In the Linux kernel, the following vulnerability has been resolved:
scsi: bfa: Ensure the copied buf is NUL terminated
Currently, we allocate a nbytes-sized kernel buffer and copy nbytes from userspace to that buffer. Later, we use sscanf on this buffer but we don't ensure that the string is terminated inside the buffer, this can lead to OOB read when using sscanf. Fix this issue by using memdupusernul instead of memdup_user.
[
{
"deprecated": false,
"signature_type": "Line",
"signature_version": "v1",
"target": {
"file": "drivers/scsi/bfa/bfad_debugfs.c"
},
"digest": {
"line_hashes": [
"216051564294852705009377660343841460441",
"121716116024212798632497093570799060000",
"312032348103551030656628048595253244142",
"325728342768876301477897107381263426685",
"212507433920592584933044324191636487456",
"121716116024212798632497093570799060000",
"312032348103551030656628048595253244142",
"210134564651157930101593632011472815906"
],
"threshold": 0.9
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@7510fab46b1cbd1680e2a096e779aec3334b4143",
"id": "CVE-2024-38560-3f00f728"
},
{
"deprecated": false,
"signature_type": "Line",
"signature_version": "v1",
"target": {
"file": "drivers/scsi/bfa/bfad_debugfs.c"
},
"digest": {
"line_hashes": [
"216051564294852705009377660343841460441",
"121716116024212798632497093570799060000",
"312032348103551030656628048595253244142",
"325728342768876301477897107381263426685",
"212507433920592584933044324191636487456",
"121716116024212798632497093570799060000",
"312032348103551030656628048595253244142",
"210134564651157930101593632011472815906"
],
"threshold": 0.9
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@ecb76200f5557a2886888aaa53702da1ab9e6cdf",
"id": "CVE-2024-38560-4afd65ec"
},
{
"deprecated": false,
"signature_type": "Line",
"signature_version": "v1",
"target": {
"file": "drivers/scsi/bfa/bfad_debugfs.c"
},
"digest": {
"line_hashes": [
"216051564294852705009377660343841460441",
"121716116024212798632497093570799060000",
"312032348103551030656628048595253244142",
"325728342768876301477897107381263426685",
"212507433920592584933044324191636487456",
"121716116024212798632497093570799060000",
"312032348103551030656628048595253244142",
"210134564651157930101593632011472815906"
],
"threshold": 0.9
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@204714e68015d6946279719fd464ecaf57240f35",
"id": "CVE-2024-38560-5419f6de"
},
{
"deprecated": false,
"signature_type": "Line",
"signature_version": "v1",
"target": {
"file": "drivers/scsi/bfa/bfad_debugfs.c"
},
"digest": {
"line_hashes": [
"216051564294852705009377660343841460441",
"121716116024212798632497093570799060000",
"312032348103551030656628048595253244142",
"325728342768876301477897107381263426685",
"212507433920592584933044324191636487456",
"121716116024212798632497093570799060000",
"312032348103551030656628048595253244142",
"210134564651157930101593632011472815906"
],
"threshold": 0.9
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@13d0cecb4626fae67c00c84d3c7851f6b62f7df3",
"id": "CVE-2024-38560-545d3ac9"
},
{
"deprecated": false,
"signature_type": "Line",
"signature_version": "v1",
"target": {
"file": "drivers/scsi/bfa/bfad_debugfs.c"
},
"digest": {
"line_hashes": [
"216051564294852705009377660343841460441",
"121716116024212798632497093570799060000",
"312032348103551030656628048595253244142",
"325728342768876301477897107381263426685",
"212507433920592584933044324191636487456",
"121716116024212798632497093570799060000",
"312032348103551030656628048595253244142",
"210134564651157930101593632011472815906"
],
"threshold": 0.9
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@00b425ff0891283207d7bad607a2412225274d7a",
"id": "CVE-2024-38560-c9cb5fca"
},
{
"deprecated": false,
"signature_type": "Line",
"signature_version": "v1",
"target": {
"file": "drivers/scsi/bfa/bfad_debugfs.c"
},
"digest": {
"line_hashes": [
"216051564294852705009377660343841460441",
"121716116024212798632497093570799060000",
"312032348103551030656628048595253244142",
"325728342768876301477897107381263426685",
"212507433920592584933044324191636487456",
"121716116024212798632497093570799060000",
"312032348103551030656628048595253244142",
"210134564651157930101593632011472815906"
],
"threshold": 0.9
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@1708e3cf2488788cba5489e4f913d227de757baf",
"id": "CVE-2024-38560-dfea92e2"
},
{
"deprecated": false,
"signature_type": "Line",
"signature_version": "v1",
"target": {
"file": "drivers/scsi/bfa/bfad_debugfs.c"
},
"digest": {
"line_hashes": [
"216051564294852705009377660343841460441",
"121716116024212798632497093570799060000",
"312032348103551030656628048595253244142",
"325728342768876301477897107381263426685",
"212507433920592584933044324191636487456",
"121716116024212798632497093570799060000",
"312032348103551030656628048595253244142",
"210134564651157930101593632011472815906"
],
"threshold": 0.9
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@7d3e694c4fe30f3aba9cd5ae86fb947a54c3db5c",
"id": "CVE-2024-38560-f25f6168"
}
]