In the Linux kernel, the following vulnerability has been resolved: octeontx2-af: avoid off-by-one read from userspace We try to access count + 1 byte from userspace with memdup_user(buffer, count + 1). However, the userspace only provides buffer of count bytes and only these count bytes are verified to be okay to access. To ensure the copied buffer is NUL terminated, we use memdup_user_nul instead.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published: 2024-05-30T15:35:50.445Z

Updated: 2024-08-02T03:43:50.509Z

Reserved: 2024-05-30T15:25:07.080Z

Link: CVE-2024-36957

cve-icon Vulnrichment

Updated: 2024-06-05T18:14:42.811Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-05-30T16:15:18.570

Modified: 2024-06-27T14:15:15.300

Link: CVE-2024-36957

cve-icon Redhat

Severity : Low

Publid Date: 2024-05-30T00:00:00Z

Links: CVE-2024-36957 - Bugzilla