In the Linux kernel, the following vulnerability has been resolved:
KEYS: trusted: dcp: fix improper sg use with CONFIG_VMAP_STACK=y
With vmalloc stack addresses enabled (CONFIG_VMAP_STACK=y) DCP trusted
keys can crash during en- and decryption of the blob encryption key via
the DCP crypto driver. This is caused by improperly using sg_init_one()
with vmalloc'd stack buffers (plain_key_blob).
Fix this by always using kmalloc() for buffers we give to the DCP crypto
driver.
References
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2025-02-27 03:15
Updated : 2025-10-23 13:03
NVD link : CVE-2024-58008
Mitre link : CVE-2024-58008
CVE.ORG link : CVE-2024-58008
JSON object : View
Products Affected
linux
- linux_kernel
CWE
