Lucene search

K
vulnrichmentLinuxVULNRICHMENT:CVE-2024-36931
HistoryMay 30, 2024 - 3:29 p.m.

CVE-2024-36931 s390/cio: Ensure the copied buf is NUL terminated

2024-05-3015:29:22
Linux
github.com
4
linux kernel
vulnerability resolved
s390/cio
buffer
memdup_user_nul
oob read
scanf

AI Score

6.9

Confidence

Low

EPSS

0

Percentile

15.5%

SSVC

Exploitation

none

Automatable

no

Technical Impact

partial

In the Linux kernel, the following vulnerability has been resolved:

s390/cio: Ensure the copied buf is NUL terminated

Currently, we allocate a lbuf-sized kernel buffer and copy lbuf from
userspace to that buffer. Later, we use scanf on this buffer but we don’t
ensure that the string is terminated inside the buffer, this can lead to
OOB read when using scanf. Fix this issue by using memdup_user_nul instead.

CNA Affected

[
  {
    "product": "Linux",
    "vendor": "Linux",
    "defaultStatus": "unaffected",
    "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
    "programFiles": [
      "drivers/s390/cio/cio_inject.c"
    ],
    "versions": [
      {
        "version": "a4f17cc72671",
        "lessThan": "c9d48ce16330",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "a4f17cc72671",
        "lessThan": "10452edd175f",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "a4f17cc72671",
        "lessThan": "84b38f488366",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "a4f17cc72671",
        "lessThan": "06759ebaf75c",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "a4f17cc72671",
        "lessThan": "da7c622cddd4",
        "status": "affected",
        "versionType": "git"
      }
    ]
  },
  {
    "product": "Linux",
    "vendor": "Linux",
    "defaultStatus": "affected",
    "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
    "programFiles": [
      "drivers/s390/cio/cio_inject.c"
    ],
    "versions": [
      {
        "version": "5.13",
        "status": "affected"
      },
      {
        "version": "0",
        "lessThan": "5.13",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "5.15.159",
        "lessThanOrEqual": "5.15.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "6.1.91",
        "lessThanOrEqual": "6.1.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "6.6.31",
        "lessThanOrEqual": "6.6.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "6.8.10",
        "lessThanOrEqual": "6.8.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "6.9",
        "lessThanOrEqual": "*",
        "status": "unaffected",
        "versionType": "original_commit_for_fix"
      }
    ]
  }
]

AI Score

6.9

Confidence

Low

EPSS

0

Percentile

15.5%

SSVC

Exploitation

none

Automatable

no

Technical Impact

partial