CVE-2024-38579

In the Linux kernel, the following vulnerability has been resolved: crypto: bcm - Fix pointer arithmetic In spu2_dump_omd() value of ptr is increased by ciph_key_len instead of hash_iv_len which could lead to going beyond the buffer boundaries. Fix this bug by changing ciph_key_len to hash_iv_len. Found by Linux Verification Center (linuxtesting.org) with SVACE.
References
Link Resource
https://git.kernel.org/stable/c/2b3460cbf454c6b03d7429e9ffc4fe09322eb1a9 Patch
https://git.kernel.org/stable/c/3b7a40740f04e2f27114dfd6225c5e721dda9d57 Patch
https://git.kernel.org/stable/c/49833a8da6407e7e9b532cc4054fdbcaf78f5fdd Patch
https://git.kernel.org/stable/c/c0082ee420639a97e40cae66778b02b341b005e5 Patch
https://git.kernel.org/stable/c/c256b616067bfd6d274c679c06986b78d2402434 Patch
https://git.kernel.org/stable/c/c69a1e4b419c2c466dd8c5602bdebadc353973dd Patch
https://git.kernel.org/stable/c/d0f14ae223c2421b334c1f1a9e48f1e809aee3a0 Patch
https://git.kernel.org/stable/c/e719c8991c161977a67197775067ab456b518c7b Patch
https://git.kernel.org/stable/c/ebed0d666fa709bae9e8cafa8ec6e7ebd1d318c6 Patch
https://git.kernel.org/stable/c/2b3460cbf454c6b03d7429e9ffc4fe09322eb1a9 Patch
https://git.kernel.org/stable/c/3b7a40740f04e2f27114dfd6225c5e721dda9d57 Patch
https://git.kernel.org/stable/c/49833a8da6407e7e9b532cc4054fdbcaf78f5fdd Patch
https://git.kernel.org/stable/c/c0082ee420639a97e40cae66778b02b341b005e5 Patch
https://git.kernel.org/stable/c/c256b616067bfd6d274c679c06986b78d2402434 Patch
https://git.kernel.org/stable/c/c69a1e4b419c2c466dd8c5602bdebadc353973dd Patch
https://git.kernel.org/stable/c/d0f14ae223c2421b334c1f1a9e48f1e809aee3a0 Patch
https://git.kernel.org/stable/c/e719c8991c161977a67197775067ab456b518c7b Patch
https://git.kernel.org/stable/c/ebed0d666fa709bae9e8cafa8ec6e7ebd1d318c6 Patch
https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

04 Nov 2025, 18:16

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html -

20 Oct 2025, 22:07

Type Values Removed Values Added
CWE NVD-CWE-noinfo
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
First Time Linux linux Kernel
Linux
References () https://git.kernel.org/stable/c/2b3460cbf454c6b03d7429e9ffc4fe09322eb1a9 - () https://git.kernel.org/stable/c/2b3460cbf454c6b03d7429e9ffc4fe09322eb1a9 - Patch
References () https://git.kernel.org/stable/c/3b7a40740f04e2f27114dfd6225c5e721dda9d57 - () https://git.kernel.org/stable/c/3b7a40740f04e2f27114dfd6225c5e721dda9d57 - Patch
References () https://git.kernel.org/stable/c/49833a8da6407e7e9b532cc4054fdbcaf78f5fdd - () https://git.kernel.org/stable/c/49833a8da6407e7e9b532cc4054fdbcaf78f5fdd - Patch
References () https://git.kernel.org/stable/c/c0082ee420639a97e40cae66778b02b341b005e5 - () https://git.kernel.org/stable/c/c0082ee420639a97e40cae66778b02b341b005e5 - Patch
References () https://git.kernel.org/stable/c/c256b616067bfd6d274c679c06986b78d2402434 - () https://git.kernel.org/stable/c/c256b616067bfd6d274c679c06986b78d2402434 - Patch
References () https://git.kernel.org/stable/c/c69a1e4b419c2c466dd8c5602bdebadc353973dd - () https://git.kernel.org/stable/c/c69a1e4b419c2c466dd8c5602bdebadc353973dd - Patch
References () https://git.kernel.org/stable/c/d0f14ae223c2421b334c1f1a9e48f1e809aee3a0 - () https://git.kernel.org/stable/c/d0f14ae223c2421b334c1f1a9e48f1e809aee3a0 - Patch
References () https://git.kernel.org/stable/c/e719c8991c161977a67197775067ab456b518c7b - () https://git.kernel.org/stable/c/e719c8991c161977a67197775067ab456b518c7b - Patch
References () https://git.kernel.org/stable/c/ebed0d666fa709bae9e8cafa8ec6e7ebd1d318c6 - () https://git.kernel.org/stable/c/ebed0d666fa709bae9e8cafa8ec6e7ebd1d318c6 - Patch

21 Nov 2024, 09:26

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/2b3460cbf454c6b03d7429e9ffc4fe09322eb1a9 - () https://git.kernel.org/stable/c/2b3460cbf454c6b03d7429e9ffc4fe09322eb1a9 -
References () https://git.kernel.org/stable/c/3b7a40740f04e2f27114dfd6225c5e721dda9d57 - () https://git.kernel.org/stable/c/3b7a40740f04e2f27114dfd6225c5e721dda9d57 -
References () https://git.kernel.org/stable/c/49833a8da6407e7e9b532cc4054fdbcaf78f5fdd - () https://git.kernel.org/stable/c/49833a8da6407e7e9b532cc4054fdbcaf78f5fdd -
References () https://git.kernel.org/stable/c/c0082ee420639a97e40cae66778b02b341b005e5 - () https://git.kernel.org/stable/c/c0082ee420639a97e40cae66778b02b341b005e5 -
References () https://git.kernel.org/stable/c/c256b616067bfd6d274c679c06986b78d2402434 - () https://git.kernel.org/stable/c/c256b616067bfd6d274c679c06986b78d2402434 -
References () https://git.kernel.org/stable/c/c69a1e4b419c2c466dd8c5602bdebadc353973dd - () https://git.kernel.org/stable/c/c69a1e4b419c2c466dd8c5602bdebadc353973dd -
References () https://git.kernel.org/stable/c/d0f14ae223c2421b334c1f1a9e48f1e809aee3a0 - () https://git.kernel.org/stable/c/d0f14ae223c2421b334c1f1a9e48f1e809aee3a0 -
References () https://git.kernel.org/stable/c/e719c8991c161977a67197775067ab456b518c7b - () https://git.kernel.org/stable/c/e719c8991c161977a67197775067ab456b518c7b -
References () https://git.kernel.org/stable/c/ebed0d666fa709bae9e8cafa8ec6e7ebd1d318c6 - () https://git.kernel.org/stable/c/ebed0d666fa709bae9e8cafa8ec6e7ebd1d318c6 -

15 Jul 2024, 07:15

Type Values Removed Values Added
References
  • {'url': 'https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html', 'source': '416baaa9-dc9f-4396-8d5f-8c081fb06d67'}

27 Jun 2024, 12:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html -

20 Jun 2024, 12:44

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: crypto: bcm - Arreglar la aritmética de punteros En spu2_dump_omd() el valor de ptr aumenta en ciph_key_len en lugar de hash_iv_len, lo que podría llevar a ir más allá de los límites del búfer. Corrija este error cambiando ciph_key_len a hash_iv_len. Encontrado por el Centro de verificación de Linux (linuxtesting.org) con SVACE.

19 Jun 2024, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-06-19 14:15

Updated : 2025-11-04 18:16


NVD link : CVE-2024-38579

Mitre link : CVE-2024-38579

CVE.ORG link : CVE-2024-38579


JSON object : View

Products Affected

linux

  • linux_kernel