Bug 2293415 (CVE-2024-38578) - CVE-2024-38578 kernel: ecryptfs: Fix buffer size for tag 66 packet
Summary: CVE-2024-38578 kernel: ecryptfs: Fix buffer size for tag 66 packet
Keywords:
Status: CLOSED CURRENTRELEASE
Alias: CVE-2024-38578
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks: 2293462
TreeView+ depends on / blocked
 
Reported: 2024-06-20 15:11 UTC by Patrick Del Bello
Modified: 2025-05-30 13:58 UTC (History)
5 users (show)

Fixed In Version: kernel 4.19.316, kernel 5.4.278, kernel 5.10.219, kernel 5.15.161, kernel 6.1.93, kernel 6.6.33, kernel 6.8.12, kernel 6.9.3, kernel 6.10-rc1
Clone Of:
Environment:
Last Closed: 2025-05-30 13:58:25 UTC
Embargoed:


Attachments (Terms of Use)

Description Patrick Del Bello 2024-06-20 15:11:41 UTC
In the Linux kernel, the following vulnerability has been resolved:

ecryptfs: Fix buffer size for tag 66 packet

The Linux kernel CVE team has assigned CVE-2024-38578 to this issue.

Upstream advisory:
https://lore.kernel.org/linux-cve-announce/2024061947-CVE-2024-38578-6bf2@gregkh/T

Comment 2 Timothée Ravier 2025-05-30 13:58:25 UTC
According to https://lore.kernel.org/linux-cve-announce/2024061947-CVE-2024-38578-6bf2@gregkh/T/#u, this has been fixed a while ago now. Closing.


Note You need to log in before you can comment on or make changes to this bug.