{"id":"CVE-2024-36957","summary":"octeontx2-af: avoid off-by-one read from userspace","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nocteontx2-af: avoid off-by-one read from userspace\n\nWe try to access count + 1 byte from userspace with memdup_user(buffer,\ncount + 1). However, the userspace only provides buffer of count bytes and\nonly these count bytes are verified to be okay to access. To ensure the\ncopied buffer is NUL terminated, we use memdup_user_nul instead.","modified":"2026-04-02T12:16:35.420960Z","published":"2024-05-30T15:35:50.445Z","related":["ALSA-2024:4583","MGASA-2024-0263","MGASA-2024-0266","SUSE-SU-2024:2571-1","SUSE-SU-2024:2896-1","SUSE-SU-2024:2973-1","SUSE-SU-2024:3983-1","SUSE-SU-2024:3985-1","SUSE-SU-2024:4364-1","SUSE-SU-2025:20008-1","SUSE-SU-2025:20028-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/36xxx/CVE-2024-36957.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/0a0285cee11c7dcc2657bcd456e469958a5009e7"},{"type":"WEB","url":"https://git.kernel.org/stable/c/8f11fe3ea3fc261640cfc8a5addd838000407c67"},{"type":"WEB","url":"https://git.kernel.org/stable/c/bcdac70adceb44373da204c3c297f2a98e13216e"},{"type":"WEB","url":"https://git.kernel.org/stable/c/ec697fbd38cbe2eef0948b58673b146caa95402f"},{"type":"WEB","url":"https://git.kernel.org/stable/c/f299ee709fb45036454ca11e90cb2810fe771878"},{"type":"WEB","url":"https://git.kernel.org/stable/c/fc3e0076c1f82fe981d321e3a7bad4cbee542c19"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00019.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/36xxx/CVE-2024-36957.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-36957"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"dae49384d0d7695540e2d75168f323cef1384810"},{"fixed":"bcdac70adceb44373da204c3c297f2a98e13216e"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"3a2eb515d1367c0f667b76089a6e727279c688b8"},{"fixed":"ec697fbd38cbe2eef0948b58673b146caa95402f"},{"fixed":"8f11fe3ea3fc261640cfc8a5addd838000407c67"},{"fixed":"0a0285cee11c7dcc2657bcd456e469958a5009e7"},{"fixed":"fc3e0076c1f82fe981d321e3a7bad4cbee542c19"},{"fixed":"f299ee709fb45036454ca11e90cb2810fe771878"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"0"},{"last_affected":"c9a2ed3fdd037314a71e6a6ba5d99a3605f6f9c7"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-36957.json"}}],"schema_version":"1.7.5"}