CVE-2024-36934 — Out-of-bounds Write in Linux
Severity
7.8HIGHNVD
OSV6.5OSV5.5
EPSS
0.0%
top 98.79%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMay 30
Latest updateMay 13
Description
In the Linux kernel, the following vulnerability has been resolved:
bna: ensure the copied buf is NUL terminated
Currently, we allocate a nbytes-sized kernel buffer and copy nbytes from
userspace to that buffer. Later, we use sscanf on this buffer but we don't
ensure that the string is terminated inside the buffer, this can lead to
OOB read when using sscanf. Fix this issue by using memdup_user_nul
instead of memdup_user.
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9
Affected Packages5 packages
▶CVEListV5linux/linux7afc5dbde09104b023ce04465ba71aaba0fc4346 — bd502ba81cd1d515deddad7dbc6b812b14b97147+8
Also affects: Debian Linux 10.0