ACK: [SRU][N][PATCH 0/1] CVE-2024-42284

Guoqing Jiang guoqing.jiang at canonical.com
Mon Oct 14 01:55:03 UTC 2024


Acked-by: Guoqing Jiang <guoqing.jiang at canonical.com>

On 9/18/24 13:06, Koichiro Den wrote:
> [Impact]
>
> tipc: Return non-zero value from tipc_udp_addr2str() on error
>
> tipc_udp_addr2str() should return non-zero value if the UDP media
> address is invalid. Otherwise, a buffer overflow access can occur in
> tipc_media_addr_printf(). Fix this by returning 1 on an invalid UDP
> media address.
>
> [Fix]
>
> Noble:  Clean cherry-pick
> Jammy:  fixed via stable
> Focal:  fixed via stable
> Bionic: fix sent to esm ML
> Xenial: fix sent to esm ML
> Trusty: not affected
>
> [Test case]
>
> Compile and boot tested
>
> [Where problem could occur]
>
> This fix affects those who use TIPC protocol, an issue with this fix
> would be visible to the user via unpredicted system behavior due to
> potential OOB read, or in a less severe case broken messages shown on
> kernel ring buffer and/or trace buffer.
>
>
> Shigeru Yoshida (1):
>    tipc: Return non-zero value from tipc_udp_addr2str() on error
>
>   net/tipc/udp_media.c | 5 ++++-
>   1 file changed, 4 insertions(+), 1 deletion(-)
>




More information about the kernel-team mailing list