In the Linux kernel, the following vulnerability has been resolved:
dm-crypt: don't modify the data when using authenticated encryption
It was said that authenticated encryption could produce invalid tag when
the data that is being encrypted is modified [1]. So, fix this problem by
copying the data into the clone bio first and then encrypt them inside the
clone bio.
This may reduce performance, but it is needed to prevent the user from
corrupting the device by writing data with O_DIRECT and modifying them at
the same time.
[1] https://lore.kernel.org/all/20240207004723.GA35324@sol.localdomain/T/
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
18 Mar 2025, 16:40
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.1 |
18 Mar 2025, 16:18
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-787 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
First Time |
Debian debian Linux
Linux linux Kernel Debian Linux |
|
References | () https://git.kernel.org/stable/c/0dccbb93538fe89a86c6de31d4b1c8c560848eaa - Patch | |
References | () https://git.kernel.org/stable/c/1a4371db68a31076afbe56ecce34fbbe6c80c529 - Patch | |
References | () https://git.kernel.org/stable/c/3c652f6fa1e1f9f02c3fbf359d260ad153ec5f90 - Patch | |
References | () https://git.kernel.org/stable/c/43a202bd552976497474ae144942e32cc5f34d7e - Patch | |
References | () https://git.kernel.org/stable/c/50c70240097ce41fe6bce6478b80478281e4d0f7 - Patch | |
References | () https://git.kernel.org/stable/c/64ba01a365980755732972523600a961c4266b75 - Patch | |
References | () https://git.kernel.org/stable/c/d9e3763a505e50ba3bd22846f2a8db99429fb857 - Patch | |
References | () https://git.kernel.org/stable/c/e08c2a8d27e989f0f5b0888792643027d7e691e6 - Patch | |
References | () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - Mailing List | |
References | () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html - Mailing List | |
CPE | cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:* |
Information
Published : 2024-04-03 17:15
Updated : 2025-03-18 16:40
NVD link : CVE-2024-26763
Mitre link : CVE-2024-26763
CVE.ORG link : CVE-2024-26763
JSON object : View
Products Affected
linux
- linux_kernel
debian
- debian_linux
CWE
CWE-787
Out-of-bounds Write