{"dataType":"CVE_RECORD","cveMetadata":{"cveId":"CVE-2024-38578","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2024-06-18T19:36:34.926Z","datePublished":"2024-06-19T13:37:36.487Z","dateUpdated":"2025-11-04T17:21:32.595Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2025-05-04T09:14:31.009Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\necryptfs: Fix buffer size for tag 66 packet\n\nThe 'TAG 66 Packet Format' description is missing the cipher code and\nchecksum fields that are packed into the message packet. As a result,\nthe buffer allocated for the packet is 3 bytes too small and\nwrite_tag_66_packet() will write up to 3 bytes past the end of the\nbuffer.\n\nFix this by increasing the size of the allocation so the whole packet\nwill always fit in the buffer.\n\nThis fixes the below kasan slab-out-of-bounds bug:\n\n  BUG: KASAN: slab-out-of-bounds in ecryptfs_generate_key_packet_set+0x7d6/0xde0\n  Write of size 1 at addr ffff88800afbb2a5 by task touch/181\n\n  CPU: 0 PID: 181 Comm: touch Not tainted 6.6.13-gnu #1 4c9534092be820851bb687b82d1f92a426598dc6\n  Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.2/GNU Guix 04/01/2014\n  Call Trace:\n   <TASK>\n   dump_stack_lvl+0x4c/0x70\n   print_report+0xc5/0x610\n   ? ecryptfs_generate_key_packet_set+0x7d6/0xde0\n   ? kasan_complete_mode_report_info+0x44/0x210\n   ? ecryptfs_generate_key_packet_set+0x7d6/0xde0\n   kasan_report+0xc2/0x110\n   ? ecryptfs_generate_key_packet_set+0x7d6/0xde0\n   __asan_store1+0x62/0x80\n   ecryptfs_generate_key_packet_set+0x7d6/0xde0\n   ? __pfx_ecryptfs_generate_key_packet_set+0x10/0x10\n   ? __alloc_pages+0x2e2/0x540\n   ? __pfx_ovl_open+0x10/0x10 [overlay 30837f11141636a8e1793533a02e6e2e885dad1d]\n   ? dentry_open+0x8f/0xd0\n   ecryptfs_write_metadata+0x30a/0x550\n   ? __pfx_ecryptfs_write_metadata+0x10/0x10\n   ? ecryptfs_get_lower_file+0x6b/0x190\n   ecryptfs_initialize_file+0x77/0x150\n   ecryptfs_create+0x1c2/0x2f0\n   path_openat+0x17cf/0x1ba0\n   ? __pfx_path_openat+0x10/0x10\n   do_filp_open+0x15e/0x290\n   ? __pfx_do_filp_open+0x10/0x10\n   ? __kasan_check_write+0x18/0x30\n   ? _raw_spin_lock+0x86/0xf0\n   ? __pfx__raw_spin_lock+0x10/0x10\n   ? __kasan_check_write+0x18/0x30\n   ? alloc_fd+0xf4/0x330\n   do_sys_openat2+0x122/0x160\n   ? __pfx_do_sys_openat2+0x10/0x10\n   __x64_sys_openat+0xef/0x170\n   ? __pfx___x64_sys_openat+0x10/0x10\n   do_syscall_64+0x60/0xd0\n   entry_SYSCALL_64_after_hwframe+0x6e/0xd8\n  RIP: 0033:0x7f00a703fd67\n  Code: 25 00 00 41 00 3d 00 00 41 00 74 37 64 8b 04 25 18 00 00 00 85 c0 75 5b 44 89 e2 48 89 ee bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 85 00 00 00 48 83 c4 68 5d 41 5c c3 0f 1f\n  RSP: 002b:00007ffc088e30b0 EFLAGS: 00000246 ORIG_RAX: 0000000000000101\n  RAX: ffffffffffffffda RBX: 00007ffc088e3368 RCX: 00007f00a703fd67\n  RDX: 0000000000000941 RSI: 00007ffc088e48d7 RDI: 00000000ffffff9c\n  RBP: 00007ffc088e48d7 R08: 0000000000000001 R09: 0000000000000000\n  R10: 00000000000001b6 R11: 0000000000000246 R12: 0000000000000941\n  R13: 0000000000000000 R14: 00007ffc088e48d7 R15: 00007f00a7180040\n   </TASK>\n\n  Allocated by task 181:\n   kasan_save_stack+0x2f/0x60\n   kasan_set_track+0x29/0x40\n   kasan_save_alloc_info+0x25/0x40\n   __kasan_kmalloc+0xc5/0xd0\n   __kmalloc+0x66/0x160\n   ecryptfs_generate_key_packet_set+0x6d2/0xde0\n   ecryptfs_write_metadata+0x30a/0x550\n   ecryptfs_initialize_file+0x77/0x150\n   ecryptfs_create+0x1c2/0x2f0\n   path_openat+0x17cf/0x1ba0\n   do_filp_open+0x15e/0x290\n   do_sys_openat2+0x122/0x160\n   __x64_sys_openat+0xef/0x170\n   do_syscall_64+0x60/0xd0\n   entry_SYSCALL_64_after_hwframe+0x6e/0xd8"}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["fs/ecryptfs/keystore.c"],"versions":[{"version":"dddfa461fc8951f9b5f951c13565b6cac678635a","lessThan":"1c125b9287e58f364d82174efb167414b92b11f1","status":"affected","versionType":"git"},{"version":"dddfa461fc8951f9b5f951c13565b6cac678635a","lessThan":"235b85981051cd68fc215fd32a81c6f116bfc4df","status":"affected","versionType":"git"},{"version":"dddfa461fc8951f9b5f951c13565b6cac678635a","lessThan":"edbfc42ab080e78c6907d40a42c9d10b69e445c1","status":"affected","versionType":"git"},{"version":"dddfa461fc8951f9b5f951c13565b6cac678635a","lessThan":"12db25a54ce6bb22b0af28010fff53ef9cb3fe93","status":"affected","versionType":"git"},{"version":"dddfa461fc8951f9b5f951c13565b6cac678635a","lessThan":"0d0f8ba042af16519f1ef7dd10463a33b21b677c","status":"affected","versionType":"git"},{"version":"dddfa461fc8951f9b5f951c13565b6cac678635a","lessThan":"2ed750b7ae1b5dc72896d7dd114c419afd3d1910","status":"affected","versionType":"git"},{"version":"dddfa461fc8951f9b5f951c13565b6cac678635a","lessThan":"a20f09452e2f58f761d11ad7b96b5c894c91030e","status":"affected","versionType":"git"},{"version":"dddfa461fc8951f9b5f951c13565b6cac678635a","lessThan":"f6008487f1eeb8693f8d2a36a89c87d9122ddf74","status":"affected","versionType":"git"},{"version":"dddfa461fc8951f9b5f951c13565b6cac678635a","lessThan":"85a6a1aff08ec9f5b929d345d066e2830e8818e5","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["fs/ecryptfs/keystore.c"],"versions":[{"version":"2.6.21","status":"affected"},{"version":"0","lessThan":"2.6.21","status":"unaffected","versionType":"semver"},{"version":"4.19.316","lessThanOrEqual":"4.19.*","status":"unaffected","versionType":"semver"},{"version":"5.4.278","lessThanOrEqual":"5.4.*","status":"unaffected","versionType":"semver"},{"version":"5.10.219","lessThanOrEqual":"5.10.*","status":"unaffected","versionType":"semver"},{"version":"5.15.161","lessThanOrEqual":"5.15.*","status":"unaffected","versionType":"semver"},{"version":"6.1.93","lessThanOrEqual":"6.1.*","status":"unaffected","versionType":"semver"},{"version":"6.6.33","lessThanOrEqual":"6.6.*","status":"unaffected","versionType":"semver"},{"version":"6.8.12","lessThanOrEqual":"6.8.*","status":"unaffected","versionType":"semver"},{"version":"6.9.3","lessThanOrEqual":"6.9.*","status":"unaffected","versionType":"semver"},{"version":"6.10","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.21","versionEndExcluding":"4.19.316"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.21","versionEndExcluding":"5.4.278"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.21","versionEndExcluding":"5.10.219"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.21","versionEndExcluding":"5.15.161"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.21","versionEndExcluding":"6.1.93"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.21","versionEndExcluding":"6.6.33"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.21","versionEndExcluding":"6.8.12"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.21","versionEndExcluding":"6.9.3"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.21","versionEndExcluding":"6.10"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/1c125b9287e58f364d82174efb167414b92b11f1"},{"url":"https://git.kernel.org/stable/c/235b85981051cd68fc215fd32a81c6f116bfc4df"},{"url":"https://git.kernel.org/stable/c/edbfc42ab080e78c6907d40a42c9d10b69e445c1"},{"url":"https://git.kernel.org/stable/c/12db25a54ce6bb22b0af28010fff53ef9cb3fe93"},{"url":"https://git.kernel.org/stable/c/0d0f8ba042af16519f1ef7dd10463a33b21b677c"},{"url":"https://git.kernel.org/stable/c/2ed750b7ae1b5dc72896d7dd114c419afd3d1910"},{"url":"https://git.kernel.org/stable/c/a20f09452e2f58f761d11ad7b96b5c894c91030e"},{"url":"https://git.kernel.org/stable/c/f6008487f1eeb8693f8d2a36a89c87d9122ddf74"},{"url":"https://git.kernel.org/stable/c/85a6a1aff08ec9f5b929d345d066e2830e8818e5"}],"title":"ecryptfs: Fix buffer size for tag 66 packet","x_generator":{"engine":"bippy-1.2.0"}},"adp":[{"title":"CVE Program Container","references":[{"url":"https://git.kernel.org/stable/c/1c125b9287e58f364d82174efb167414b92b11f1","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/235b85981051cd68fc215fd32a81c6f116bfc4df","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/edbfc42ab080e78c6907d40a42c9d10b69e445c1","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/12db25a54ce6bb22b0af28010fff53ef9cb3fe93","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/0d0f8ba042af16519f1ef7dd10463a33b21b677c","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/2ed750b7ae1b5dc72896d7dd114c419afd3d1910","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/a20f09452e2f58f761d11ad7b96b5c894c91030e","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/f6008487f1eeb8693f8d2a36a89c87d9122ddf74","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/85a6a1aff08ec9f5b929d345d066e2830e8818e5","tags":["x_transferred"]},{"url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html"}],"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2025-11-04T17:21:32.595Z"}},{"metrics":[{"other":{"type":"ssvc","content":{"id":"CVE-2024-38578","role":"CISA Coordinator","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"version":"2.0.3","timestamp":"2024-09-10T17:14:06.312936Z"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-09-11T17:34:55.678Z"}}]},"dataVersion":"5.2"}