Lucene search

K
vulnrichmentLinuxVULNRICHMENT:CVE-2024-38560
HistoryJun 19, 2024 - 1:35 p.m.

CVE-2024-38560 scsi: bfa: Ensure the copied buf is NUL terminated

2024-06-1913:35:29
Linux
github.com
1
linux kernel
vulnerability
scsi
bfa
nul terminated
memdup_user_nul

AI Score

6.7

Confidence

Low

SSVC

Exploitation

none

Automatable

no

Technical Impact

partial

In the Linux kernel, the following vulnerability has been resolved:

scsi: bfa: Ensure the copied buf is NUL terminated

Currently, we allocate a nbytes-sized kernel buffer and copy nbytes from
userspace to that buffer. Later, we use sscanf on this buffer but we don’t
ensure that the string is terminated inside the buffer, this can lead to
OOB read when using sscanf. Fix this issue by using memdup_user_nul instead
of memdup_user.

AI Score

6.7

Confidence

Low

SSVC

Exploitation

none

Automatable

no

Technical Impact

partial