U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

CVE-2024-36931 Detail

Description

In the Linux kernel, the following vulnerability has been resolved: s390/cio: Ensure the copied buf is NUL terminated Currently, we allocate a lbuf-sized kernel buffer and copy lbuf from userspace to that buffer. Later, we use scanf on this buffer but we don't ensure that the string is terminated inside the buffer, this can lead to OOB read when using scanf. Fix this issue by using memdup_user_nul instead.


Metrics

NVD enrichment efforts reference publicly available information to associate vector strings. CVSS information contributed by other sources is also displayed.
CVSS 4.0 Severity and Vector Strings:

NIST CVSS score
NIST: NVD
N/A
NVD assessment not yet provided.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

Hyperlink Resource
https://git.kernel.org/stable/c/06759ebaf75c19c87b2453a5e130e9e61e9b5d65
https://git.kernel.org/stable/c/06759ebaf75c19c87b2453a5e130e9e61e9b5d65
https://git.kernel.org/stable/c/10452edd175fcc4fd0f5ac782ed2a002e3e5d65c
https://git.kernel.org/stable/c/10452edd175fcc4fd0f5ac782ed2a002e3e5d65c
https://git.kernel.org/stable/c/84b38f48836662c4bfae646c014f4e981e16a2b2
https://git.kernel.org/stable/c/84b38f48836662c4bfae646c014f4e981e16a2b2
https://git.kernel.org/stable/c/c9d48ce163305595ae20aee27774192476d5e6a5
https://git.kernel.org/stable/c/c9d48ce163305595ae20aee27774192476d5e6a5
https://git.kernel.org/stable/c/da7c622cddd4fe36be69ca61e8c42e43cde94784
https://git.kernel.org/stable/c/da7c622cddd4fe36be69ca61e8c42e43cde94784

Weakness Enumeration

CWE-ID CWE Name Source

Change History

2 change records found show changes

Quick Info

CVE Dictionary Entry:
CVE-2024-36931
NVD Published Date:
05/30/2024
NVD Last Modified:
11/21/2024
Source:
kernel.org