In the Linux kernel, the following vulnerability has been resolved:
KEYS: trusted: dcp: fix improper sg use with CONFIG_VMAP_STACK=y
With vmalloc stack addresses enabled (CONFIG_VMAP_STACK=y) DCP trusted
keys can crash during en- and decryption of the blob encryption key via
the DCP crypto driver. This is caused by improperly using sg_init_one()
with vmalloc'd stack buffers (plain_key_blob).
Fix this by always using kmalloc() for buffers we give to the DCP crypto
driver.
Metrics
Affected Vendors & Products
References
History
Fri, 28 Feb 2025 02:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|
Thu, 27 Feb 2025 02:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In the Linux kernel, the following vulnerability has been resolved: KEYS: trusted: dcp: fix improper sg use with CONFIG_VMAP_STACK=y With vmalloc stack addresses enabled (CONFIG_VMAP_STACK=y) DCP trusted keys can crash during en- and decryption of the blob encryption key via the DCP crypto driver. This is caused by improperly using sg_init_one() with vmalloc'd stack buffers (plain_key_blob). Fix this by always using kmalloc() for buffers we give to the DCP crypto driver. | |
Title | KEYS: trusted: dcp: fix improper sg use with CONFIG_VMAP_STACK=y | |
References |
|

Status: PUBLISHED
Assigner: Linux
Published: 2025-02-27T02:12:04.100Z
Updated: 2025-03-24T15:37:52.767Z
Reserved: 2025-02-27T02:10:48.227Z
Link: CVE-2024-58008

No data.

Status : Received
Published: 2025-02-27T03:15:11.780
Modified: 2025-02-27T03:15:11.780
Link: CVE-2024-58008
