{"dataType":"CVE_RECORD","cveMetadata":{"cveId":"CVE-2024-36957","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2024-05-30T15:25:07.080Z","datePublished":"2024-05-30T15:35:50.445Z","dateUpdated":"2026-05-11T20:17:46.573Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2026-05-11T20:17:46.573Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nocteontx2-af: avoid off-by-one read from userspace\n\nWe try to access count + 1 byte from userspace with memdup_user(buffer,\ncount + 1). However, the userspace only provides buffer of count bytes and\nonly these count bytes are verified to be okay to access. To ensure the\ncopied buffer is NUL terminated, we use memdup_user_nul instead."}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/net/ethernet/marvell/octeontx2/af/rvu_debugfs.c"],"versions":[{"version":"dae49384d0d7695540e2d75168f323cef1384810","lessThan":"bcdac70adceb44373da204c3c297f2a98e13216e","status":"affected","versionType":"git"},{"version":"3a2eb515d1367c0f667b76089a6e727279c688b8","lessThan":"ec697fbd38cbe2eef0948b58673b146caa95402f","status":"affected","versionType":"git"},{"version":"3a2eb515d1367c0f667b76089a6e727279c688b8","lessThan":"8f11fe3ea3fc261640cfc8a5addd838000407c67","status":"affected","versionType":"git"},{"version":"3a2eb515d1367c0f667b76089a6e727279c688b8","lessThan":"0a0285cee11c7dcc2657bcd456e469958a5009e7","status":"affected","versionType":"git"},{"version":"3a2eb515d1367c0f667b76089a6e727279c688b8","lessThan":"fc3e0076c1f82fe981d321e3a7bad4cbee542c19","status":"affected","versionType":"git"},{"version":"3a2eb515d1367c0f667b76089a6e727279c688b8","lessThan":"f299ee709fb45036454ca11e90cb2810fe771878","status":"affected","versionType":"git"},{"version":"c9a2ed3fdd037314a71e6a6ba5d99a3605f6f9c7","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/net/ethernet/marvell/octeontx2/af/rvu_debugfs.c"],"versions":[{"version":"5.12","status":"affected"},{"version":"0","lessThan":"5.12","status":"unaffected","versionType":"semver"},{"version":"5.10.217","lessThanOrEqual":"5.10.*","status":"unaffected","versionType":"semver"},{"version":"5.15.159","lessThanOrEqual":"5.15.*","status":"unaffected","versionType":"semver"},{"version":"6.1.91","lessThanOrEqual":"6.1.*","status":"unaffected","versionType":"semver"},{"version":"6.6.31","lessThanOrEqual":"6.6.*","status":"unaffected","versionType":"semver"},{"version":"6.8.10","lessThanOrEqual":"6.8.*","status":"unaffected","versionType":"semver"},{"version":"6.9","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.10.20","versionEndExcluding":"5.10.217"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.12","versionEndExcluding":"5.15.159"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.12","versionEndExcluding":"6.1.91"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.12","versionEndExcluding":"6.6.31"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.12","versionEndExcluding":"6.8.10"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.12","versionEndExcluding":"6.9"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.11.3"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/bcdac70adceb44373da204c3c297f2a98e13216e"},{"url":"https://git.kernel.org/stable/c/ec697fbd38cbe2eef0948b58673b146caa95402f"},{"url":"https://git.kernel.org/stable/c/8f11fe3ea3fc261640cfc8a5addd838000407c67"},{"url":"https://git.kernel.org/stable/c/0a0285cee11c7dcc2657bcd456e469958a5009e7"},{"url":"https://git.kernel.org/stable/c/fc3e0076c1f82fe981d321e3a7bad4cbee542c19"},{"url":"https://git.kernel.org/stable/c/f299ee709fb45036454ca11e90cb2810fe771878"}],"title":"octeontx2-af: avoid off-by-one read from userspace","x_generator":{"engine":"bippy-1.2.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-06-05T18:14:35.481589Z","id":"CVE-2024-36957","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-06-05T18:14:45.699Z"}},{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T03:43:50.509Z"},"title":"CVE Program Container","references":[{"url":"https://git.kernel.org/stable/c/bcdac70adceb44373da204c3c297f2a98e13216e","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/ec697fbd38cbe2eef0948b58673b146caa95402f","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/8f11fe3ea3fc261640cfc8a5addd838000407c67","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/0a0285cee11c7dcc2657bcd456e469958a5009e7","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/fc3e0076c1f82fe981d321e3a7bad4cbee542c19","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/f299ee709fb45036454ca11e90cb2810fe771878","tags":["x_transferred"]},{"url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00019.html","tags":["x_transferred"]}]}]},"dataVersion":"5.2"}