In the Linux kernel, the following vulnerability has been resolved: octeontx2-af: avoid off-by-one read from userspace We try to access count + 1 byte from userspace with memdup_user(buffer, count + 1). However, the userspace only provides buffer of count bytes and only these count bytes are verified to be okay to access. To ensure the copied buffer is NUL terminated, we use memdup_user_nul instead.
History

Fri, 22 Nov 2024 12:00:00 +0000

Type Values Removed Values Added
References

Tue, 05 Nov 2024 10:45:00 +0000

Type Values Removed Values Added
References

cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published: 2024-05-30T15:35:50.445Z

Updated: 2024-12-19T09:03:17.449Z

Reserved: 2024-05-30T15:25:07.080Z

Link: CVE-2024-36957

cve-icon Vulnrichment

Updated: 2024-08-02T03:43:50.509Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-05-30T16:15:18.570

Modified: 2024-11-21T09:22:54.457

Link: CVE-2024-36957

cve-icon Redhat

Severity : Low

Publid Date: 2024-05-30T00:00:00Z

Links: CVE-2024-36957 - Bugzilla