First published: Thu May 30 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: s390/cio: Ensure the copied buf is NUL terminated Currently, we allocate a lbuf-sized kernel buffer and copy lbuf from userspace to that buffer. Later, we use scanf on this buffer but we don't ensure that the string is terminated inside the buffer, this can lead to OOB read when using scanf. Fix this issue by using memdup_user_nul instead.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | >=5.13<5.15.159 | |
Linux Kernel | >=5.16<6.1.91 | |
Linux Kernel | >=6.2<6.6.31 | |
Linux Kernel | >=6.7<6.8.10 | |
Linux Kernel | =6.9-rc1 | |
Linux Kernel | =6.9-rc2 | |
Linux Kernel | =6.9-rc3 | |
Linux Kernel | =6.9-rc4 | |
Linux Kernel | =6.9-rc5 | |
Linux Kernel | =6.9-rc6 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.15-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-36931 has been classified with a moderate severity level due to potential information leakage.
To resolve CVE-2024-36931, update the Linux kernel to version 5.10.223-1, 5.10.226-1, 6.1.123-1, or later versions.
CVE-2024-36931 affects various Linux kernel versions from 5.13 to versions below 6.1.91.
Yes, patches for CVE-2024-36931 are included in the kernel updates for the specified safe versions.
CVE-2024-36931 involves a failure to ensure that a copied buffer is NUL terminated, potentially leading to unexpected behavior when using string functions.