Bug 2265657 (CVE-2024-26589)
Summary: | CVE-2024-26589 kernel: bpf: Reject variable offset alu on PTR_TO_FLOW_KEYS | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Patrick Del Bello <pdelbell> |
Component: | vulnerability | Assignee: | Product Security <prodsec-ir-bot> |
Status: | NEW --- | QA Contact: | |
Severity: | low | Docs Contact: | |
Priority: | low | ||
Version: | unspecified | CC: | acaringi, allarkin, aquini, bhu, chwhite, cye, cyin, dbohanno, debarbos, dfreiber, drow, dvlasenk, esandeen, ezulian, hkrzesin, jarod, jburrell, jdenham, jfaracco, jforbes, jlelli, joe.lawrence, jshortt, jstancek, jwyatt, kcarcia, ldoskova, lgoncalv, lzampier, mleitner, mmilgram, mstowell, nmurray, ptalbert, rparrazo, rrobaina, rvrbovsk, rysulliv, scweaver, sukulkar, tglozar, tyberry, vinair, vkumar, wcosta, williams, wmealing, ycote, ykopkova, zhijwang |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | Flags: | allarkin:
needinfo?
(vinair) |
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | If docs needed, set a value | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | Type: | --- | |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 2265666 | ||
Bug Blocks: | 2265643 |
Description
Patrick Del Bello
2024-02-23 13:58:04 UTC
Created kernel tracking bugs for this issue: Affects: fedora-all [bug 2265666] Issue introduced in 4.20 with commit d58e468b1112 and fixed in 5.15.148 with commit 29ffa63f21bc Issue introduced in 4.20 with commit d58e468b1112 and fixed in 6.1.75 with commit 4108b86e324d Issue introduced in 4.20 with commit d58e468b1112 and fixed in 6.6.14 with commit e8d3872b617c Issue introduced in 4.20 with commit d58e468b1112 and fixed in 6.7.2 with commit 1b500d5d6cec Issue introduced in 4.20 with commit d58e468b1112 and fixed in 6.8-rc1 with commit 22c7fa171a02 This was fixed for Fedora with the 6.6.14 stable kernel updates. The result of automatic check (that is developed by Alexander Larkin) for this CVE-2024-26589 is: CHECK Maybe valid. Check manually. with impact LOW (that is an approximation based on flags WRITE OOB BPF ; these flags parsed automatically based on patch data). Such automatic check happens only for Low/Moderates (and only when not from reporter, but parsing already existing CVE). Highs always checked manually (I check it myself and then we check it again in Remediation team). In rare cases some of the Moderates could be increased to High later. This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2024:9315 https://access.redhat.com/errata/RHSA-2024:9315 |