CVE-2024-58008
KEYS: trusted: dcp: fix improper sg use with CONFIG_VMAP_STACK=y
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
In the Linux kernel, the following vulnerability has been resolved: KEYS: trusted: dcp: fix improper sg use with CONFIG_VMAP_STACK=y With vmalloc stack addresses enabled (CONFIG_VMAP_STACK=y) DCP trusted keys can crash during en- and decryption of the blob encryption key via the DCP crypto driver. This is caused by improperly using sg_init_one() with vmalloc'd stack buffers (plain_key_blob). Fix this by always using kmalloc() for buffers we give to the DCP crypto driver.
| Vendor | linux |
| Product | linux |
| Ecosystems | |
| Industries | Technology |
| Published | Feb 27, 2025 |
| Last Updated | May 11, 2026 |
Stay Ahead of the Next One
Get instant alerts for linux linux
Be the first to know when new unknown vulnerabilities affecting linux linux are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
Linux / Linux
0e28bf61a5f9ab30be3f3b4eafb8d097e39446bb < 3192f1c54dddb9b5820bf5e8677809949d8e9c66 0e28bf61a5f9ab30be3f3b4eafb8d097e39446bb < 3355594de46fb1cba663f12b9644b664b8a609f4 0e28bf61a5f9ab30be3f3b4eafb8d097e39446bb < e8d9fab39d1f87b52932646b2f1e7877aa3fc0f4 9e3b266afcfe4294e84496f50f006f029d3100db
Linux / Linux
6.11