APPLIED/Cmnt: [SRU][F/J][PATCH 0/2] CVE-2024-26800
Stefan Bader
stefan.bader at canonical.com
Thu Sep 26 15:26:33 UTC 2024
On 05.09.24 16:26, Juerg Haefliger wrote:
> https://ubuntu.com/security/CVE-2024-26800
>
> [ Impact ]
>
> Potential use-after-free in async kTLS decryption.
>
>
> [ Test Case ]
>
> Using tcrypt/pcrypt, verified that modified code is called when running the tls kernel
> selftests and that no new failures are introduced.
>
>
> [ Where Problems Could Occur ]
>
> Limited to async kernel-space TLS (kTLS) decryption (which requires special crypto acceleration
> hardware).
>
Added a comment about possible context adjustments by git to patch#2.
Applied to jammy,focal:linux/master-next. Thanks.
-Stefan
-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_0xE8675DEECBEECEA3.asc
Type: application/pgp-keys
Size: 48643 bytes
Desc: OpenPGP public key
URL: <https://lists.ubuntu.com/archives/kernel-team/attachments/20240926/83db41bf/attachment-0001.key>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/kernel-team/attachments/20240926/83db41bf/attachment-0001.sig>
More information about the kernel-team
mailing list