REJECTED/Cmnt: [SRU][N][PATCH 0/1] CVE-2024-42284

Stefan Bader stefan.bader at canonical.com
Fri Oct 25 14:27:17 UTC 2024


On 18.09.24 07:06, Koichiro Den wrote:
> [Impact]
> 
> tipc: Return non-zero value from tipc_udp_addr2str() on error
> 
> tipc_udp_addr2str() should return non-zero value if the UDP media
> address is invalid. Otherwise, a buffer overflow access can occur in
> tipc_media_addr_printf(). Fix this by returning 1 on an invalid UDP
> media address.
> 
> [Fix]
> 
> Noble:  Clean cherry-pick
> Jammy:  fixed via stable
> Focal:  fixed via stable
> Bionic: fix sent to esm ML
> Xenial: fix sent to esm ML
> Trusty: not affected
> 
> [Test case]
> 
> Compile and boot tested
> 
> [Where problem could occur]
> 
> This fix affects those who use TIPC protocol, an issue with this fix
> would be visible to the user via unpredicted system behavior due to
> potential OOB read, or in a less severe case broken messages shown on
> kernel ring buffer and/or trace buffer.
> 
> 
> Shigeru Yoshida (1):
>    tipc: Return non-zero value from tipc_udp_addr2str() on error
> 
>   net/tipc/udp_media.c | 5 ++++-
>   1 file changed, 4 insertions(+), 1 deletion(-)
> 

Already applied: upstream stable patchset 2024-09-30. I added the CVE 
number to the commit message already present.

-Stefan
-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_0xE8675DEECBEECEA3.asc
Type: application/pgp-keys
Size: 48643 bytes
Desc: OpenPGP public key
URL: <https://lists.ubuntu.com/archives/kernel-team/attachments/20241025/54711f1d/attachment-0001.key>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/kernel-team/attachments/20241025/54711f1d/attachment-0001.sig>


More information about the kernel-team mailing list