|
Bugzilla – Full Text Bug Listing |
| Summary: | VUL-0: CVE-2024-27050: libbpf: use OPTS_SET() macro in bpf_xdp_query() | ||
|---|---|---|---|
| Product: | [Novell Products] SUSE Security Incidents | Reporter: | SMASH SMASH <smash_bz> |
| Component: | Incidents | Assignee: | Security Team bot <security-team> |
| Status: | RESOLVED UPSTREAM | QA Contact: | Security Team bot <security-team> |
| Severity: | Major | ||
| Priority: | P3 - Medium | CC: | camila.matos, meissner, shung-hsi.yu, vasant.karasulli |
| Version: | unspecified | ||
| Target Milestone: | --- | ||
| Hardware: | Other | ||
| OS: | Other | ||
| URL: | https://smash.suse.de/issue/403841/ | ||
| Whiteboard: | CVSSv3.1:SUSE:CVE-2024-27050:7.8:(AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | ||
| Found By: | Security Response Team | Services Priority: | |
| Business Priority: | Blocker: | --- | |
| Marketing QA Status: | --- | IT Deployment: | --- |
|
Description
SMASH SMASH
2024-05-02 14:36:59 UTC
The libbpf package we provide to customer is at SUSE:SLE-15-SP6:GA/libbpf, which is sourced from the upstream repository https://github.com/libbpf/libbpf, rather than inheriting the source from kernel-source (since SLE-15-SP4). SUSE:SLE-15-SP6:GA/libbpf is at v1.2.2, which is roughly equivalent to v6.5 in kernel-source, and thus does not contain the buggy commit. > $ git log -n1 --oneline --grep='Start v1.3 development' tools/lib/bpf/libbpf.map > 2b001b94073b libbpf: Start v1.3 development cycle > $ git describe --tags --contains 2b001b94073b > v6.5-rc1~163^2~215^2~10 Reassigning back to security team. For completeness, this is a bug in the user-space library libbpf, and not in the Linux kernel itself. no libbpf version affected. |