In the Linux kernel, the following vulnerability has been resolved:
crypto: bcm - Fix pointer arithmetic
In spu2_dump_omd() value of ptr is increased by ciph_key_len
instead of hash_iv_len which could lead to going beyond the
buffer boundaries.
Fix this bug by changing ciph_key_len to hash_iv_len.
Found by Linux Verification Center (linuxtesting.org) with SVACE.
References
Configurations
Configuration 1 (hide)
|
History
20 Oct 2025, 22:07
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
| First Time |
Linux
Linux linux Kernel |
|
| CWE | NVD-CWE-noinfo | |
| References | () https://git.kernel.org/stable/c/2b3460cbf454c6b03d7429e9ffc4fe09322eb1a9 - Patch | |
| References | () https://git.kernel.org/stable/c/3b7a40740f04e2f27114dfd6225c5e721dda9d57 - Patch | |
| References | () https://git.kernel.org/stable/c/49833a8da6407e7e9b532cc4054fdbcaf78f5fdd - Patch | |
| References | () https://git.kernel.org/stable/c/c0082ee420639a97e40cae66778b02b341b005e5 - Patch | |
| References | () https://git.kernel.org/stable/c/c256b616067bfd6d274c679c06986b78d2402434 - Patch | |
| References | () https://git.kernel.org/stable/c/c69a1e4b419c2c466dd8c5602bdebadc353973dd - Patch | |
| References | () https://git.kernel.org/stable/c/d0f14ae223c2421b334c1f1a9e48f1e809aee3a0 - Patch | |
| References | () https://git.kernel.org/stable/c/e719c8991c161977a67197775067ab456b518c7b - Patch | |
| References | () https://git.kernel.org/stable/c/ebed0d666fa709bae9e8cafa8ec6e7ebd1d318c6 - Patch |
Information
Published : 2024-06-19 14:15
Updated : 2025-10-20 22:07
NVD link : CVE-2024-38579
Mitre link : CVE-2024-38579
CVE.ORG link : CVE-2024-38579
JSON object : View
Products Affected
linux
- linux_kernel
CWE
