bna: ensure the copied buf is NUL terminated
Currently, we allocate a nbytes-sized kernel buffer and copy nbytes from
userspace to that buffer. Later, we use sscanf on this buffer but we don't
ensure that the string is terminated inside the buffer, this can lead to
OOB read when using sscanf. Fix this issue by using memdup_user_nul
instead of memdup_user.
Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3840-1 | linux security update |
Debian DLA |
DLA-3843-1 | linux-5.10 security update |
Debian DSA |
DSA-5703-1 | linux security update |
Ubuntu USN |
USN-6949-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6949-2 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6950-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6950-2 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6950-3 | Linux kernel (Oracle) vulnerabilities |
Ubuntu USN |
USN-6950-4 | Linux kernel (HWE) vulnerabilities |
Ubuntu USN |
USN-6951-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6951-2 | Linux kernel (Azure) vulnerabilities |
Ubuntu USN |
USN-6951-3 | Linux kernel (Azure) vulnerabilities |
Ubuntu USN |
USN-6951-4 | Linux kernel (BlueField) vulnerabilities |
Ubuntu USN |
USN-6952-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6953-1 | Linux kernel (Oracle) vulnerabilities |
Ubuntu USN |
USN-6955-1 | Linux kernel (OEM) vulnerabilities |
Ubuntu USN |
USN-6956-1 | Linux kernel (Azure) vulnerabilities |
Ubuntu USN |
USN-6957-1 | Linux kernel (Oracle) vulnerabilities |
Ubuntu USN |
USN-6979-1 | Linux kernel (Raspberry Pi) vulnerabilities |
Ubuntu USN |
USN-7019-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-7496-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-7496-2 | Linux kernel (FIPS) vulnerabilities |
Ubuntu USN |
USN-7496-3 | Linux kernel (Azure) vulnerabilities |
Ubuntu USN |
USN-7496-4 | Linux kernel (Azure) vulnerabilities |
Ubuntu USN |
USN-7496-5 | Linux kernel (Azure FIPS) vulnerabilities |
Ubuntu USN |
USN-7506-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-7506-2 | Linux kernel (AWS) vulnerabilities |
Ubuntu USN |
USN-7506-3 | Linux kernel (FIPS) vulnerabilities |
Ubuntu USN |
USN-7506-4 | Linux kernel (Xenial HWE) vulnerabilities |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Sat, 12 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Fri, 11 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Fri, 22 Nov 2024 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Wed, 06 Nov 2024 08:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
|
| Metrics |
ssvc
|
Thu, 12 Sep 2024 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Wed, 11 Sep 2024 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 11 Sep 2024 13:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Linux
Published:
Updated: 2025-05-04T09:12:22.995Z
Reserved: 2024-05-30T15:25:07.071Z
Link: CVE-2024-36934
Updated: 2024-09-12T16:03:00.779Z
Status : Awaiting Analysis
Published: 2024-05-30T16:15:16.553
Modified: 2024-11-21T09:22:51.217
Link: CVE-2024-36934
OpenCVE Enrichment
Updated: 2025-07-12T22:15:38Z
Debian DLA
Debian DSA
Ubuntu USN