CVE-2024-38606
Severity CVSS v4.0:
Pending analysis
Type:
CWE-125
Out-of-bounds Read
Publication date:
19/06/2024
Last modified:
06/03/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
crypto: qat - validate slices count returned by FW<br />
<br />
The function adf_send_admin_tl_start() enables the telemetry (TL)<br />
feature on a QAT device by sending the ICP_QAT_FW_TL_START message to<br />
the firmware. This triggers the FW to start writing TL data to a DMA<br />
buffer in memory and returns an array containing the number of<br />
accelerators of each type (slices) supported by this HW.<br />
The pointer to this array is stored in the adf_tl_hw_data data<br />
structure called slice_cnt.<br />
<br />
The array slice_cnt is then used in the function tl_print_dev_data()<br />
to report in debugfs only statistics about the supported accelerators.<br />
An incorrect value of the elements in slice_cnt might lead to an out<br />
of bounds memory read.<br />
At the moment, there isn&#39;t an implementation of FW that returns a wrong<br />
value, but for robustness validate the slice count array returned by FW.
Impact
Base Score 3.x
7.10
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.8 (including) | 6.8.12 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.9 (including) | 6.9.3 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/483fd65ce29317044d1d00757e3fd23503b6b04c
- https://git.kernel.org/stable/c/9b284b915e2a5e63ca133353f8c456eff4446f82
- https://git.kernel.org/stable/c/e57ed345e2e6043629fc74aa5be051415dcc4f77
- https://git.kernel.org/stable/c/483fd65ce29317044d1d00757e3fd23503b6b04c
- https://git.kernel.org/stable/c/9b284b915e2a5e63ca133353f8c456eff4446f82
- https://git.kernel.org/stable/c/e57ed345e2e6043629fc74aa5be051415dcc4f77



