In the Linux kernel, the following vulnerability has been resolved:
speakup: Fix sizeof() vs ARRAY_SIZE() bug
The "buf" pointer is an array of u16 values. This code should be
using ARRAY_SIZE() (which is 256) instead of sizeof() (which is 512),
otherwise it can the still got out of bounds.
References
Configurations
Configuration 1 (hide)
|
History
04 Apr 2025, 14:44
Type | Values Removed | Values Added |
---|---|---|
References | () https://git.kernel.org/stable/c/008ab3c53bc4f0b2f20013c8f6c204a3203d0b8b - Patch | |
References | () https://git.kernel.org/stable/c/07ef95cc7a579731198c93beed281e3a79a0e586 - Patch | |
References | () https://git.kernel.org/stable/c/3726f75a1ccc16cd335c0ccfad1d92ee08ecba5e - Patch | |
References | () https://git.kernel.org/stable/c/42f0a3f67158ed6b2908d2b9ffbf7e96d23fd358 - Patch | |
References | () https://git.kernel.org/stable/c/504178fb7d9f6cdb0496d5491efb05f45597e535 - Patch | |
References | () https://git.kernel.org/stable/c/c6e1650cf5df1bd6638eeee231a683ef30c7d4eb - Patch | |
References | () https://git.kernel.org/stable/c/cd7f3978c2ec741aedd1d860b2adb227314cf996 - Patch | |
References | () https://git.kernel.org/stable/c/d52c04474feac8e305814a5228e622afe481b2ef - Patch | |
References | () https://git.kernel.org/stable/c/eb1ea64328d4cc7d7a912c563f8523d5259716ef - Patch | |
CWE | CWE-129 | |
First Time |
Linux
Linux linux Kernel |
|
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
Information
Published : 2024-06-19 14:15
Updated : 2025-04-04 14:44
NVD link : CVE-2024-38587
Mitre link : CVE-2024-38587
CVE.ORG link : CVE-2024-38587
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-129
Improper Validation of Array Index