跳转到帖子

Debian: CVE-2024-38559: linux -- security update

recommended_posts

发布于
  • Members

Debian: CVE-2024-38559: linux -- security update

Severity
4
CVSS
(AV:L/AC:M/Au:N/C:P/I:P/A:P)
Published
06/19/2024
Created
06/28/2024
Added
06/27/2024
Modified
06/27/2024

Description

In the Linux kernel, the following vulnerability has been resolved: scsi: qedf: Ensure the copied buf is NUL terminated Currently, we allocate a count-sized kernel buffer and copy count from userspace to that buffer. Later, we use kstrtouint on this buffer but we don't ensure that the string is terminated inside the buffer, this can lead to OOB read when using kstrtouint. Fix this issue by using memdup_user_nul instead of memdup_user.

Solution(s)

  • debian-upgrade-linux

References

  • https://attackerkb.com/topics/cve-2024-38559
  • CVE - 2024-38559
  • DLA-3840-1
  • 查看数 701
  • 已创建
  • 最后回复

参与讨论

你可立刻发布并稍后注册。 如果你有帐户,立刻登录发布帖子。

游客
回帖…