I can confirm that the bug still exists in 6.1.0-15-686-pae:
# uname -a
Linux cobra 6.1.0-15-686-pae #1 SMP PREEMPT_DYNAMIC Debian 6.1.66-1
(2023-12-09) i686 GNU/Linux
# apt-get update
Get:1 http://security.debian.org/debian-security bookworm-security
InRelease [48.0 kB]
Get:2 http://deb.debian.org/debian bookworm InRelease [151 kB]
0% [2 InRelease 0 B/151 kB 0%] [1 InRelease 0 B/48.0 kB 0%]
[ 614.150786] usercopy: Kernel memory exposure attempt detected from
kmap (offset 0, size 16384)!
[ 614.150908] ------------[ cut here ]------------
[ 614.150909] kernel BUG at mm/usercopy.c:101!
[ 614.150947] invalid opcode: 0000 [#1] PREEMPT SMP PTI
[ 614.150983] CPU: 0 PID: 3018 Comm: http Not tainted 6.1.0-15-686-pae
#1 Debian 6.1.66-1
[ 614.151011] Hardware name: VMware, Inc. VMware Virtual Platform/440BX
Desktop Reference Platform, BIOS 6.00 11/12/2020
[ 614.151066] EIP: usercopy_abort+0x65/0x67
[ 614.151104] Code: 44 cb bb 10 ce b2 d1 89 4d f0 b9 2b 48 b1 d1 0f 45
cb ff 75 0c ff 75 08 57 52 56 50 ff 75 f0 51 68 b0 cd b2 d1 e8 61 88 ff
ff <0f> 0b 56 31 d2 b8 5a ce b2 d1 ff 75 ec 8b 4d f0 e8 86 ff ff ff 56
[ 614.151177] EAX: 00000053 EBX: d1b2ce10 ECX: f6fcfa00 EDX: f6fc9e90
[ 614.151215] ESI: d1b438fc EDI: d1b438fc EBP: c2b75c90 ESP: c2b75c5c
[ 614.151255] DS: 007b ES: 007b FS: 00d8 GS: 0033 SS: 0068 EFLAGS: 00010286
[ 614.151310] CR0: 80050033 CR2: b7761ec0 CR3: 02bce000 CR4: 001506f0
[ 614.151363] Call Trace:
[ 614.151390] ? __die_body.cold+0x14/0x1a
[ 614.151424] ? __die+0x21/0x26
[ 614.151453] ? die+0x28/0x50
[ 614.151470] ? do_trap+0xbb/0xe0
[ 614.151485] ? do_error_trap+0x4c/0x60
[ 614.151501] ? usercopy_abort+0x65/0x67
[ 614.151532] ? exc_overflow+0x40/0x40
[ 614.151564] ? exc_invalid_op+0x44/0x60
[ 614.151604] ? usercopy_abort+0x65/0x67
[ 614.151656] ? handle_exception+0x133/0x133
[ 614.151705] ? exc_overflow+0x40/0x40
[ 614.151780] ? usercopy_abort+0x65/0x67
[ 614.151816] ? exc_overflow+0x40/0x40
[ 614.151897] ? usercopy_abort+0x65/0x67
[ 614.151977] __check_object_size.cold+0xae/0xae
[ 614.152034] simple_copy_to_iter+0x1c/0x40
[ 614.152113] __skb_datagram_iter+0x163/0x320
[ 614.152186] skb_copy_datagram_iter+0x2d/0x80
[ 614.152635] ? skb_free_datagram+0x20/0x20
[ 614.153028] tcp_recvmsg_locked+0x582/0x8a0
[ 614.153461] tcp_recvmsg+0x6f/0x1e0
[ 614.153845] ? tcp_recv_timestamp+0x240/0x240
[ 614.154203] inet_recvmsg+0x54/0x130
[ 614.154555] ? security_socket_recvmsg+0x41/0x60
[ 614.154911] sock_recvmsg+0x73/0x90
[ 614.155261] ? ipip_gso_segment+0x30/0x30
[ 614.155597] sock_read_iter+0x84/0xe0
[ 614.155924] vfs_read+0x288/0x2c0
[ 614.156259] ksys_read+0xab/0xe0
[ 614.156570] __ia32_sys_read+0x15/0x20
[ 614.156870] __do_fast_syscall_32+0x68/0xb0
[ 614.157155] ? __ia32_sys_pselect6_time32+0x4c/0x80
[ 614.157435] ? exit_to_user_mode_prepare+0x32/0x170
[ 614.157712] ? syscall_exit_to_user_mode+0x29/0x40
[ 614.157986] ? __do_fast_syscall_32+0x72/0xb0
[ 614.158270] ? exit_to_user_mode_prepare+0x9d/0x170
[ 614.158541] ? irqentry_exit_to_user_mode+0x16/0x20
[ 614.158833] do_fast_syscall_32+0x29/0x60
[ 614.159102] do_SYSENTER_32+0x15/0x20
[ 614.159392] entry_SYSENTER_32+0x98/0xf1
[ 614.159664] EIP: 0xb7f6d559
[ 614.159931] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10
07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd
80 <5d> 5a 59 c3 90 90 90 90 8d 76 00 58 b8 77 00 00 00 cd 80 90 8d 76
[ 614.160864] EAX: ffffffda EBX: 00000003 ECX: 015bcd09 EDX: 0000fee7
[ 614.161200] ESI: b721cff4 EDI: 00000000 EBP: 015b2f20 ESP: bf9bd970
[ 614.161526] DS: 007b ES: 007b FS: 0000 GS: 0033 SS: 007b EFLAGS: 00000246
[ 614.161856] Modules linked in: xt_tcpudp xt_conntrack nf_conntrack
nf_defrag_ipv6 nf_defrag_ipv4 nft_compat nf_tables nfnetlink
vsock_loopback vmw_vsock_virtio_transport_common
vmw_vsock_vmci_transport vsock binfmt_misc xfs libcrc32c intel_rapl_msr
ppdev intel_rapl_common rapl vmw_balloon pcspkr vmwgfx drm_ttm_helper
ttm vmw_vmci drm_kms_helper parport_pc parport button ac joydev evdev
serio_raw sg drm loop fuse efi_pstore configfs ip_tables x_tables
autofs4 ext4 crc16 mbcache jbd2 crc32c_generic dm_mod dax sd_mod t10_pi
crc64_rocksoft crc64 crc_t10dif crct10dif_generic crct10dif_common
sr_mod cdrom ata_generic crc32c_intel psmouse mptspi ata_piix mptscsih
mptbase libata scsi_transport_spi e1000 scsi_mod i2c_piix4 scsi_common
floppy
[ 614.165246] ---[ end trace 0000000000000000 ]---
[ 614.165664] EIP: usercopy_abort+0x65/0x67
[ 614.166085] Code: 44 cb bb 10 ce b2 d1 89 4d f0 b9 2b 48 b1 d1 0f 45
cb ff 75 0c ff 75 08 57 52 56 50 ff 75 f0 51 68 b0 cd b2 d1 e8 61 88 ff
ff <0f> 0b 56 31 d2 b8 5a ce b2 d1 ff 75 ec 8b 4d f0 e8 86 ff ff ff 56
[ 614.167439] EAX: 00000053 EBX: d1b2ce10 ECX: f6fcfa00 EDX: f6fc9e90
[ 614.167975] ESI: d1b438fc EDI: d1b438fc EBP: c2b75c90 ESP: c2b75c5c
[ 614.168465] DS: 007b ES: 007b FS: 00d8 GS: 0033 SS: 0068 EFLAGS: 00010286
[ 614.169008] CR0: 80050033 CR2: b7761ec0 CR3: 02bce000 CR4: 001506f0
[ 614.170858] usercopy: Kernel memory exposure attempt detected from
kmap (offset 0, size 16384)!
[ 614.171403] ------------[ cut here ]------------
[ 614.171924] kernel BUG at mm/usercopy.c:101!
[ 614.172439] invalid opcode: 0000 [#2] PREEMPT SMP PTI
[ 614.172953] CPU: 0 PID: 3019 Comm: http Tainted: G D
6.1.0-15-686-pae #1 Debian 6.1.66-1
[ 614.174017] Hardware name: VMware, Inc. VMware Virtual Platform/440BX
Desktop Reference Platform, BIOS 6.00 11/12/2020
[ 614.175078] EIP: usercopy_abort+0x65/0x67
[ 614.175616] Code: 44 cb bb 10 ce b2 d1 89 4d f0 b9 2b 48 b1 d1 0f 45
cb ff 75 0c ff 75 08 57 52 56 50 ff 75 f0 51 68 b0 cd b2 d1 e8 61 88 ff
ff <0f> 0b 56 31 d2 b8 5a ce b2 d1 ff 75 ec 8b 4d f0 e8 86 ff ff ff 56
[ 614.177304] EAX: 00000053 EBX: d1b2ce10 ECX: f6fc9e94 EDX: f6fc9e90
[ 614.177884] ESI: d1b438fc EDI: d1b438fc EBP: c2b4bcd4 ESP: c2b4bca0
[ 614.178458] DS: 007b ES: 007b FS: 00d8 GS: 0033 SS: 0068 EFLAGS: 00010246
[ 614.179141] CR0: 80050033 CR2: bfb78dcc CR3: 02bd6000 CR4: 001506f0
[ 614.179726] Call Trace:
[ 614.180274] ? __die_body.cold+0x14/0x1a
[ 614.180827] ? __die+0x21/0x26
[ 614.181380] ? die+0x28/0x50
[ 614.181911] ? do_trap+0xbb/0xe0
[ 614.182430] ? do_error_trap+0x4c/0x60
[ 614.182937] ? usercopy_abort+0x65/0x67
[ 614.183473] ? exc_overflow+0x40/0x40
[ 614.183959] ? exc_invalid_op+0x44/0x60
[ 614.184432] ? usercopy_abort+0x65/0x67
[ 614.184891] ? handle_exception+0x133/0x133
[ 614.185343] ? exc_overflow+0x40/0x40
[ 614.185791] ? usercopy_abort+0x65/0x67
[ 614.186245] ? exc_overflow+0x40/0x40
[ 614.186677] ? usercopy_abort+0x65/0x67
[ 614.187100] __check_object_size.cold+0xae/0xae
[ 614.187512] simple_copy_to_iter+0x1c/0x40
[ 614.187917] __skb_datagram_iter+0x163/0x320
[ 614.188320] skb_copy_datagram_iter+0x2d/0x80
[ 614.188715] ? skb_free_datagram+0x20/0x20
[ 614.189115] tcp_recvmsg_locked+0x582/0x8a0
[ 614.189500] tcp_recvmsg+0x6f/0x1e0
[ 614.189871] ? tcp_recv_timestamp+0x240/0x240
[ 614.190239] inet_recvmsg+0x54/0x130
[ 614.190604] ? security_socket_recvmsg+0x41/0x60
[ 614.190968] sock_recvmsg+0x73/0x90
[ 614.191321] ? ipip_gso_segment+0x30/0x30
[ 614.191659] sock_read_iter+0x84/0xe0
[ 614.191987] vfs_read+0x288/0x2c0
[ 614.192337] ksys_read+0xab/0xe0
[ 614.192647] __ia32_sys_read+0x15/0x20
[ 614.192947] __do_fast_syscall_32+0x68/0xb0
[ 614.193239] ? exit_to_user_mode_prepare+0x32/0x170
[ 614.193521] ? irqentry_exit_to_user_mode+0x16/0x20
[ 614.193799] do_fast_syscall_32+0x29/0x60
[ 614.194075] do_SYSENTER_32+0x15/0x20
[ 614.194347] entry_SYSENTER_32+0x98/0xf1
[ 614.194650] EIP: 0xb7f8e559
[ 614.194932] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10
07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd
80 <5d> 5a 59 c3 90 90 90 90 8d 76 00 58 b8 77 00 00 00 cd 80 90 8d 76
[ 614.195817] EAX: ffffffda EBX: 00000003 ECX: 00a9aeab EDX: 0000fef5
[ 614.196132] ESI: b721cff4 EDI: 00000000 EBP: 00a91300 ESP: bfb88bb0
[ 614.196447] DS: 007b ES: 007b FS: 0000 GS: 0033 SS: 007b EFLAGS: 00000246
[ 614.196775] Modules linked in: xt_tcpudp xt_conntrack nf_conntrack
nf_defrag_ipv6 nf_defrag_ipv4 nft_compat nf_tables nfnetlink
vsock_loopback vmw_vsock_virtio_transport_common
vmw_vsock_vmci_transport vsock binfmt_misc xfs libcrc32c intel_rapl_msr
ppdev intel_rapl_common rapl vmw_balloon pcspkr vmwgfx drm_ttm_helper
ttm vmw_vmci drm_kms_helper parport_pc parport button ac joydev evdev
serio_raw sg drm loop fuse efi_pstore configfs ip_tables x_tables
autofs4 ext4 crc16 mbcache jbd2 crc32c_generic dm_mod dax sd_mod t10_pi
crc64_rocksoft crc64 crc_t10dif crct10dif_generic crct10dif_common
sr_mod cdrom ata_generic crc32c_intel psmouse mptspi ata_piix mptscsih
mptbase libata scsi_transport_spi e1000 scsi_mod i2c_piix4 scsi_common
floppy
[ 614.199927] ---[ end trace 0000000000000000 ]---
[ 614.200342] EIP: usercopy_abort+0x65/0x67
[ 614.200755] Code: 44 cb bb 10 ce b2 d1 89 4d f0 b9 2b 48 b1 d1 0f 45
cb ff 75 0c ff 75 08 57 52 56 50 ff 75 f0 51 68 b0 cd b2 d1 e8 61 88 ff
ff <0f> 0b 56 31 d2 b8 5a ce b2 d1 ff 75 ec 8b 4d f0 e8 86 ff ff ff 56
[ 614.202095] EAX: 00000053 EBX: d1b2ce10 ECX: f6fcfa00 EDX: f6fc9e90
[ 614.202557] ESI: d1b438fc EDI: d1b438fc EBP: c2b75c90 ESP: c2b75c5c
[ 614.203020] DS: 007b ES: 007b FS: 00d8 GS: 0033 SS: 0068 EFLAGS: 00010286
[ 614.203525] CR0: 80050033 CR2: bfb78dcc CR3: 02bd6000 CR4: 001506f0
Klaus.
--
levigo systems gmbh ----------- ein Unternehmen der levigo gruppe
Bebelsbergstraße 31 Telefon: 07031 / 4161-10
D-71088 Holzgerlingen Telefax: 07031 / 4161-11
GF: Oliver Bausch, Vincenzo Biasi http://systems.levigo.de/
Informationen zu Art.13,14 DSGVO: https://datenschutz.levigo.de/
Registergericht: Stuttgart HRB 245180 USt-ID: DE813226078