Lucene search

K
vulnrichmentLinuxVULNRICHMENT:CVE-2024-36957
HistoryMay 30, 2024 - 3:35 p.m.

CVE-2024-36957 octeontx2-af: avoid off-by-one read from userspace

2024-05-3015:35:50
Linux
github.com
5
linux kernel
vulnerability
off-by-one read
userspace
memdup_user
memdup_user_nul
nul terminated
cve-2024-36957

AI Score

6.9

Confidence

Low

EPSS

0

Percentile

10.3%

SSVC

Exploitation

none

Automatable

no

Technical Impact

partial

In the Linux kernel, the following vulnerability has been resolved:

octeontx2-af: avoid off-by-one read from userspace

We try to access count + 1 byte from userspace with memdup_user(buffer,
count + 1). However, the userspace only provides buffer of count bytes and
only these count bytes are verified to be okay to access. To ensure the
copied buffer is NUL terminated, we use memdup_user_nul instead.

CNA Affected

[
  {
    "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
    "vendor": "Linux",
    "product": "Linux",
    "versions": [
      {
        "status": "affected",
        "version": "dae49384d0d7",
        "lessThan": "bcdac70adceb",
        "versionType": "git"
      },
      {
        "status": "affected",
        "version": "3a2eb515d136",
        "lessThan": "ec697fbd38cb",
        "versionType": "git"
      },
      {
        "status": "affected",
        "version": "3a2eb515d136",
        "lessThan": "8f11fe3ea3fc",
        "versionType": "git"
      },
      {
        "status": "affected",
        "version": "3a2eb515d136",
        "lessThan": "0a0285cee11c",
        "versionType": "git"
      },
      {
        "status": "affected",
        "version": "3a2eb515d136",
        "lessThan": "fc3e0076c1f8",
        "versionType": "git"
      },
      {
        "status": "affected",
        "version": "3a2eb515d136",
        "lessThan": "f299ee709fb4",
        "versionType": "git"
      }
    ],
    "programFiles": [
      "drivers/net/ethernet/marvell/octeontx2/af/rvu_debugfs.c"
    ],
    "defaultStatus": "unaffected"
  },
  {
    "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
    "vendor": "Linux",
    "product": "Linux",
    "versions": [
      {
        "status": "affected",
        "version": "5.12"
      },
      {
        "status": "unaffected",
        "version": "0",
        "lessThan": "5.12",
        "versionType": "custom"
      },
      {
        "status": "unaffected",
        "version": "5.10.217",
        "versionType": "custom",
        "lessThanOrEqual": "5.10.*"
      },
      {
        "status": "unaffected",
        "version": "5.15.159",
        "versionType": "custom",
        "lessThanOrEqual": "5.15.*"
      },
      {
        "status": "unaffected",
        "version": "6.1.91",
        "versionType": "custom",
        "lessThanOrEqual": "6.1.*"
      },
      {
        "status": "unaffected",
        "version": "6.6.31",
        "versionType": "custom",
        "lessThanOrEqual": "6.6.*"
      },
      {
        "status": "unaffected",
        "version": "6.8.10",
        "versionType": "custom",
        "lessThanOrEqual": "6.8.*"
      },
      {
        "status": "unaffected",
        "version": "6.9",
        "versionType": "original_commit_for_fix",
        "lessThanOrEqual": "*"
      }
    ],
    "programFiles": [
      "drivers/net/ethernet/marvell/octeontx2/af/rvu_debugfs.c"
    ],
    "defaultStatus": "affected"
  }
]

AI Score

6.9

Confidence

Low

EPSS

0

Percentile

10.3%

SSVC

Exploitation

none

Automatable

no

Technical Impact

partial