• 公告ID (KylinSec-SA-2024-3203)

摘要:

In the Linux kernel, the following vulnerability has been resolved:

ice: ensure the copied buf is NUL terminated

Currently, we allocate a count-sized kernel buffer and copy count bytes
from userspace to that buffer. Later, we use sscanf on this buffer but we
don't ensure that the string is terminated inside the buffer, this can lead
to OOB read when using sscanf. Fix this issue by using memdup_user_nul
instead of memdup_user.

安全等级: Low

公告ID: KylinSec-SA-2024-3203

发布日期: 2024年7月23日

关联CVE: CVE-2024-36935  

  • 详细介绍

1. 漏洞描述

   

In the Linux kernel, the following vulnerability has been resolved:

ice: ensure the copied buf is NUL terminated

Currently, we allocate a count-sized kernel buffer and copy count bytes
from userspace to that buffer. Later, we use sscanf on this buffer but we
don't ensure that the string is terminated inside the buffer, this can lead
to OOB read when using sscanf. Fix this issue by using memdup_user_nul
instead of memdup_user.

2. 影响范围

cve名称 产品 组件 是否受影响
CVE-2024-36935 KY3.4-5A kernel Unaffected
CVE-2024-36935 KY3.5.2 kernel Unaffected
CVE-2024-36935 V6 kernel Unaffected

3. 影响组件

    无

4. 修复版本

    无

5. 修复方法

   无

6. 下载链接

    无
上一篇:KylinSec-SA-2024-3202 下一篇:KylinSec-SA-2024-3204