-

CVE-2024-36934

In the Linux kernel, the following vulnerability has been resolved:

bna: ensure the copied buf is NUL terminated

Currently, we allocate a nbytes-sized kernel buffer and copy nbytes from
userspace to that buffer. Later, we use sscanf on this buffer but we don't
ensure that the string is terminated inside the buffer, this can lead to
OOB read when using sscanf. Fix this issue by using memdup_user_nul
instead of memdup_user.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
Product Linux
Default Statusunaffected
Version < bd502ba81cd1d515deddad7dbc6b812b14b97147
Version 7afc5dbde09104b023ce04465ba71aaba0fc4346
Status affected
Version < 80578ec10335bc15ac35fd1703c22aab34e39fdd
Version 7afc5dbde09104b023ce04465ba71aaba0fc4346
Status affected
Version < 6f0f19b79c085cc891c418b768f26f7004bd51a4
Version 7afc5dbde09104b023ce04465ba71aaba0fc4346
Status affected
Version < 0f560240b4cc25d3de527deb257cdf072c0102a9
Version 7afc5dbde09104b023ce04465ba71aaba0fc4346
Status affected
Version < 06cb37e2ba6441888f24566a997481d4197b4e32
Version 7afc5dbde09104b023ce04465ba71aaba0fc4346
Status affected
Version < e19478763154674c084defc62ae0d64d79657f91
Version 7afc5dbde09104b023ce04465ba71aaba0fc4346
Status affected
Version < 1518b2b498a0109eb6b15755169d3b6607356b35
Version 7afc5dbde09104b023ce04465ba71aaba0fc4346
Status affected
Version < 8c34096c7fdf272fd4c0c37fe411cd2e3ed0ee9f
Version 7afc5dbde09104b023ce04465ba71aaba0fc4346
Status affected
VendorLinux
Product Linux
Default Statusaffected
Version 3.3
Status affected
Version < 3.3
Version 0
Status unaffected
Version <= 4.19.*
Version 4.19.314
Status unaffected
Version <= 5.4.*
Version 5.4.276
Status unaffected
Version <= 5.10.*
Version 5.10.217
Status unaffected
Version <= 5.15.*
Version 5.15.159
Status unaffected
Version <= 6.1.*
Version 6.1.91
Status unaffected
Version <= 6.6.*
Version 6.6.31
Status unaffected
Version <= 6.8.*
Version 6.8.10
Status unaffected
Version <= *
Version 6.9
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.07% 0.226
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string