2024-06-19 16:03:10 +00:00
{
"id" : "CVE-2024-38579" ,
"sourceIdentifier" : "416baaa9-dc9f-4396-8d5f-8c081fb06d67" ,
"published" : "2024-06-19T14:15:17.960" ,
2024-12-08 03:06:42 +00:00
"lastModified" : "2024-11-21T09:26:23.877" ,
2024-06-20 14:03:13 +00:00
"vulnStatus" : "Awaiting Analysis" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2024-06-19 16:03:10 +00:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: bcm - Fix pointer arithmetic\n\nIn spu2_dump_omd() value of ptr is increased by ciph_key_len\ninstead of hash_iv_len which could lead to going beyond the\nbuffer boundaries.\nFix this bug by changing ciph_key_len to hash_iv_len.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE."
2024-06-20 14:03:13 +00:00
} ,
{
"lang" : "es" ,
"value" : "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: crypto: bcm - Arreglar la aritm\u00e9tica de punteros En spu2_dump_omd() el valor de ptr aumenta en ciph_key_len en lugar de hash_iv_len, lo que podr\u00eda llevar a ir m\u00e1s all\u00e1 de los l\u00edmites del b\u00fafer. Corrija este error cambiando ciph_key_len a hash_iv_len. Encontrado por el Centro de verificaci\u00f3n de Linux (linuxtesting.org) con SVACE."
2024-06-19 16:03:10 +00:00
}
] ,
"metrics" : { } ,
"references" : [
{
"url" : "https://git.kernel.org/stable/c/2b3460cbf454c6b03d7429e9ffc4fe09322eb1a9" ,
"source" : "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
} ,
{
"url" : "https://git.kernel.org/stable/c/3b7a40740f04e2f27114dfd6225c5e721dda9d57" ,
"source" : "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
} ,
{
"url" : "https://git.kernel.org/stable/c/49833a8da6407e7e9b532cc4054fdbcaf78f5fdd" ,
"source" : "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
} ,
{
"url" : "https://git.kernel.org/stable/c/c0082ee420639a97e40cae66778b02b341b005e5" ,
"source" : "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
} ,
{
"url" : "https://git.kernel.org/stable/c/c256b616067bfd6d274c679c06986b78d2402434" ,
"source" : "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
} ,
{
"url" : "https://git.kernel.org/stable/c/c69a1e4b419c2c466dd8c5602bdebadc353973dd" ,
"source" : "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
} ,
{
"url" : "https://git.kernel.org/stable/c/d0f14ae223c2421b334c1f1a9e48f1e809aee3a0" ,
"source" : "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
} ,
{
"url" : "https://git.kernel.org/stable/c/e719c8991c161977a67197775067ab456b518c7b" ,
"source" : "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
} ,
{
"url" : "https://git.kernel.org/stable/c/ebed0d666fa709bae9e8cafa8ec6e7ebd1d318c6" ,
"source" : "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
2024-12-08 03:06:42 +00:00
} ,
{
"url" : "https://git.kernel.org/stable/c/2b3460cbf454c6b03d7429e9ffc4fe09322eb1a9" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "https://git.kernel.org/stable/c/3b7a40740f04e2f27114dfd6225c5e721dda9d57" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "https://git.kernel.org/stable/c/49833a8da6407e7e9b532cc4054fdbcaf78f5fdd" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "https://git.kernel.org/stable/c/c0082ee420639a97e40cae66778b02b341b005e5" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "https://git.kernel.org/stable/c/c256b616067bfd6d274c679c06986b78d2402434" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "https://git.kernel.org/stable/c/c69a1e4b419c2c466dd8c5602bdebadc353973dd" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "https://git.kernel.org/stable/c/d0f14ae223c2421b334c1f1a9e48f1e809aee3a0" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "https://git.kernel.org/stable/c/e719c8991c161977a67197775067ab456b518c7b" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "https://git.kernel.org/stable/c/ebed0d666fa709bae9e8cafa8ec6e7ebd1d318c6" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
2024-06-19 16:03:10 +00:00
}
]
}