First published: Sat Aug 17 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: crypto: mxs-dcp - Ensure payload is zero when using key slot We could leak stack memory through the payload field when running AES with a key from one of the hardware's key slots. Fix this by ensuring the payload field is set to 0 in such cases. This does not affect the common use case when the key is supplied from main memory via the descriptor payload.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Kernel-devel | ||
Linux Kernel | >=6.10<6.10.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-43815 has been assigned a moderate severity rating due to the potential leakage of sensitive stack memory.
To fix CVE-2024-43815, update to the latest version of the Linux kernel that addresses this vulnerability.
CVE-2024-43815 affects the Linux kernel versions between 6.10 and 6.10.3.
CVE-2024-43815 is a memory exposure vulnerability in the crypto subsystem of the Linux kernel.
The potential impact of CVE-2024-43815 includes unauthorized access to sensitive data via leaked stack memory.