CVE-2024-43815

In the Linux kernel, the following vulnerability has been resolved: crypto: mxs-dcp - Ensure payload is zero when using key slot We could leak stack memory through the payload field when running AES with a key from one of the hardware's key slots. Fix this by ensuring the payload field is set to 0 in such cases. This does not affect the common use case when the key is supplied from main memory via the descriptor payload.
Configurations

Configuration 1 (hide)

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

03 Feb 2025, 15:31

Type Values Removed Values Added
First Time Linux linux Kernel
Linux
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CWE CWE-908
References () https://git.kernel.org/stable/c/dd52b5eeb0f70893f762da7254e923fd23fd1379 - () https://git.kernel.org/stable/c/dd52b5eeb0f70893f762da7254e923fd23fd1379 - Patch
References () https://git.kernel.org/stable/c/e1640fed0377bf7276efb70d03cb821a6931063d - () https://git.kernel.org/stable/c/e1640fed0377bf7276efb70d03cb821a6931063d - Patch
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.1

19 Aug 2024, 12:59

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se resolvió la siguiente vulnerabilidad: crypto: mxs-dcp: asegúrese de que el payload sea cero cuando se usa la ranura de clave. Podríamos perder memoria de pila a través del campo de payload cuando ejecutamos AES con una clave de una de las ranuras de clave del hardware. Solucione este problema asegurándose de que el campo de payload esté establecido en 0 en tales casos. Esto no afecta el caso de uso común cuando la clave se suministra desde la memoria principal a través de el payload del descriptor.

17 Aug 2024, 10:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-08-17 10:15

Updated : 2025-02-03 15:31


NVD link : CVE-2024-43815

Mitre link : CVE-2024-43815

CVE.ORG link : CVE-2024-43815


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-908

Use of Uninitialized Resource