CVE-2024-38621

In the Linux kernel, the following vulnerability has been resolved: media: stk1160: fix bounds checking in stk1160_copy_video() The subtract in this condition is reversed. The ->length is the length of the buffer. The ->bytesused is how many bytes we have copied thus far. When the condition is reversed that means the result of the subtraction is always negative but since it's unsigned then the result is a very high positive value. That means the overflow check is never true. Additionally, the ->bytesused doesn't actually work for this purpose because we're not writing to "buf->mem + buf->bytesused". Instead, the math to calculate the destination where we are writing is a bit involved. You calculate the number of full lines already written, multiply by two, skip a line if necessary so that we start on an odd numbered line, and add the offset into the line. To fix this buffer overflow, just take the actual destination where we are writing, if the offset is already out of bounds print an error and return. Otherwise, write up to buf->length bytes.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

17 Sep 2025, 16:57

Type Values Removed Values Added
First Time Linux
Linux linux Kernel
References () https://git.kernel.org/stable/c/7532bcec0797adfa08791301c3bcae14141db3bd - () https://git.kernel.org/stable/c/7532bcec0797adfa08791301c3bcae14141db3bd - Patch
References () https://git.kernel.org/stable/c/a08492832cc4cacc24e0612f483c86ca899b9261 - () https://git.kernel.org/stable/c/a08492832cc4cacc24e0612f483c86ca899b9261 - Patch
References () https://git.kernel.org/stable/c/a16775828aaed1c54ff4e6fe83e8e4d5c6a50cb7 - () https://git.kernel.org/stable/c/a16775828aaed1c54ff4e6fe83e8e4d5c6a50cb7 - Patch
References () https://git.kernel.org/stable/c/b504518a397059e1d55c521ba0ea2b545a6c4b52 - () https://git.kernel.org/stable/c/b504518a397059e1d55c521ba0ea2b545a6c4b52 - Patch
References () https://git.kernel.org/stable/c/d410017a7181cb55e4a5c810b32b75e4416c6808 - () https://git.kernel.org/stable/c/d410017a7181cb55e4a5c810b32b75e4416c6808 - Patch
References () https://git.kernel.org/stable/c/ecf4ddc3aee8ade504c4d36b7b4053ce6093e200 - () https://git.kernel.org/stable/c/ecf4ddc3aee8ade504c4d36b7b4053ce6093e200 - Patch
References () https://git.kernel.org/stable/c/f6a392266276730bea893b55d12940e32a25f56a - () https://git.kernel.org/stable/c/f6a392266276730bea893b55d12940e32a25f56a - Patch
References () https://git.kernel.org/stable/c/faa4364bef2ec0060de381ff028d1d836600a381 - () https://git.kernel.org/stable/c/faa4364bef2ec0060de381ff028d1d836600a381 - Patch
CWE CWE-787
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.1

21 Nov 2024, 09:26

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/7532bcec0797adfa08791301c3bcae14141db3bd - () https://git.kernel.org/stable/c/7532bcec0797adfa08791301c3bcae14141db3bd -
References () https://git.kernel.org/stable/c/a08492832cc4cacc24e0612f483c86ca899b9261 - () https://git.kernel.org/stable/c/a08492832cc4cacc24e0612f483c86ca899b9261 -
References () https://git.kernel.org/stable/c/a16775828aaed1c54ff4e6fe83e8e4d5c6a50cb7 - () https://git.kernel.org/stable/c/a16775828aaed1c54ff4e6fe83e8e4d5c6a50cb7 -
References () https://git.kernel.org/stable/c/b504518a397059e1d55c521ba0ea2b545a6c4b52 - () https://git.kernel.org/stable/c/b504518a397059e1d55c521ba0ea2b545a6c4b52 -
References () https://git.kernel.org/stable/c/d410017a7181cb55e4a5c810b32b75e4416c6808 - () https://git.kernel.org/stable/c/d410017a7181cb55e4a5c810b32b75e4416c6808 -
References () https://git.kernel.org/stable/c/ecf4ddc3aee8ade504c4d36b7b4053ce6093e200 - () https://git.kernel.org/stable/c/ecf4ddc3aee8ade504c4d36b7b4053ce6093e200 -
References () https://git.kernel.org/stable/c/f6a392266276730bea893b55d12940e32a25f56a - () https://git.kernel.org/stable/c/f6a392266276730bea893b55d12940e32a25f56a -
References () https://git.kernel.org/stable/c/faa4364bef2ec0060de381ff028d1d836600a381 - () https://git.kernel.org/stable/c/faa4364bef2ec0060de381ff028d1d836600a381 -

15 Jul 2024, 07:15

Type Values Removed Values Added
References
  • {'url': 'https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html', 'source': '416baaa9-dc9f-4396-8d5f-8c081fb06d67'}

27 Jun 2024, 13:16

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html -
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: medios: stk1160: revisión de los límites fijos en stk1160_copy_video() La resta en esta condición se invierte. La ->longitud es la longitud del búfer. El ->byteused es cuántos bytes hemos copiado hasta ahora. Cuando la condición se invierte, eso significa que el resultado de la resta siempre es negativo, pero como no tiene signo, el resultado es un valor positivo muy alto. Eso significa que la verificación de desbordamiento nunca es cierta. Además, ->bytesused en realidad no funciona para este propósito porque no estamos escribiendo en "buf->mem + buf->bytesused". En cambio, las matemáticas para calcular el destino donde estamos escribiendo son un poco complicadas. Calcula el número de líneas completas ya escritas, multiplica por dos, omite una línea si es necesario para comenzar en una línea impar y agrega el desplazamiento a la línea. Para solucionar este desbordamiento del búfer, simplemente tome el destino real donde estamos escribiendo, si el desplazamiento ya está fuera de los límites imprima un error y regrese. De lo contrario, escriba hasta buf->bytes de longitud.

21 Jun 2024, 11:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-06-21 11:15

Updated : 2025-09-17 16:57


NVD link : CVE-2024-38621

Mitre link : CVE-2024-38621

CVE.ORG link : CVE-2024-38621


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-787

Out-of-bounds Write