|
Bugzilla – Full Text Bug Listing |
| Summary: | VUL-0: CVE-2024-27394: kernel: tcp: Fix Use-After-Free in tcp_ao_connect_init | ||
|---|---|---|---|
| Product: | [Novell Products] SUSE Security Incidents | Reporter: | SMASH SMASH <smash_bz> |
| Component: | Incidents | Assignee: | Security Team bot <security-team> |
| Status: | RESOLVED FIXED | QA Contact: | Security Team bot <security-team> |
| Severity: | Normal | ||
| Priority: | P3 - Medium | CC: | gabriel.bertazi, gianluca.gabrielli |
| Version: | unspecified | ||
| Target Milestone: | --- | ||
| Hardware: | Other | ||
| OS: | Other | ||
| URL: | https://smash.suse.de/issue/404883/ | ||
| Whiteboard: | |||
| Found By: | Security Response Team | Services Priority: | |
| Business Priority: | Blocker: | --- | |
| Marketing QA Status: | --- | IT Deployment: | --- |
|
Description
SMASH SMASH
2024-05-10 06:57:12 UTC
The issue was introduced in 6.7 and never backported to our kernels. It seems we don't need to do anything else here. Back to the security team.
scripts/check-kernel-fix -v -s 5.5 -r CVE-2024-27394
80e679b352c3 ("tcp: Fix Use-After-Free in tcp_ao_connect_init") merged v6.9-rc6~27^2~22
Fixes: 7c2ffaf21bd6 ("net/tcp: Calculate TCP-AO traffic keys") merged v6.7-rc1~160^2~18^2~18
Security fix for CVE-2024-27394 bsc#1224097 with CVSS 5.5
Experts candidates: mkubecek@suse.cz denis.kirjanov@suse.com davide.benini@suse.com
SLE15-SP6-AZURE-GA:80e679b352c3ce5158f3f778cfb77eb767e586fb:nope
SLE15-SP6-GA:80e679b352c3ce5158f3f778cfb77eb767e586fb:nope
SLE15-SP6-AZURE:80e679b352c3ce5158f3f778cfb77eb767e586fb:nope
SLE15-SP6:80e679b352c3ce5158f3f778cfb77eb767e586fb:nope
SLE15-SP6-RT:80e679b352c3ce5158f3f778cfb77eb767e586fb:nope
SLE15-SP6-RT-GA:80e679b352c3ce5158f3f778cfb77eb767e586fb:nope
ALP-current-GA:80e679b352c3ce5158f3f778cfb77eb767e586fb:nope
ALP-current:80e679b352c3ce5158f3f778cfb77eb767e586fb:nope
ALP-current-RT:80e679b352c3ce5158f3f778cfb77eb767e586fb:nope
ALP-current-RT-GA:80e679b352c3ce5158f3f778cfb77eb767e586fb:nope
SLE15-SP5-AZURE:80e679b352c3ce5158f3f778cfb77eb767e586fb:nope
SLE15-SP5:80e679b352c3ce5158f3f778cfb77eb767e586fb:nope
SLE15-SP5-RT:80e679b352c3ce5158f3f778cfb77eb767e586fb:nope
SLE15-SP4-LTSS:80e679b352c3ce5158f3f778cfb77eb767e586fb:nope
SLE15-SP4-RT-LTSS:80e679b352c3ce5158f3f778cfb77eb767e586fb:nope
SLE15-SP3-LTSS:80e679b352c3ce5158f3f778cfb77eb767e586fb:nope
SLE15-SP3-RT-LTSS:80e679b352c3ce5158f3f778cfb77eb767e586fb:nope
SLE15-SP2-LTSS:80e679b352c3ce5158f3f778cfb77eb767e586fb:nope
SLE15-SP2-EB:80e679b352c3ce5158f3f778cfb77eb767e586fb:nope
SLE15-SP2-EB-carwos1:80e679b352c3ce5158f3f778cfb77eb767e586fb:nope
SLE15-SP2-EB-carwos1-1:80e679b352c3ce5158f3f778cfb77eb767e586fb:nope
SLE12-SP5-AZURE:80e679b352c3ce5158f3f778cfb77eb767e586fb:nope
SLE12-SP5:80e679b352c3ce5158f3f778cfb77eb767e586fb:nope
SLE12-SP5-RT:80e679b352c3ce5158f3f778cfb77eb767e586fb:nope
SLE12-SP3-LTSS:80e679b352c3ce5158f3f778cfb77eb767e586fb:nope
SLE12-SP3-TD:80e679b352c3ce5158f3f778cfb77eb767e586fb:nope
SLE11-SP4-LTSS:80e679b352c3ce5158f3f778cfb77eb767e586fb:nope
cve/linux-4.4-LTSS:80e679b352c3ce5158f3f778cfb77eb767e586fb:nope
cve/linux-5.3-LTSS:80e679b352c3ce5158f3f778cfb77eb767e586fb:nope
cve/linux-5.14-LTSS:80e679b352c3ce5158f3f778cfb77eb767e586fb:nope
ACTION NEEDED!
SLE15-SP6: NOPE: no problema for 80e679b352c3ce5158f3f778cfb77eb767e586fb
SLE15-SP5: NOPE: no problema for 80e679b352c3ce5158f3f778cfb77eb767e586fb
SLE12-SP5: NOPE: no problema for 80e679b352c3ce5158f3f778cfb77eb767e586fb
SLE12-SP3-TD: NOPE: no problema for 80e679b352c3ce5158f3f778cfb77eb767e586fb
All done, closing. |