In the Linux kernel, the following vulnerability has been resolved:
crypto: starfive - Do not free stack buffer
RSA text data uses variable length buffer allocated in software stack.
Calling kfree on it causes undefined behaviour in subsequent operations.
References
Link | Resource |
---|---|
https://git.kernel.org/stable/c/5944de192663f272033501dcd322b008fca72006 | Mailing List Patch |
https://git.kernel.org/stable/c/d7f01649f4eaf1878472d3d3f480ae1e50d98f6c | Mailing List Patch |
https://git.kernel.org/stable/c/5944de192663f272033501dcd322b008fca72006 | Mailing List Patch |
https://git.kernel.org/stable/c/d7f01649f4eaf1878472d3d3f480ae1e50d98f6c | Mailing List Patch |
Configurations
History
21 Nov 2024, 09:27
Type | Values Removed | Values Added |
---|---|---|
References | () https://git.kernel.org/stable/c/5944de192663f272033501dcd322b008fca72006 - Mailing List, Patch | |
References | () https://git.kernel.org/stable/c/d7f01649f4eaf1878472d3d3f480ae1e50d98f6c - Mailing List, Patch |
08 Jul 2024, 18:01
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
CWE | CWE-770 | |
References | () https://git.kernel.org/stable/c/5944de192663f272033501dcd322b008fca72006 - Mailing List, Patch | |
References | () https://git.kernel.org/stable/c/d7f01649f4eaf1878472d3d3f480ae1e50d98f6c - Mailing List, Patch | |
First Time |
Linux
Linux linux Kernel |
|
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
05 Jul 2024, 12:55
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
05 Jul 2024, 07:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-07-05 07:15
Updated : 2024-11-21 09:27
NVD link : CVE-2024-39478
Mitre link : CVE-2024-39478
CVE.ORG link : CVE-2024-39478
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-770
Allocation of Resources Without Limits or Throttling