{ "id": "CVE-2024-40985", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-07-12T13:15:20.050", "lastModified": "2024-11-21T09:32:00.513", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/tcp_ao: Don't leak ao_info on error-path\n\nIt seems I introduced it together with TCP_AO_CMDF_AO_REQUIRED, on\nversion 5 [1] of TCP-AO patches. Quite frustrative that having all these\nselftests that I've written, running kmemtest & kcov was always in todo.\n\n[1]: https://lore.kernel.org/netdev/20230215183335.800122-5-dima@arista.com/" }, { "lang": "es", "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net/tcp_ao: No filtrar ao_info en la ruta de error. Parece que lo introduje junto con TCP_AO_CMDF_AO_REQUIRED, en la versi\u00f3n 5 [1] de los parches TCP-AO. Es bastante frustrante que, teniendo todas estas autopruebas que he escrito, ejecutar kmemtest y kcov siempre estuviera pendiente. [1]: https://lore.kernel.org/netdev/20230215183335.800122-5-dima@arista.com/" } ], "metrics": {}, "references": [ { "url": "https://git.kernel.org/stable/c/ebaa7d3c26332330a48f9a15f8e518d526cc0f21", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" }, { "url": "https://git.kernel.org/stable/c/f9ae848904289ddb16c7c9e4553ed4c64300de49", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" }, { "url": "https://git.kernel.org/stable/c/ebaa7d3c26332330a48f9a15f8e518d526cc0f21", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "https://git.kernel.org/stable/c/f9ae848904289ddb16c7c9e4553ed4c64300de49", "source": "af854a3a-2127-422b-91ae-364da2661108" } ] }