Skip to main content

CVE-2024-38578: Vulnerability in Linux Linux

High
VulnerabilityCVE-2024-38578cvecve-2024-38578
Published: Wed Jun 19 2024 (06/19/2024, 13:37:36 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: ecryptfs: Fix buffer size for tag 66 packet The 'TAG 66 Packet Format' description is missing the cipher code and checksum fields that are packed into the message packet. As a result, the buffer allocated for the packet is 3 bytes too small and write_tag_66_packet() will write up to 3 bytes past the end of the buffer. Fix this by increasing the size of the allocation so the whole packet will always fit in the buffer. This fixes the below kasan slab-out-of-bounds bug: BUG: KASAN: slab-out-of-bounds in ecryptfs_generate_key_packet_set+0x7d6/0xde0 Write of size 1 at addr ffff88800afbb2a5 by task touch/181 CPU: 0 PID: 181 Comm: touch Not tainted 6.6.13-gnu #1 4c9534092be820851bb687b82d1f92a426598dc6 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.2/GNU Guix 04/01/2014 Call Trace: <TASK> dump_stack_lvl+0x4c/0x70 print_report+0xc5/0x610 ? ecryptfs_generate_key_packet_set+0x7d6/0xde0 ? kasan_complete_mode_report_info+0x44/0x210 ? ecryptfs_generate_key_packet_set+0x7d6/0xde0 kasan_report+0xc2/0x110 ? ecryptfs_generate_key_packet_set+0x7d6/0xde0 __asan_store1+0x62/0x80 ecryptfs_generate_key_packet_set+0x7d6/0xde0 ? __pfx_ecryptfs_generate_key_packet_set+0x10/0x10 ? __alloc_pages+0x2e2/0x540 ? __pfx_ovl_open+0x10/0x10 [overlay 30837f11141636a8e1793533a02e6e2e885dad1d] ? dentry_open+0x8f/0xd0 ecryptfs_write_metadata+0x30a/0x550 ? __pfx_ecryptfs_write_metadata+0x10/0x10 ? ecryptfs_get_lower_file+0x6b/0x190 ecryptfs_initialize_file+0x77/0x150 ecryptfs_create+0x1c2/0x2f0 path_openat+0x17cf/0x1ba0 ? __pfx_path_openat+0x10/0x10 do_filp_open+0x15e/0x290 ? __pfx_do_filp_open+0x10/0x10 ? __kasan_check_write+0x18/0x30 ? _raw_spin_lock+0x86/0xf0 ? __pfx__raw_spin_lock+0x10/0x10 ? __kasan_check_write+0x18/0x30 ? alloc_fd+0xf4/0x330 do_sys_openat2+0x122/0x160 ? __pfx_do_sys_openat2+0x10/0x10 __x64_sys_openat+0xef/0x170 ? __pfx___x64_sys_openat+0x10/0x10 do_syscall_64+0x60/0xd0 entry_SYSCALL_64_after_hwframe+0x6e/0xd8 RIP: 0033:0x7f00a703fd67 Code: 25 00 00 41 00 3d 00 00 41 00 74 37 64 8b 04 25 18 00 00 00 85 c0 75 5b 44 89 e2 48 89 ee bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 85 00 00 00 48 83 c4 68 5d 41 5c c3 0f 1f RSP: 002b:00007ffc088e30b0 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 RAX: ffffffffffffffda RBX: 00007ffc088e3368 RCX: 00007f00a703fd67 RDX: 0000000000000941 RSI: 00007ffc088e48d7 RDI: 00000000ffffff9c RBP: 00007ffc088e48d7 R08: 0000000000000001 R09: 0000000000000000 R10: 00000000000001b6 R11: 0000000000000246 R12: 0000000000000941 R13: 0000000000000000 R14: 00007ffc088e48d7 R15: 00007f00a7180040 </TASK> Allocated by task 181: kasan_save_stack+0x2f/0x60 kasan_set_track+0x29/0x40 kasan_save_alloc_info+0x25/0x40 __kasan_kmalloc+0xc5/0xd0 __kmalloc+0x66/0x160 ecryptfs_generate_key_packet_set+0x6d2/0xde0 ecryptfs_write_metadata+0x30a/0x550 ecryptfs_initialize_file+0x77/0x150 ecryptfs_create+0x1c2/0x2f0 path_openat+0x17cf/0x1ba0 do_filp_open+0x15e/0x290 do_sys_openat2+0x122/0x160 __x64_sys_openat+0xef/0x170 do_syscall_64+0x60/0xd0 entry_SYSCALL_64_after_hwframe+0x6e/0xd8

AI-Powered Analysis

AILast updated: 06/29/2025, 11:39:39 UTC

Technical Analysis

CVE-2024-38578 is a vulnerability identified in the Linux kernel's eCryptfs module, specifically related to the handling of the 'TAG 66 Packet Format'. The issue arises because the packet format description omitted the cipher code and checksum fields, which are part of the message packet. Consequently, the buffer allocated for this packet is three bytes too small. When the function write_tag_66_packet() attempts to write the packet data, it can write up to three bytes beyond the allocated buffer boundary, causing a buffer overflow condition. This vulnerability was detected through a Kernel Address Sanitizer (KASAN) slab-out-of-bounds error during the execution of ecryptfs_generate_key_packet_set(). The overflow can lead to memory corruption within kernel space, potentially destabilizing the system or enabling privilege escalation or arbitrary code execution under certain conditions. The vulnerability affects Linux kernel versions prior to the fix applied in version 6.6.13-gnu and involves the eCryptfs filesystem, which is a stacked cryptographic filesystem used to encrypt files on top of existing filesystems. The root cause was addressed by increasing the buffer allocation size to accommodate the full packet, including the previously omitted fields, thus preventing out-of-bounds writes. No known exploits are reported in the wild as of the publication date, and the vulnerability requires local code execution context to trigger, as it involves kernel-level filesystem operations. The detailed kernel stack trace indicates the flaw manifests during file creation and metadata writing operations within eCryptfs, triggered by system calls such as openat. This vulnerability is critical because it involves kernel memory corruption, which can undermine system integrity and security if exploited.

Potential Impact

For European organizations, the impact of CVE-2024-38578 can be significant, especially for those relying on Linux systems with eCryptfs enabled for file encryption. Exploitation could lead to kernel memory corruption, causing system crashes or enabling attackers with local access to escalate privileges or execute arbitrary code with kernel-level permissions. This can compromise confidentiality, integrity, and availability of critical data and systems. Organizations in sectors such as finance, healthcare, government, and critical infrastructure that use Linux servers or workstations with eCryptfs are at heightened risk. The vulnerability could disrupt operations, lead to data breaches, or facilitate lateral movement within networks. Since eCryptfs is often used to secure sensitive files, exploitation could expose encrypted data or weaken encryption guarantees. Additionally, the requirement for local access means that attackers might leverage this vulnerability post-initial compromise to deepen their foothold. The lack of known exploits in the wild currently reduces immediate risk, but the severity of kernel-level vulnerabilities warrants prompt attention to patching and mitigation.

Mitigation Recommendations

European organizations should take the following specific mitigation steps: 1) Identify all Linux systems using eCryptfs, especially those running kernel versions prior to 6.6.13-gnu or the version containing the fix. 2) Apply the official Linux kernel patches or upgrade to a kernel version that includes the fix for CVE-2024-38578 as soon as possible. 3) If immediate patching is not feasible, restrict local access to affected systems by enforcing strict access controls, limiting user privileges, and monitoring for suspicious local activity. 4) Implement kernel hardening and runtime protections such as Kernel Address Sanitizer (KASAN) in testing environments to detect similar issues proactively. 5) Monitor system logs and audit trails for anomalies related to eCryptfs operations or kernel memory errors. 6) Educate system administrators about the risks of local privilege escalation vulnerabilities and the importance of timely patch management. 7) Consider alternative encryption solutions if eCryptfs is not critical, to reduce attack surface. 8) Integrate this vulnerability into vulnerability management and incident response plans to ensure rapid detection and remediation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-06-18T19:36:34.926Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9829c4522896dcbe2a11

Added to database: 5/21/2025, 9:08:57 AM

Last enriched: 6/29/2025, 11:39:39 AM

Last updated: 8/13/2025, 11:20:33 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats