CVE-2024-36931

Source
https://cve.org/CVERecord?id=CVE-2024-36931
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-36931.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-36931
Downstream
Related
Published
2024-05-30T15:29:22.601Z
Modified
2026-03-14T12:34:16.295390Z
Summary
s390/cio: Ensure the copied buf is NUL terminated
Details

In the Linux kernel, the following vulnerability has been resolved:

s390/cio: Ensure the copied buf is NUL terminated

Currently, we allocate a lbuf-sized kernel buffer and copy lbuf from userspace to that buffer. Later, we use scanf on this buffer but we don't ensure that the string is terminated inside the buffer, this can lead to OOB read when using scanf. Fix this issue by using memdupusernul instead.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/36xxx/CVE-2024-36931.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
a4f17cc726712a52122ad38540bc3ff3a052d1a4
Fixed
c9d48ce163305595ae20aee27774192476d5e6a5
Fixed
10452edd175fcc4fd0f5ac782ed2a002e3e5d65c
Fixed
84b38f48836662c4bfae646c014f4e981e16a2b2
Fixed
06759ebaf75c19c87b2453a5e130e9e61e9b5d65
Fixed
da7c622cddd4fe36be69ca61e8c42e43cde94784

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-36931.json"