|
Bugzilla – Full Text Bug Listing |
| Summary: | VUL-0: kernel: slab-out-of-bounds in hex_dump_to_buffer | ||
|---|---|---|---|
| Product: | [Novell Products] SUSE Security Incidents | Reporter: | SMASH SMASH <smash_bz> |
| Component: | Incidents | Assignee: | Security Team bot <security-team> |
| Status: | NEW --- | QA Contact: | Security Team bot <security-team> |
| Severity: | Minor | ||
| Priority: | P3 - Medium | CC: | ddiss, thomas.leroy |
| Version: | unspecified | ||
| Target Milestone: | --- | ||
| Hardware: | Other | ||
| OS: | Other | ||
| URL: | https://smash.suse.de/issue/406061/ | ||
| Whiteboard: | |||
| Found By: | Security Response Team | Services Priority: | |
| Business Priority: | Blocker: | --- | |
| Marketing QA Status: | --- | IT Deployment: | --- |
|
Description
SMASH SMASH
2024-07-04 08:57:39 UTC
This isn't relevant for SLE - we don't support jfs in SLE >=11 kernels.
Looks like Greg attempted to address this via 7c55b78818cfb ("jfs: xattr: fix buffer overflow for invalid xattr"). I'll merge it for openSUSE.
(In reply to David Disseldorp from comment #1) > This isn't relevant for SLE - we don't support jfs in SLE >=11 kernels. > > Looks like Greg attempted to address this via 7c55b78818cfb ("jfs: xattr: > fix buffer overflow for invalid xattr"). I'll merge it for openSUSE. Fixes submitted via users/ddiss/cve/linux-5.14-LTSS/for-next and users/ddiss/SLE15-SP6/for-next . I omitted the RH-CVE-2280317 changelog reference following discussion with Marcus. Reassigning to the security team for closure. |