CVE-2024-26763

In the Linux kernel, the following vulnerability has been resolved: dm-crypt: don't modify the data when using authenticated encryption It was said that authenticated encryption could produce invalid tag when the data that is being encrypted is modified [1]. So, fix this problem by copying the data into the clone bio first and then encrypt them inside the clone bio. This may reduce performance, but it is needed to prevent the user from corrupting the device by writing data with O_DIRECT and modifying them at the same time. [1] https://lore.kernel.org/all/20240207004723.GA35324@sol.localdomain/T/
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

History

18 Mar 2025, 16:40

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 5.5
v2 : unknown
v3 : 7.1

18 Mar 2025, 16:18

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
References () https://git.kernel.org/stable/c/0dccbb93538fe89a86c6de31d4b1c8c560848eaa - () https://git.kernel.org/stable/c/0dccbb93538fe89a86c6de31d4b1c8c560848eaa - Patch
References () https://git.kernel.org/stable/c/1a4371db68a31076afbe56ecce34fbbe6c80c529 - () https://git.kernel.org/stable/c/1a4371db68a31076afbe56ecce34fbbe6c80c529 - Patch
References () https://git.kernel.org/stable/c/3c652f6fa1e1f9f02c3fbf359d260ad153ec5f90 - () https://git.kernel.org/stable/c/3c652f6fa1e1f9f02c3fbf359d260ad153ec5f90 - Patch
References () https://git.kernel.org/stable/c/43a202bd552976497474ae144942e32cc5f34d7e - () https://git.kernel.org/stable/c/43a202bd552976497474ae144942e32cc5f34d7e - Patch
References () https://git.kernel.org/stable/c/50c70240097ce41fe6bce6478b80478281e4d0f7 - () https://git.kernel.org/stable/c/50c70240097ce41fe6bce6478b80478281e4d0f7 - Patch
References () https://git.kernel.org/stable/c/64ba01a365980755732972523600a961c4266b75 - () https://git.kernel.org/stable/c/64ba01a365980755732972523600a961c4266b75 - Patch
References () https://git.kernel.org/stable/c/d9e3763a505e50ba3bd22846f2a8db99429fb857 - () https://git.kernel.org/stable/c/d9e3763a505e50ba3bd22846f2a8db99429fb857 - Patch
References () https://git.kernel.org/stable/c/e08c2a8d27e989f0f5b0888792643027d7e691e6 - () https://git.kernel.org/stable/c/e08c2a8d27e989f0f5b0888792643027d7e691e6 - Patch
References () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - Mailing List
References () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html - () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html - Mailing List
First Time Linux
Linux linux Kernel
Debian debian Linux
Debian
CWE CWE-787
CPE cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

21 Nov 2024, 09:03

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html -
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html -
References () https://git.kernel.org/stable/c/0dccbb93538fe89a86c6de31d4b1c8c560848eaa - () https://git.kernel.org/stable/c/0dccbb93538fe89a86c6de31d4b1c8c560848eaa -
References () https://git.kernel.org/stable/c/1a4371db68a31076afbe56ecce34fbbe6c80c529 - () https://git.kernel.org/stable/c/1a4371db68a31076afbe56ecce34fbbe6c80c529 -
References () https://git.kernel.org/stable/c/3c652f6fa1e1f9f02c3fbf359d260ad153ec5f90 - () https://git.kernel.org/stable/c/3c652f6fa1e1f9f02c3fbf359d260ad153ec5f90 -
References () https://git.kernel.org/stable/c/43a202bd552976497474ae144942e32cc5f34d7e - () https://git.kernel.org/stable/c/43a202bd552976497474ae144942e32cc5f34d7e -
References () https://git.kernel.org/stable/c/50c70240097ce41fe6bce6478b80478281e4d0f7 - () https://git.kernel.org/stable/c/50c70240097ce41fe6bce6478b80478281e4d0f7 -
References () https://git.kernel.org/stable/c/64ba01a365980755732972523600a961c4266b75 - () https://git.kernel.org/stable/c/64ba01a365980755732972523600a961c4266b75 -
References () https://git.kernel.org/stable/c/d9e3763a505e50ba3bd22846f2a8db99429fb857 - () https://git.kernel.org/stable/c/d9e3763a505e50ba3bd22846f2a8db99429fb857 -
References () https://git.kernel.org/stable/c/e08c2a8d27e989f0f5b0888792643027d7e691e6 - () https://git.kernel.org/stable/c/e08c2a8d27e989f0f5b0888792643027d7e691e6 -

05 Nov 2024, 10:15

Type Values Removed Values Added
References
  • {'url': 'https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html', 'source': '416baaa9-dc9f-4396-8d5f-8c081fb06d67'}
  • {'url': 'https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html', 'source': '416baaa9-dc9f-4396-8d5f-8c081fb06d67'}

27 Jun 2024, 12:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html -

25 Jun 2024, 23:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html -
Summary
  • (es) En el kernel de Linux se ha resuelto la siguiente vulnerabilidad: dm-crypt: no modifica los datos cuando se utiliza cifrado autenticado Se dijo que el cifrado autenticado podría producir etiquetas no válidas cuando se modifican los datos que se están cifrando [1]. Entonces, solucione este problema copiando primero los datos en la biografía del clon y luego cifrándolos dentro de la biografía del clon. Esto puede reducir el rendimiento, pero es necesario para evitar que el usuario dañe el dispositivo escribiendo datos con O_DIRECT y modificándolos al mismo tiempo. [1] https://lore.kernel.org/all/20240207004723.GA35324@sol.localdomain/T/

03 Apr 2024, 17:24

Type Values Removed Values Added
New CVE

Information

Published : 2024-04-03 17:15

Updated : 2025-03-18 16:40


NVD link : CVE-2024-26763

Mitre link : CVE-2024-26763

CVE.ORG link : CVE-2024-26763


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel
CWE
CWE-787

Out-of-bounds Write