In the Linux kernel, the following vulnerability has been resolved:
dm-crypt: don't modify the data when using authenticated encryption
It was said that authenticated encryption could produce invalid tag when
the data that is being encrypted is modified [1]. So, fix this problem by
copying the data into the clone bio first and then encrypt them inside the
clone bio.
This may reduce performance, but it is needed to prevent the user from
corrupting the device by writing data with O_DIRECT and modifying them at
the same time.
[1] https://lore.kernel.org/all/20240207004723.GA35324@sol.localdomain/T/
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
18 Mar 2025, 16:40
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.1 |
18 Mar 2025, 16:18
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
References | () https://git.kernel.org/stable/c/0dccbb93538fe89a86c6de31d4b1c8c560848eaa - Patch | |
References | () https://git.kernel.org/stable/c/1a4371db68a31076afbe56ecce34fbbe6c80c529 - Patch | |
References | () https://git.kernel.org/stable/c/3c652f6fa1e1f9f02c3fbf359d260ad153ec5f90 - Patch | |
References | () https://git.kernel.org/stable/c/43a202bd552976497474ae144942e32cc5f34d7e - Patch | |
References | () https://git.kernel.org/stable/c/50c70240097ce41fe6bce6478b80478281e4d0f7 - Patch | |
References | () https://git.kernel.org/stable/c/64ba01a365980755732972523600a961c4266b75 - Patch | |
References | () https://git.kernel.org/stable/c/d9e3763a505e50ba3bd22846f2a8db99429fb857 - Patch | |
References | () https://git.kernel.org/stable/c/e08c2a8d27e989f0f5b0888792643027d7e691e6 - Patch | |
References | () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - Mailing List | |
References | () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html - Mailing List | |
First Time |
Linux
Linux linux Kernel Debian debian Linux Debian |
|
CWE | CWE-787 | |
CPE | cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* |
21 Nov 2024, 09:03
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
References | () https://git.kernel.org/stable/c/0dccbb93538fe89a86c6de31d4b1c8c560848eaa - | |
References | () https://git.kernel.org/stable/c/1a4371db68a31076afbe56ecce34fbbe6c80c529 - | |
References | () https://git.kernel.org/stable/c/3c652f6fa1e1f9f02c3fbf359d260ad153ec5f90 - | |
References | () https://git.kernel.org/stable/c/43a202bd552976497474ae144942e32cc5f34d7e - | |
References | () https://git.kernel.org/stable/c/50c70240097ce41fe6bce6478b80478281e4d0f7 - | |
References | () https://git.kernel.org/stable/c/64ba01a365980755732972523600a961c4266b75 - | |
References | () https://git.kernel.org/stable/c/d9e3763a505e50ba3bd22846f2a8db99429fb857 - | |
References | () https://git.kernel.org/stable/c/e08c2a8d27e989f0f5b0888792643027d7e691e6 - |
05 Nov 2024, 10:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
27 Jun 2024, 12:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
25 Jun 2024, 23:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Summary |
|
03 Apr 2024, 17:24
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-04-03 17:15
Updated : 2025-03-18 16:40
NVD link : CVE-2024-26763
Mitre link : CVE-2024-26763
CVE.ORG link : CVE-2024-26763
JSON object : View
Products Affected
debian
- debian_linux
linux
- linux_kernel
CWE
CWE-787
Out-of-bounds Write