/srv/irclogs.ubuntu.com/2024/04/03/#ubuntu-security.txt

=== chris14_ is now known as chris14
RonDesmondHello, I noticed the Ubuntu OVAL feed seems to have some discrepancies with the security page for CVE-2024-2659721:49
-ubottu:#ubuntu-security- In the Linux kernel, the following vulnerability has been resolved: net: qualcomm: rmnet: fix global oob in rmnet_policy The variable rmnet_link_ops assign a *bigger* maxtype which leads to a global out-of-bounds read when parsing the netlink attributes. See bug trace below: ================================================================== BUG: KASAN: global-out-o... <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26597>21:50
RonDesmondThe OVAL feed reports the following:21:51
RonDesmond     <definition class="vulnerability" id="oval:com.ubuntu.jammy:def:2024265970000000" version="1">       <metadata>         <title>CVE-2024-26597 on Ubuntu 22.04 LTS (jammy) - high</title>         <description>In the Linux kernel, the following vulnerability has been resolved: net:qualcomm: rmnet...</description>         <affected family="unix">           <platform>Ubuntu 22.04 LTS</21:51
-ubottu:#ubuntu-security- In the Linux kernel, the following vulnerability has been resolved: net: qualcomm: rmnet: fix global oob in rmnet_policy The variable rmnet_link_ops assign a *bigger* maxtype which leads to a global out-of-bounds read when parsing the netlink attributes. See bug trace below: ================================================================== BUG: KASAN: global-out-o... <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26597>21:51
RonDesmondWhile the CVE page reports that linux-gcp-6.5 has a fixed version (https://ubuntu.com/security/CVE-2024-26597): 6.5.0-1016.16~22.04.121:51
RonDesmondApologies for the formatting of the OVAL XML: you can verify this by looking at the OVAL Jammy files at https://security-metadata.canonical.com/oval/21:52
=== JanC_ is now known as JanC

Generated by irclog2html.py 2.7 by Marius Gedminas - find it at mg.pov.lt!