![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
CVE ID: | CVE-2024-38578 |
Description: | In the Linux kernel, the following vulnerability has been resolved:
ecryptfs: Fix buffer size for tag 66 packet The 'TAG 66 Packet Format'
description is missing the cipher code and checksum fields that are
packed into the message packet. As a result, the buffer allocated for
the packet is 3 bytes too small and write_tag_66_packet() will write
up to 3 bytes past the end of the buffer. Fix this by increasing the
size of the allocation so the whole packet will always fit in the
buffer. This fixes the below kasan slab-out-of-bounds bug: BUG: KASAN:
slab-out-of-bounds in ecryptfs_generate_key_packet_set+0x7d6/0xde0
Write of size 1 at addr ffff88800afbb2a5 by task touch/181 CPU: 0 PID:
181 Comm: touch Not tainted 6.6.13-gnu #1
4c9534092be820851bb687b82d1f92a426598dc6 Hardware name: QEMU Standard
PC (i440FX + PIIX, 1996), BIOS 1.16.2/GNU Guix 04/01/2014 Call Trace:
|
Test IDs: | None available |
Cross References: |
Common Vulnerability Exposure (CVE) ID: CVE-2024-38578 https://git.kernel.org/stable/c/0d0f8ba042af16519f1ef7dd10463a33b21b677c https://git.kernel.org/stable/c/0d0f8ba042af16519f1ef7dd10463a33b21b677c https://git.kernel.org/stable/c/12db25a54ce6bb22b0af28010fff53ef9cb3fe93 https://git.kernel.org/stable/c/12db25a54ce6bb22b0af28010fff53ef9cb3fe93 https://git.kernel.org/stable/c/1c125b9287e58f364d82174efb167414b92b11f1 https://git.kernel.org/stable/c/1c125b9287e58f364d82174efb167414b92b11f1 https://git.kernel.org/stable/c/235b85981051cd68fc215fd32a81c6f116bfc4df https://git.kernel.org/stable/c/235b85981051cd68fc215fd32a81c6f116bfc4df https://git.kernel.org/stable/c/2ed750b7ae1b5dc72896d7dd114c419afd3d1910 https://git.kernel.org/stable/c/2ed750b7ae1b5dc72896d7dd114c419afd3d1910 https://git.kernel.org/stable/c/85a6a1aff08ec9f5b929d345d066e2830e8818e5 https://git.kernel.org/stable/c/85a6a1aff08ec9f5b929d345d066e2830e8818e5 https://git.kernel.org/stable/c/a20f09452e2f58f761d11ad7b96b5c894c91030e https://git.kernel.org/stable/c/a20f09452e2f58f761d11ad7b96b5c894c91030e https://git.kernel.org/stable/c/edbfc42ab080e78c6907d40a42c9d10b69e445c1 https://git.kernel.org/stable/c/edbfc42ab080e78c6907d40a42c9d10b69e445c1 https://git.kernel.org/stable/c/f6008487f1eeb8693f8d2a36a89c87d9122ddf74 https://git.kernel.org/stable/c/f6008487f1eeb8693f8d2a36a89c87d9122ddf74 |