In the Linux kernel, the following vulnerability has been resolved:
octeontx2-af: avoid off-by-one read from userspace
We try to access count + 1 byte from userspace with memdup_user(buffer,
count + 1). However, the userspace only provides buffer of count bytes and
only these count bytes are verified to be okay to access. To ensure the
copied buffer is NUL terminated, we use memdup_user_nul instead.
Metrics
Affected Vendors & Products
References
History
Fri, 22 Nov 2024 12:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Tue, 05 Nov 2024 10:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
MITRE
Status: PUBLISHED
Assigner: Linux
Published: 2024-05-30T15:35:50.445Z
Updated: 2024-12-19T09:03:17.449Z
Reserved: 2024-05-30T15:25:07.080Z
Link: CVE-2024-36957
Vulnrichment
Updated: 2024-08-02T03:43:50.509Z
NVD
Status : Awaiting Analysis
Published: 2024-05-30T16:15:18.570
Modified: 2024-11-21T09:22:54.457
Link: CVE-2024-36957
Redhat