](https://gitee.com/anolis/cloud-kernel/pulls/4915)) +- CVE-2025-21724 ([PR#4914](https://gitee.com/anolis/cloud-kernel/pulls/4914)) +- CVE-2022-49398 ([PR#4912](https://gitee.com/anolis/cloud-kernel/pulls/4912)) +- CVE-2022-49219 ([PR#4909](https://gitee.com/anolis/cloud-kernel/pulls/4909)) +- CVE-2022-49443 ([PR#4911](https://gitee.com/anolis/cloud-kernel/pulls/4911)) +- CVE-2024-48881 ([PR#4487](https://gitee.com/anolis/cloud-kernel/pulls/4487)) +- CVE-2024-26812 ([PR#4389](https://gitee.com/anolis/cloud-kernel/pulls/4389)) +- CVE-2024-53214 ([PR#4899](https://gitee.com/anolis/cloud-kernel/pulls/4899)) +- CVE-2024-56636 ([PR#4413](https://gitee.com/anolis/cloud-kernel/pulls/4413)) +- CVE-2024-53172 ([PR#4901](https://gitee.com/anolis/cloud-kernel/pulls/4901)) +- CVE-2024-56747 ([PR#4900](https://gitee.com/anolis/cloud-kernel/pulls/4900)) +- CVE-2024-53157 ([PR#4375](https://gitee.com/anolis/cloud-kernel/pulls/4375)) +- CVE-2023-52880 ([PR#4897](https://gitee.com/anolis/cloud-kernel/pulls/4897)) +- CVE-2024-43098 ([PR#4489](https://gitee.com/anolis/cloud-kernel/pulls/4489)) +- CVE-2024-49569 ([PR#4894](https://gitee.com/anolis/cloud-kernel/pulls/4894)) +- CVE-2023-52898 ([PR#4895](https://gitee.com/anolis/cloud-kernel/pulls/4895)) +- CVE-2024-57807 ([PR#4896](https://gitee.com/anolis/cloud-kernel/pulls/4896)) +- CVE-2023-52789 ([PR#4333](https://gitee.com/anolis/cloud-kernel/pulls/4333)) +- CVE-2024-53161 ([PR#4377](https://gitee.com/anolis/cloud-kernel/pulls/4377)) +- CVE-2024-53194 ([PR#4889](https://gitee.com/anolis/cloud-kernel/pulls/4889)) +- CVE-2024-56698 ([PR#4468](https://gitee.com/anolis/cloud-kernel/pulls/4468)) +- CVE-2024-56739 ([PR#4430](https://gitee.com/anolis/cloud-kernel/pulls/4430)) +- CVE-2024-56756 ([PR#4429](https://gitee.com/anolis/cloud-kernel/pulls/4429)) +- CVE-2024-44990 ([PR#4862](https://gitee.com/anolis/cloud-kernel/pulls/4862)) +- CVE-2024-45006 ([PR#4861](https://gitee.com/anolis/cloud-kernel/pulls/4861)) +- CVE-2024-43894 ([PR#4860](https://gitee.com/anolis/cloud-kernel/pulls/4860)) +- CVE-2024-43883 ([PR#4858](https://gitee.com/anolis/cloud-kernel/pulls/4858)) +- CVE-2024-50153 ([PR#4857](https://gitee.com/anolis/cloud-kernel/pulls/4857)) +- CVE-2024-50150 ([PR#4856](https://gitee.com/anolis/cloud-kernel/pulls/4856)) +- CVE-2022-48981 ([PR#4854](https://gitee.com/anolis/cloud-kernel/pulls/4854)) +- CVE-2024-47695 ([PR#4853](https://gitee.com/anolis/cloud-kernel/pulls/4853)) +- CVE-2024-44989 ([PR#4263](https://gitee.com/anolis/cloud-kernel/pulls/4263)) +- CVE-2024-50269 ([PR#4266](https://gitee.com/anolis/cloud-kernel/pulls/4266)) +- CVE-2024-43893 ([PR#4269](https://gitee.com/anolis/cloud-kernel/pulls/4269)) +- CVE-2024-43914 ([PR#4268](https://gitee.com/anolis/cloud-kernel/pulls/4268)) +- CVE-2024-49851 ([PR#4852](https://gitee.com/anolis/cloud-kernel/pulls/4852)) +- CVE-2024-47742 ([PR#4851](https://gitee.com/anolis/cloud-kernel/pulls/4851)) +- CVE-2024-46719 ([PR#4850](https://gitee.com/anolis/cloud-kernel/pulls/4850)) +- CVE-2024-46675 ([PR#4849](https://gitee.com/anolis/cloud-kernel/pulls/4849)) +- CVE-2024-47667 ([PR#4847](https://gitee.com/anolis/cloud-kernel/pulls/4847)) +- CVE-2023-52477 ([PR#4846](https://gitee.com/anolis/cloud-kernel/pulls/4846)) +- CVE-2024-49858 ([PR#4273](https://gitee.com/anolis/cloud-kernel/pulls/4273)) +- CVE-2023-52917 ([PR#4281](https://gitee.com/anolis/cloud-kernel/pulls/4281)) +- CVE-2024-50059 ([PR#4280](https://gitee.com/anolis/cloud-kernel/pulls/4280)) +- CVE-2024-49924 ([PR#4286](https://gitee.com/anolis/cloud-kernel/pulls/4286)) +- CVE-2024-49963 ([PR#4287](https://gitee.com/anolis/cloud-kernel/pulls/4287)) +- CVE-2023-52464 ([PR#4290](https://gitee.com/anolis/cloud-kernel/pulls/4290)) +- CVE-2024-47671 ([PR#4291](https://gitee.com/anolis/cloud-kernel/pulls/4291)) +- CVE-2023-52503 ([PR#4845](https://gitee.com/anolis/cloud-kernel/pulls/4845)) +- CVE-2024-46750 ([PR#4288](https://gitee.com/anolis/cloud-kernel/pulls/4288)) +- CVE-2025-21844 ([PR#4829](https://gitee.com/anolis/cloud-kernel/pulls/4829)) +- CVE-2024-53103 ([PR#4367](https://gitee.com/anolis/cloud-kernel/pulls/4367)) +- CVE-2023-52702 ([PR#4696](https://gitee.com/anolis/cloud-kernel/pulls/4696)) +- CVE-2024-27020 ([PR#4325](https://gitee.com/anolis/cloud-kernel/pulls/4325)) +- CVE-2024-49952 ([PR#4332](https://gitee.com/anolis/cloud-kernel/pulls/4332)) +- CVE-2024-53141 ([PR#4328](https://gitee.com/anolis/cloud-kernel/pulls/4328)) +- CVE-2024-49949 ([PR#4694](https://gitee.com/anolis/cloud-kernel/pulls/4694)) +- CVE-2022-48639 ([PR#4693](https://gitee.com/anolis/cloud-kernel/pulls/4693)) +- CVE-2022-48644 ([PR#4692](https://gitee.com/anolis/cloud-kernel/pulls/4692)) +- CVE-2024-26642 ([PR#4691](https://gitee.com/anolis/cloud-kernel/pulls/4691)) +- CVE-2024-37356 ([PR#4324](https://gitee.com/anolis/cloud-kernel/pulls/4324)) +- CVE-2024-36489 ([PR#4320](https://gitee.com/anolis/cloud-kernel/pulls/4320)) +- CVE-2024-42283 ([PR#4698](https://gitee.com/anolis/cloud-kernel/pulls/4698)) +- CVE-2024-42246 ([PR#4686](https://gitee.com/anolis/cloud-kernel/pulls/4686)) +- CVE-2024-56583 ([PR#4715](https://gitee.com/anolis/cloud-kernel/pulls/4715)) +- CVE-2024-57951 ([PR#4713](https://gitee.com/anolis/cloud-kernel/pulls/4713)) +- CVE-2024-57888 ([PR#4714](https://gitee.com/anolis/cloud-kernel/pulls/4714)) +- CVE-2025-21699 ([PR#4711](https://gitee.com/anolis/cloud-kernel/pulls/4711)) +- CVE-2024-58010 ([PR#4718](https://gitee.com/anolis/cloud-kernel/pulls/4718)) +- CVE-2025-21731 ([PR#4738](https://gitee.com/anolis/cloud-kernel/pulls/4738)) +- CVE-2025-21745 ([PR#4739](https://gitee.com/anolis/cloud-kernel/pulls/4739)) +- CVE-2025-21664 ([PR#4727](https://gitee.com/anolis/cloud-kernel/pulls/4727)) +- CVE-2025-21683 ([PR#4708](https://gitee.com/anolis/cloud-kernel/pulls/4708)) +- CVE-2025-21728 ([PR#4707](https://gitee.com/anolis/cloud-kernel/pulls/4707)) +- CVE-2024-53068 ([PR#4683](https://gitee.com/anolis/cloud-kernel/pulls/4683)) +- CVE-2024-50304 ([PR#4657](https://gitee.com/anolis/cloud-kernel/pulls/4657)) +- CVE-2024-56751 ([PR#4651](https://gitee.com/anolis/cloud-kernel/pulls/4651)) +- CVE-2024-56694 ([PR#4650](https://gitee.com/anolis/cloud-kernel/pulls/4650)) +- CVE-2024-56688 ([PR#4649](https://gitee.com/anolis/cloud-kernel/pulls/4649)) +- CVE-2024-56664 ([PR#4647](https://gitee.com/anolis/cloud-kernel/pulls/4647)) +- CVE-2024-56614 ([PR#4648](https://gitee.com/anolis/cloud-kernel/pulls/4648)) +- CVE-2024-43817 ([PR#4631](https://gitee.com/anolis/cloud-kernel/pulls/4631)) +- CVE-2024-53124 ([PR#4644](https://gitee.com/anolis/cloud-kernel/pulls/4644)) +- CVE-2024-53122 ([PR#4640](https://gitee.com/anolis/cloud-kernel/pulls/4640)) +- CVE-2024-50258 ([PR#4642](https://gitee.com/anolis/cloud-kernel/pulls/4642)) +- CVE-2024-50256 ([PR#4641](https://gitee.com/anolis/cloud-kernel/pulls/4641)) +- CVE-2024-49978 ([PR#4633](https://gitee.com/anolis/cloud-kernel/pulls/4633)) +- CVE-2024-46763 ([PR#4632](https://gitee.com/anolis/cloud-kernel/pulls/4632)) +- CVE-2024-26641 ([PR#4630](https://gitee.com/anolis/cloud-kernel/pulls/4630)) +- CVE-2024-53104 ([PR#4623](https://gitee.com/anolis/cloud-kernel/pulls/4623)) +- CVE-2024-56644 ([PR#4415](https://gitee.com/anolis/cloud-kernel/pulls/4415)) +- CVE-2024-56642 ([PR#4414](https://gitee.com/anolis/cloud-kernel/pulls/4414)) +- CVE-2024-56637 ([PR#4412](https://gitee.com/anolis/cloud-kernel/pulls/4412)) +- CVE-2024-56606 ([PR#4440](https://gitee.com/anolis/cloud-kernel/pulls/4440)) +- CVE-2024-56605 ([PR#4417](https://gitee.com/anolis/cloud-kernel/pulls/4417)) +- CVE-2024-56602 ([PR#4416](https://gitee.com/anolis/cloud-kernel/pulls/4416)) +- CVE-2024-56600 ([PR#4410](https://gitee.com/anolis/cloud-kernel/pulls/4410)) +- CVE-2024-53174 ([PR#4419](https://gitee.com/anolis/cloud-kernel/pulls/4419)) +- CVE-2024-53140 ([PR#4251](https://gitee.com/anolis/cloud-kernel/pulls/4251)) +- CVE-2024-50264 ([PR#4260](https://gitee.com/anolis/cloud-kernel/pulls/4260)) +- CVE-2024-53119 ([PR#4436](https://gitee.com/anolis/cloud-kernel/pulls/4436)) +- CVE-2024-50251 ([PR#4439](https://gitee.com/anolis/cloud-kernel/pulls/4439)) +- CVE-2024-50045 ([PR#4284](https://gitee.com/anolis/cloud-kernel/pulls/4284)) +- CVE-2024-50083 ([PR#4428](https://gitee.com/anolis/cloud-kernel/pulls/4428)) +- CVE-2024-50036 ([PR#4427](https://gitee.com/anolis/cloud-kernel/pulls/4427)) +- CVE-2024-49975 ([PR#4546](https://gitee.com/anolis/cloud-kernel/pulls/4546)) +- CVE-2024-53125 ([PR#4369](https://gitee.com/anolis/cloud-kernel/pulls/4369)) +- CVE-2024-53054 ([PR#4368](https://gitee.com/anolis/cloud-kernel/pulls/4368)) +- CVE-2024-26591 ([PR#4364](https://gitee.com/anolis/cloud-kernel/pulls/4364)) +- CVE-2024-56569 ([PR#4548](https://gitee.com/anolis/cloud-kernel/pulls/4548)) +- CVE-2024-38601 ([PR#4547](https://gitee.com/anolis/cloud-kernel/pulls/4547)) +- CVE-2024-50131 ([PR#4408](https://gitee.com/anolis/cloud-kernel/pulls/4408)) +- CVE-2024-35947 ([PR#4384](https://gitee.com/anolis/cloud-kernel/pulls/4384)) +- CVE-2024-41045 ([PR#4529](https://gitee.com/anolis/cloud-kernel/pulls/4529)) +- CVE-2024-42239 ([PR#4528](https://gitee.com/anolis/cloud-kernel/pulls/4528)) +- CVE-2024-57929 ([PR#4527](https://gitee.com/anolis/cloud-kernel/pulls/4527)) +- CVE-2024-47707 ([PR#4507](https://gitee.com/anolis/cloud-kernel/pulls/4507)) +- CVE-2024-46782 ([PR#4278](https://gitee.com/anolis/cloud-kernel/pulls/4278)) +- CVE-2024-47685 ([PR#4425](https://gitee.com/anolis/cloud-kernel/pulls/4425)) +- CVE-2024-49948 ([PR#4279](https://gitee.com/anolis/cloud-kernel/pulls/4279)) +- CVE-2024-57903 ([PR#4517](https://gitee.com/anolis/cloud-kernel/pulls/4517)) +- CVE-2024-42161 ([PR#4516](https://gitee.com/anolis/cloud-kernel/pulls/4516)) +- CVE-2024-44944 ([PR#4437](https://gitee.com/anolis/cloud-kernel/pulls/4437)) +- CVE-2022-49014 ([PR#4426](https://gitee.com/anolis/cloud-kernel/pulls/4426)) +- CVE-2024-56779 ([PR#4482](https://gitee.com/anolis/cloud-kernel/pulls/4482)) +- CVE-2024-56780 ([PR#4480](https://gitee.com/anolis/cloud-kernel/pulls/4480)) +- CVE-2024-26718 ([PR#4478](https://gitee.com/anolis/cloud-kernel/pulls/4478)) +- CVE-2024-42312 ([PR#4477](https://gitee.com/anolis/cloud-kernel/pulls/4477)) +- CVE-2023-52463 ([PR#4476](https://gitee.com/anolis/cloud-kernel/pulls/4476)) +- CVE-2024-46829 ([PR#4365](https://gitee.com/anolis/cloud-kernel/pulls/4365)) +- CVE-2023-52836 ([PR#4363](https://gitee.com/anolis/cloud-kernel/pulls/4363)) +- CVE-2022-48675 ([PR#4381](https://gitee.com/anolis/cloud-kernel/pulls/4381)) +- CVE-2024-41023 ([PR#4361](https://gitee.com/anolis/cloud-kernel/pulls/4361)) +- CVE-2024-38577 ([PR#4362](https://gitee.com/anolis/cloud-kernel/pulls/4362)) +- CVE-2024-56672 ([PR#4448](https://gitee.com/anolis/cloud-kernel/pulls/4448)) +- CVE-2024-47736 ([PR#4452](https://gitee.com/anolis/cloud-kernel/pulls/4452)) +- CVE-2024-53234 ([PR#4450](https://gitee.com/anolis/cloud-kernel/pulls/4450)) +- CVE-2024-46735 ([PR#4449](https://gitee.com/anolis/cloud-kernel/pulls/4449)) +- CVE-2024-56686 ([PR#4443](https://gitee.com/anolis/cloud-kernel/pulls/4443)) +- CVE-2024-56570 ([PR#4435](https://gitee.com/anolis/cloud-kernel/pulls/4435)) +- CVE-2024-49878 ([PR#4380](https://gitee.com/anolis/cloud-kernel/pulls/4380)) +- CVE-2024-26977 ([PR#4317](https://gitee.com/anolis/cloud-kernel/pulls/4317)) +- CVE-2024-38605 ([PR#3939](https://gitee.com/anolis/cloud-kernel/pulls/3939)) +- CVE-2024-56558 ([PR#4418](https://gitee.com/anolis/cloud-kernel/pulls/4418)) +- CVE-2024-36953 ([PR#4383](https://gitee.com/anolis/cloud-kernel/pulls/4383)) +- CVE-2024-50115 ([PR#4282](https://gitee.com/anolis/cloud-kernel/pulls/4282)) +- CVE-2024-35791 ([PR#4385](https://gitee.com/anolis/cloud-kernel/pulls/4385)) +- CVE-2024-50046 ([PR#4398](https://gitee.com/anolis/cloud-kernel/pulls/4398)) +- CVE-2024-47705 ([PR#4397](https://gitee.com/anolis/cloud-kernel/pulls/4397)) +- CVE-2022-48828 ([PR#4396](https://gitee.com/anolis/cloud-kernel/pulls/4396)) +- CVE-2024-50151 ([PR#4395](https://gitee.com/anolis/cloud-kernel/pulls/4395)) +- CVE-2023-52759 ([PR#4394](https://gitee.com/anolis/cloud-kernel/pulls/4394)) +- CVE-2024-26988 ([PR#4386](https://gitee.com/anolis/cloud-kernel/pulls/4386)) +- CVE-2024-43846 ([PR#4315](https://gitee.com/anolis/cloud-kernel/pulls/4315)) +- CVE-2024-39480 ([PR#4314](https://gitee.com/anolis/cloud-kernel/pulls/4314)) +- CVE-2023-52756 ([PR#4302](https://gitee.com/anolis/cloud-kernel/pulls/4302)) +- CVE-2024-47668 ([PR#4292](https://gitee.com/anolis/cloud-kernel/pulls/4292)) +- CVE-2024-39468 ([PR#4393](https://gitee.com/anolis/cloud-kernel/pulls/4393)) +- CVE-2024-26598 ([PR#4289](https://gitee.com/anolis/cloud-kernel/pulls/4289)) +- CVE-2024-27437 ([PR#4379](https://gitee.com/anolis/cloud-kernel/pulls/4379)) +- CVE-2024-26629 ([PR#4374](https://gitee.com/anolis/cloud-kernel/pulls/4374)) +- CVE-2024-53146 ([PR#4376](https://gitee.com/anolis/cloud-kernel/pulls/4376)) +- CVE-2024-47692 ([PR#4371](https://gitee.com/anolis/cloud-kernel/pulls/4371)) +- CVE-2024-47737 ([PR#4366](https://gitee.com/anolis/cloud-kernel/pulls/4366)) +- CVE-2024-27389 ([PR#4337](https://gitee.com/anolis/cloud-kernel/pulls/4337)) +- CVE-2024-26808 ([PR#4350](https://gitee.com/anolis/cloud-kernel/pulls/4350)) +- CVE-2022-48635 ([PR#4345](https://gitee.com/anolis/cloud-kernel/pulls/4345)) +- CVE-2023-52618 ([PR#4329](https://gitee.com/anolis/cloud-kernel/pulls/4329)) +- CVE-2024-50082 ([PR#4327](https://gitee.com/anolis/cloud-kernel/pulls/4327)) +- CVE-2024-49933 ([PR#4326](https://gitee.com/anolis/cloud-kernel/pulls/4326)) +- CVE-2024-53066 ([PR#4265](https://gitee.com/anolis/cloud-kernel/pulls/4265)) +- CVE-2024-42084 ([PR#4344](https://gitee.com/anolis/cloud-kernel/pulls/4344)) +- CVE-2024-47706 ([PR#4342](https://gitee.com/anolis/cloud-kernel/pulls/4342)) +- CVE-2022-48946 ([PR#4335](https://gitee.com/anolis/cloud-kernel/pulls/4335)) +- CVE-2023-52448 ([PR#4316](https://gitee.com/anolis/cloud-kernel/pulls/4316)) +- CVE-2024-47679 ([PR#4285](https://gitee.com/anolis/cloud-kernel/pulls/4285)) +- CVE-2024-42143 ([PR#4253](https://gitee.com/anolis/cloud-kernel/pulls/4253)) +- CVE-2024-50179 ([PR#4252](https://gitee.com/anolis/cloud-kernel/pulls/4252)) +- CVE-2024-41004 ([PR#4312](https://gitee.com/anolis/cloud-kernel/pulls/4312)) +- CVE-2024-43890 ([PR#4267](https://gitee.com/anolis/cloud-kernel/pulls/4267)) +- CVE-2024-46707 ([PR#3872](https://gitee.com/anolis/cloud-kernel/pulls/3872)) +- CVE-2024-46674 ([PR#4204](https://gitee.com/anolis/cloud-kernel/pulls/4204)) +- CVE-2024-46743 ([PR#4105](https://gitee.com/anolis/cloud-kernel/pulls/4105)) +- CVE-2024-43892 ([PR#4146](https://gitee.com/anolis/cloud-kernel/pulls/4146)) +- CVE-2024-46787 ([PR#4143](https://gitee.com/anolis/cloud-kernel/pulls/4143)) + +## 潜在风险 +- 由于 virtio-blk passthrough 为 virito-blk 设备引入了通用字符设备,可能会导致用户组件在设备检测上出现异常。请注意:对于 /dev/vda 这样的设备,其分区从 1 开始计数。所以,/dev/vdac0 代表的是 /dev/vda 的字符设备,与 /dev/vdac 无关。此外,/dev/vdac0 的文件类型是字符设备,不是块设备,也可以作为区分条件。如果对该字符通道无明确需求,可以升级到 019.1 内核,默认不再对 virtio-blk 设备暴露该接口。 + +## 已知问题 +- 暂无 \ No newline at end of file