CVE-2024-38587

In the Linux kernel, the following vulnerability has been resolved: speakup: Fix sizeof() vs ARRAY_SIZE() bug The "buf" pointer is an array of u16 values. This code should be using ARRAY_SIZE() (which is 256) instead of sizeof() (which is 512), otherwise it can the still got out of bounds.
CVSS

No CVSS.

Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

04 Apr 2025, 14:44

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
First Time Linux linux Kernel
Linux
CWE CWE-129
References () https://git.kernel.org/stable/c/42f0a3f67158ed6b2908d2b9ffbf7e96d23fd358 - () https://git.kernel.org/stable/c/42f0a3f67158ed6b2908d2b9ffbf7e96d23fd358 - Patch
References () https://git.kernel.org/stable/c/d52c04474feac8e305814a5228e622afe481b2ef - () https://git.kernel.org/stable/c/d52c04474feac8e305814a5228e622afe481b2ef - Patch
References () https://git.kernel.org/stable/c/c6e1650cf5df1bd6638eeee231a683ef30c7d4eb - () https://git.kernel.org/stable/c/c6e1650cf5df1bd6638eeee231a683ef30c7d4eb - Patch
References () https://git.kernel.org/stable/c/cd7f3978c2ec741aedd1d860b2adb227314cf996 - () https://git.kernel.org/stable/c/cd7f3978c2ec741aedd1d860b2adb227314cf996 - Patch
References () https://git.kernel.org/stable/c/eb1ea64328d4cc7d7a912c563f8523d5259716ef - () https://git.kernel.org/stable/c/eb1ea64328d4cc7d7a912c563f8523d5259716ef - Patch
References () https://git.kernel.org/stable/c/008ab3c53bc4f0b2f20013c8f6c204a3203d0b8b - () https://git.kernel.org/stable/c/008ab3c53bc4f0b2f20013c8f6c204a3203d0b8b - Patch
References () https://git.kernel.org/stable/c/07ef95cc7a579731198c93beed281e3a79a0e586 - () https://git.kernel.org/stable/c/07ef95cc7a579731198c93beed281e3a79a0e586 - Patch
References () https://git.kernel.org/stable/c/3726f75a1ccc16cd335c0ccfad1d92ee08ecba5e - () https://git.kernel.org/stable/c/3726f75a1ccc16cd335c0ccfad1d92ee08ecba5e - Patch
References () https://git.kernel.org/stable/c/504178fb7d9f6cdb0496d5491efb05f45597e535 - () https://git.kernel.org/stable/c/504178fb7d9f6cdb0496d5491efb05f45597e535 - Patch

15 Jul 2024, 07:15

Type Values Removed Values Added
References
  • {'url': 'https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html', 'name': 'https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html', 'tags': [], 'refsource': ''}

27 Jun 2024, 13:16

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html -

19 Jun 2024, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-06-19 14:15

Updated : 2025-04-04 14:44


NVD link : CVE-2024-38587

Mitre link : CVE-2024-38587


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-129

Improper Validation of Array Index