CVE-2024-26763

In the Linux kernel, the following vulnerability has been resolved: dm-crypt: don't modify the data when using authenticated encryption It was said that authenticated encryption could produce invalid tag when the data that is being encrypted is modified [1]. So, fix this problem by copying the data into the clone bio first and then encrypt them inside the clone bio. This may reduce performance, but it is needed to prevent the user from corrupting the device by writing data with O_DIRECT and modifying them at the same time. [1] https://lore.kernel.org/all/20240207004723.GA35324@sol.localdomain/T/
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

History

18 Mar 2025, 16:40

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 5.5
v2 : unknown
v3 : 7.1

18 Mar 2025, 16:18

Type Values Removed Values Added
CWE CWE-787
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
First Time Debian debian Linux
Linux linux Kernel
Debian
Linux
References () https://git.kernel.org/stable/c/0dccbb93538fe89a86c6de31d4b1c8c560848eaa - () https://git.kernel.org/stable/c/0dccbb93538fe89a86c6de31d4b1c8c560848eaa - Patch
References () https://git.kernel.org/stable/c/1a4371db68a31076afbe56ecce34fbbe6c80c529 - () https://git.kernel.org/stable/c/1a4371db68a31076afbe56ecce34fbbe6c80c529 - Patch
References () https://git.kernel.org/stable/c/3c652f6fa1e1f9f02c3fbf359d260ad153ec5f90 - () https://git.kernel.org/stable/c/3c652f6fa1e1f9f02c3fbf359d260ad153ec5f90 - Patch
References () https://git.kernel.org/stable/c/43a202bd552976497474ae144942e32cc5f34d7e - () https://git.kernel.org/stable/c/43a202bd552976497474ae144942e32cc5f34d7e - Patch
References () https://git.kernel.org/stable/c/50c70240097ce41fe6bce6478b80478281e4d0f7 - () https://git.kernel.org/stable/c/50c70240097ce41fe6bce6478b80478281e4d0f7 - Patch
References () https://git.kernel.org/stable/c/64ba01a365980755732972523600a961c4266b75 - () https://git.kernel.org/stable/c/64ba01a365980755732972523600a961c4266b75 - Patch
References () https://git.kernel.org/stable/c/d9e3763a505e50ba3bd22846f2a8db99429fb857 - () https://git.kernel.org/stable/c/d9e3763a505e50ba3bd22846f2a8db99429fb857 - Patch
References () https://git.kernel.org/stable/c/e08c2a8d27e989f0f5b0888792643027d7e691e6 - () https://git.kernel.org/stable/c/e08c2a8d27e989f0f5b0888792643027d7e691e6 - Patch
References () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - Mailing List
References () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html - () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html - Mailing List
CPE cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*

Information

Published : 2024-04-03 17:15

Updated : 2025-03-18 16:40


NVD link : CVE-2024-26763

Mitre link : CVE-2024-26763

CVE.ORG link : CVE-2024-26763


JSON object : View

Products Affected

linux

  • linux_kernel

debian

  • debian_linux
CWE
CWE-787

Out-of-bounds Write