CVE-2024-42229

Source
https://cve.org/CVERecord?id=CVE-2024-42229
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-42229.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-42229
Downstream
Related
Published
2024-07-30T07:47:09.817Z
Modified
2026-03-20T12:38:43.802245Z
Summary
crypto: aead,cipher - zeroize key buffer after use
Details

In the Linux kernel, the following vulnerability has been resolved:

crypto: aead,cipher - zeroize key buffer after use

I.G 9.7.B for FIPS 140-3 specifies that variables temporarily holding cryptographic information should be zeroized once they are no longer needed. Accomplish this by using kfree_sensitive for buffers that previously held the private key.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/42xxx/CVE-2024-42229.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
06817176784f620984200dc5d7cbe16984f7b262
Fixed
89b9b6fa4463daf820e6a5ef65c3b0c2db239513
Fixed
b716e9c3603ee95ed45e938fe47227d22cf3ec35
Fixed
9db8c299a521813630fcb4154298cb60c37f3133
Fixed
71dd428615375e36523f4d4f7685ddd54113646d
Fixed
28c8d274848feba552e95c5c2a7e3cfe8f15c534
Fixed
b502d4a08875ea2b4ea5d5b28dc7c991c8b90cfb
Fixed
f58679996a831754a356974376f248aa0af2eb8e
Fixed
23e4099bdc3c8381992f9eb975c79196d6755210

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-42229.json"