First published: Tue Nov 19 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: KEYS: trusted: dcp: fix NULL dereference in AEAD crypto operation When sealing or unsealing a key blob we currently do not wait for the AEAD cipher operation to finish and simply return after submitting the request. If there is some load on the system we can exit before the cipher operation is done and the buffer we read from/write to is already removed from the stack. This will e.g. result in NULL pointer dereference errors in the DCP driver during blob creation. Fix this by waiting for the AEAD cipher operation to finish before resuming the seal and unseal calls.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | >=6.11<6.11.8 | |
Linux Kernel | =6.10.7 | |
Linux Kernel | =6.12-rc1 | |
Linux Kernel | =6.12-rc2 | |
Linux Kernel | =6.12-rc3 | |
Linux Kernel | =6.12-rc4 | |
Linux Kernel | =6.12-rc5 | |
Linux Kernel | =6.12-rc6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-50281 has been classified as a medium severity vulnerability in the Linux kernel.
To fix CVE-2024-50281, update your Linux kernel to the latest stable version that addresses this vulnerability.
CVE-2024-50281 affects multiple versions of the Linux kernel, including versions 6.10.7 and 6.12-rc1 to 6.12-rc6.
CVE-2024-50281 involves a NULL dereference in the AEAD crypto operation when sealing or unsealing a key blob.
As of now, there are no publicly known exploits specifically targeting CVE-2024-50281.