In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade Rocky-Linux:9 kernel-64k-debug-modules-core to version 0:5.14.0-611.30.1.el9_7 or higher.
This issue was patched in RLSA-2026:2212.
Note: Versions mentioned in the description apply only to the upstream kernel-64k-debug-modules-core package and not the kernel-64k-debug-modules-core package as distributed by Rocky-Linux.
See How to fix? for Rocky-Linux:9 relevant fixed versions and status.
In the Linux kernel, the following vulnerability has been resolved:
irqchip/gic-v2m: Prevent use after free of gicv2m_get_fwnode()
With ACPI in place, gicv2m_get_fwnode() is registered with the pci subsystem as pci_msi_get_fwnode_cb(), which may get invoked at runtime during a PCI host bridge probe. But, the call back is wrongly marked as __init, causing it to be freed, while being registered with the PCI subsystem and could trigger:
Unable to handle kernel paging request at virtual address ffff8000816c0400 gicv2m_get_fwnode+0x0/0x58 (P) pci_set_bus_msi_domain+0x74/0x88 pci_register_host_bridge+0x194/0x548
This is easily reproducible on a Juno board with ACPI boot.
Retain the function for later use.