In the Linux kernel, the following vulnerability has been resolved:
ima: fix buffer overrun in ima_eventdigest_init_common
Function ima_eventdigest_init() calls ima_eventdigest_init_common()
with HASH_ALGO__LAST which is then used to access the array
hash_digest_size[] leading to buffer overrun. Have a conditional
statement to handle this.
Metrics
Affected Vendors & Products
References
History
Thu, 13 Feb 2025 00:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-119 | |
Metrics |
cvssV3_1
|
cvssV3_1
|
Tue, 03 Dec 2024 01:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|
Mon, 02 Dec 2024 14:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In the Linux kernel, the following vulnerability has been resolved: ima: fix buffer overrun in ima_eventdigest_init_common Function ima_eventdigest_init() calls ima_eventdigest_init_common() with HASH_ALGO__LAST which is then used to access the array hash_digest_size[] leading to buffer overrun. Have a conditional statement to handle this. | |
Title | ima: fix buffer overrun in ima_eventdigest_init_common | |
References |
|

Status: PUBLISHED
Assigner: Linux
Published:
Updated: 2024-12-19T09:39:20.919Z
Reserved: 2024-11-19T17:17:24.992Z
Link: CVE-2024-53106

No data.

Status : Received
Published: 2024-12-02T14:15:11.420
Modified: 2024-12-02T14:15:11.420
Link: CVE-2024-53106
