4.4
MEDIUM
CVE-2024-38559
Qedf_NULL_Termination_Buffer_Targeted_Array_Write
Description

In the Linux kernel, the following vulnerability has been resolved: scsi: qedf: Ensure the copied buf is NUL terminated Currently, we allocate a count-sized kernel buffer and copy count from userspace to that buffer. Later, we use kstrtouint on this buffer but we don't ensure that the string is terminated inside the buffer, this can lead to OOB read when using kstrtouint. Fix this issue by using memdup_user_nul instead of memdup_user.

INFO

Published Date :

June 19, 2024, 2:15 p.m.

Last Modified :

April 1, 2025, 6:22 p.m.

Source :

416baaa9-dc9f-4396-8d5f-8c081fb06d67

Remotely Exploitable :

No

Impact Score :

3.6

Exploitability Score :

0.8
Affected Products

The following products are affected by CVE-2024-38559 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Linux linux_kernel
References to Advisories, Solutions, and Tools

Here, you will find a curated list of external links that provide in-depth information, practical solutions, and valuable tools related to CVE-2024-38559.

URL Resource
https://git.kernel.org/stable/c/177f43c6892e6055de6541fe9391a8a3d1f95fc9 Patch
https://git.kernel.org/stable/c/1f84a2744ad813be23fc4be99fb74bfb24aadb95 Patch
https://git.kernel.org/stable/c/4907f5ad246fa9b51093ed7dfc7da9ebbd3f20b8 Patch
https://git.kernel.org/stable/c/563e609275927c0b75fbfd0d90441543aa7b5e0d Patch
https://git.kernel.org/stable/c/769b9fd2af02c069451fe9108dba73355d9a021c Patch
https://git.kernel.org/stable/c/a75001678e1d38aa607d5b898ec7ff8ed0700d59 Patch
https://git.kernel.org/stable/c/d0184a375ee797eb657d74861ba0935b6e405c62 Patch
https://git.kernel.org/stable/c/d93318f19d1e1a6d5f04f5d965eaa9055bb7c613 Patch
https://git.kernel.org/stable/c/dccd97b39ab2f2b1b9a47a1394647a4d65815255 Patch
https://git.kernel.org/stable/c/177f43c6892e6055de6541fe9391a8a3d1f95fc9 Patch
https://git.kernel.org/stable/c/1f84a2744ad813be23fc4be99fb74bfb24aadb95 Patch
https://git.kernel.org/stable/c/4907f5ad246fa9b51093ed7dfc7da9ebbd3f20b8 Patch
https://git.kernel.org/stable/c/563e609275927c0b75fbfd0d90441543aa7b5e0d Patch
https://git.kernel.org/stable/c/769b9fd2af02c069451fe9108dba73355d9a021c Patch
https://git.kernel.org/stable/c/a75001678e1d38aa607d5b898ec7ff8ed0700d59 Patch
https://git.kernel.org/stable/c/d0184a375ee797eb657d74861ba0935b6e405c62 Patch
https://git.kernel.org/stable/c/d93318f19d1e1a6d5f04f5d965eaa9055bb7c613 Patch
https://git.kernel.org/stable/c/dccd97b39ab2f2b1b9a47a1394647a4d65815255 Patch

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2024-38559 vulnerability anywhere in the article.

The following table lists the changes that have been made to the CVE-2024-38559 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • Initial Analysis by [email protected]

    Apr. 01, 2025

    Action Type Old Value New Value
    Added CPE Configuration OR *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 6.9 up to (excluding) 6.9.3 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 6.7 up to (excluding) 6.8.12 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 6.2 up to (excluding) 6.6.33 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.16 up to (excluding) 6.1.93 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.11 up to (excluding) 5.15.161 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.5 up to (excluding) 5.10.219 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 4.11 up to (excluding) 4.19.316 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 4.20 up to (excluding) 5.4.278
    Added Reference Type kernel.org: https://git.kernel.org/stable/c/177f43c6892e6055de6541fe9391a8a3d1f95fc9 Types: Patch
    Added Reference Type CVE: https://git.kernel.org/stable/c/177f43c6892e6055de6541fe9391a8a3d1f95fc9 Types: Patch
    Added Reference Type kernel.org: https://git.kernel.org/stable/c/1f84a2744ad813be23fc4be99fb74bfb24aadb95 Types: Patch
    Added Reference Type CVE: https://git.kernel.org/stable/c/1f84a2744ad813be23fc4be99fb74bfb24aadb95 Types: Patch
    Added Reference Type kernel.org: https://git.kernel.org/stable/c/4907f5ad246fa9b51093ed7dfc7da9ebbd3f20b8 Types: Patch
    Added Reference Type CVE: https://git.kernel.org/stable/c/4907f5ad246fa9b51093ed7dfc7da9ebbd3f20b8 Types: Patch
    Added Reference Type kernel.org: https://git.kernel.org/stable/c/563e609275927c0b75fbfd0d90441543aa7b5e0d Types: Patch
    Added Reference Type CVE: https://git.kernel.org/stable/c/563e609275927c0b75fbfd0d90441543aa7b5e0d Types: Patch
    Added Reference Type kernel.org: https://git.kernel.org/stable/c/769b9fd2af02c069451fe9108dba73355d9a021c Types: Patch
    Added Reference Type CVE: https://git.kernel.org/stable/c/769b9fd2af02c069451fe9108dba73355d9a021c Types: Patch
    Added Reference Type kernel.org: https://git.kernel.org/stable/c/a75001678e1d38aa607d5b898ec7ff8ed0700d59 Types: Patch
    Added Reference Type CVE: https://git.kernel.org/stable/c/a75001678e1d38aa607d5b898ec7ff8ed0700d59 Types: Patch
    Added Reference Type kernel.org: https://git.kernel.org/stable/c/d0184a375ee797eb657d74861ba0935b6e405c62 Types: Patch
    Added Reference Type CVE: https://git.kernel.org/stable/c/d0184a375ee797eb657d74861ba0935b6e405c62 Types: Patch
    Added Reference Type kernel.org: https://git.kernel.org/stable/c/d93318f19d1e1a6d5f04f5d965eaa9055bb7c613 Types: Patch
    Added Reference Type CVE: https://git.kernel.org/stable/c/d93318f19d1e1a6d5f04f5d965eaa9055bb7c613 Types: Patch
    Added Reference Type kernel.org: https://git.kernel.org/stable/c/dccd97b39ab2f2b1b9a47a1394647a4d65815255 Types: Patch
    Added Reference Type CVE: https://git.kernel.org/stable/c/dccd97b39ab2f2b1b9a47a1394647a4d65815255 Types: Patch
  • CVE Modified by af854a3a-2127-422b-91ae-364da2661108

    Nov. 21, 2024

    Action Type Old Value New Value
    Added Reference https://git.kernel.org/stable/c/177f43c6892e6055de6541fe9391a8a3d1f95fc9
    Added Reference https://git.kernel.org/stable/c/1f84a2744ad813be23fc4be99fb74bfb24aadb95
    Added Reference https://git.kernel.org/stable/c/4907f5ad246fa9b51093ed7dfc7da9ebbd3f20b8
    Added Reference https://git.kernel.org/stable/c/563e609275927c0b75fbfd0d90441543aa7b5e0d
    Added Reference https://git.kernel.org/stable/c/769b9fd2af02c069451fe9108dba73355d9a021c
    Added Reference https://git.kernel.org/stable/c/a75001678e1d38aa607d5b898ec7ff8ed0700d59
    Added Reference https://git.kernel.org/stable/c/d0184a375ee797eb657d74861ba0935b6e405c62
    Added Reference https://git.kernel.org/stable/c/d93318f19d1e1a6d5f04f5d965eaa9055bb7c613
    Added Reference https://git.kernel.org/stable/c/dccd97b39ab2f2b1b9a47a1394647a4d65815255
  • CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0

    Nov. 01, 2024

    Action Type Old Value New Value
    Added CWE CISA-ADP CWE-476
    Added CVSS V3.1 CISA-ADP AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  • CVE Modified by 416baaa9-dc9f-4396-8d5f-8c081fb06d67

    Jul. 15, 2024

    Action Type Old Value New Value
    Removed Reference kernel.org https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html
  • CVE Modified by 416baaa9-dc9f-4396-8d5f-8c081fb06d67

    Jun. 27, 2024

    Action Type Old Value New Value
    Added Reference kernel.org https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html [No types assigned]
  • CVE Received by 416baaa9-dc9f-4396-8d5f-8c081fb06d67

    Jun. 19, 2024

    Action Type Old Value New Value
    Added Description In the Linux kernel, the following vulnerability has been resolved: scsi: qedf: Ensure the copied buf is NUL terminated Currently, we allocate a count-sized kernel buffer and copy count from userspace to that buffer. Later, we use kstrtouint on this buffer but we don't ensure that the string is terminated inside the buffer, this can lead to OOB read when using kstrtouint. Fix this issue by using memdup_user_nul instead of memdup_user.
    Added Reference kernel.org https://git.kernel.org/stable/c/1f84a2744ad813be23fc4be99fb74bfb24aadb95 [No types assigned]
    Added Reference kernel.org https://git.kernel.org/stable/c/a75001678e1d38aa607d5b898ec7ff8ed0700d59 [No types assigned]
    Added Reference kernel.org https://git.kernel.org/stable/c/769b9fd2af02c069451fe9108dba73355d9a021c [No types assigned]
    Added Reference kernel.org https://git.kernel.org/stable/c/dccd97b39ab2f2b1b9a47a1394647a4d65815255 [No types assigned]
    Added Reference kernel.org https://git.kernel.org/stable/c/d93318f19d1e1a6d5f04f5d965eaa9055bb7c613 [No types assigned]
    Added Reference kernel.org https://git.kernel.org/stable/c/563e609275927c0b75fbfd0d90441543aa7b5e0d [No types assigned]
    Added Reference kernel.org https://git.kernel.org/stable/c/4907f5ad246fa9b51093ed7dfc7da9ebbd3f20b8 [No types assigned]
    Added Reference kernel.org https://git.kernel.org/stable/c/177f43c6892e6055de6541fe9391a8a3d1f95fc9 [No types assigned]
    Added Reference kernel.org https://git.kernel.org/stable/c/d0184a375ee797eb657d74861ba0935b6e405c62 [No types assigned]
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2024-38559 is associated with the following CWEs:

Common Attack Pattern Enumeration and Classification (CAPEC)

Common Attack Pattern Enumeration and Classification (CAPEC) stores attack patterns, which are descriptions of the common attributes and approaches employed by adversaries to exploit the CVE-2024-38559 weaknesses.

CVSS31 - Vulnerability Scoring System
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
© cvefeed.io
Latest DB Update: May. 14, 2025 1:13