Vulnerability Details : CVE-2024-36935
In the Linux kernel, the following vulnerability has been resolved:
ice: ensure the copied buf is NUL terminated
Currently, we allocate a count-sized kernel buffer and copy count bytes
from userspace to that buffer. Later, we use sscanf on this buffer but we
don't ensure that the string is terminated inside the buffer, this can lead
to OOB read when using sscanf. Fix this issue by using memdup_user_nul
instead of memdup_user.
Products affected by CVE-2024-36935
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:6.9:rc3:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:6.9:rc4:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:6.9:rc5:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:6.9:rc6:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2024-36935
0.05%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 15 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2024-36935
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.1
|
HIGH | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H |
1.8
|
5.2
|
NIST | 2025-01-15 |
CWE ids for CVE-2024-36935
-
The product reads data past the end, or before the beginning, of the intended buffer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2024-36935
-
https://git.kernel.org/stable/c/5ff4de981983ed84f29b5d92b6550ec054e12a92
ice: ensure the copied buf is NUL terminated - kernel/git/stable/linux.git - Linux kernel stable treePatch
-
https://git.kernel.org/stable/c/666854ea9cad844f75a068f32812a2d78004914a
ice: ensure the copied buf is NUL terminated - kernel/git/stable/linux.git - Linux kernel stable treePatch
Jump to