"value":"In the Linux kernel, the following vulnerability has been resolved:\n\ndm integrity: fix memory corruption when tag_size is less than digest size\n\nIt is possible to set up dm-integrity in such a way that the\n\"tag_size\" parameter is less than the actual digest size. In this\nsituation, a part of the digest beyond tag_size is ignored.\n\nIn this case, dm-integrity would write beyond the end of the\nic->recalc_tags array and corrupt memory. The corruption happened in\nintegrity_recalc->integrity_sector_checksum->crypto_shash_final.\n\nFix this corruption by increasing the tags array so that it has enough\npadding at the end to accomodate the loop in integrity_recalc() being\nable to write a full digest size for the last member of the tags\narray."
"value":"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: dm integrity: fix memory corrupts when tag_size is less than digest size Es posible configurar dm-integrity de tal manera que el par\u00e1metro \"tag_size\" sea menor que el tama\u00f1o real del resumen. En esta situaci\u00f3n, se ignora una parte del resumen m\u00e1s all\u00e1 de tag_size. En este caso, dm-integrity escribir\u00eda m\u00e1s all\u00e1 del final de la matriz ic->recalc_tags y da\u00f1ar\u00eda la memoria. La corrupci\u00f3n ocurri\u00f3 en integrity_recalc->integrity_sector_checksum->crypto_shash_final. Corrija esta corrupci\u00f3n aumentando la matriz tags para que tenga suficiente relleno al final para acomodar el bucle en integrity_recalc() pudiendo escribir un tama\u00f1o de resumen completo para el \u00faltimo miembro de la matriz tags."