CVE-2024-35944 — Linux vulnerability
40 documents7 sources
Severity
5.5MEDIUMNVD
OSV7.0OSV6.8
EPSS
0.0%
top 97.81%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMay 19
Latest updateSep 18
Description
In the Linux kernel, the following vulnerability has been resolved:
VMCI: Fix memcpy() run-time warning in dg_dispatch_as_host()
Syzkaller hit 'WARNING in dg_dispatch_as_host' bug.
memcpy: detected field-spanning write (size 56) of single field "&dg_info->msg"
at drivers/misc/vmw_vmci/vmci_datagram.c:237 (size 24)
WARNING: CPU: 0 PID: 1555 at drivers/misc/vmw_vmci/vmci_datagram.c:237
dg_dispatch_as_host+0x88e/0xa60 drivers/misc/vmw_vmci/vmci_datagram.c:237
Some code commentry, based on my u…
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6
Affected Packages5 packages
▶CVEListV5linux/linuxa110b7ebb9c674a2b591af2780dd512ad0198d50 — e87bb99d2df6512d8ee37a5d63d2ca9a39a8c051+8
Also affects: Debian Linux 10.0
Patches
🔴Vulnerability Details
19📋Vendor Advisories
19💬Community
1Bugzilla
▶