CVE-2024-38559
Qedf_NULL_Termination_Buffer_Targeted_Array_Write
Description
In the Linux kernel, the following vulnerability has been resolved: scsi: qedf: Ensure the copied buf is NUL terminated Currently, we allocate a count-sized kernel buffer and copy count from userspace to that buffer. Later, we use kstrtouint on this buffer but we don't ensure that the string is terminated inside the buffer, this can lead to OOB read when using kstrtouint. Fix this issue by using memdup_user_nul instead of memdup_user.
INFO
Published Date :
June 19, 2024, 2:15 p.m.
Last Modified :
April 1, 2025, 6:22 p.m.
Source :
416baaa9-dc9f-4396-8d5f-8c081fb06d67
Remotely Exploitable :
No
Impact Score :
3.6
Exploitability Score :
0.8
References to Advisories, Solutions, and Tools
Here, you will find a curated list of external links that provide in-depth
information, practical solutions, and valuable tools related to
CVE-2024-38559
.
We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).
Results are limited to the first 15 repositories due to potential performance issues.
The following list is the news that have been mention
CVE-2024-38559
vulnerability anywhere in the article.
The following table lists the changes that have been made to the
CVE-2024-38559
vulnerability over time.
Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.
-
Initial Analysis by [email protected]
Apr. 01, 2025
Action Type Old Value New Value Added CPE Configuration OR *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 6.9 up to (excluding) 6.9.3 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 6.7 up to (excluding) 6.8.12 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 6.2 up to (excluding) 6.6.33 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.16 up to (excluding) 6.1.93 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.11 up to (excluding) 5.15.161 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.5 up to (excluding) 5.10.219 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 4.11 up to (excluding) 4.19.316 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 4.20 up to (excluding) 5.4.278 Added Reference Type kernel.org: https://git.kernel.org/stable/c/177f43c6892e6055de6541fe9391a8a3d1f95fc9 Types: Patch Added Reference Type CVE: https://git.kernel.org/stable/c/177f43c6892e6055de6541fe9391a8a3d1f95fc9 Types: Patch Added Reference Type kernel.org: https://git.kernel.org/stable/c/1f84a2744ad813be23fc4be99fb74bfb24aadb95 Types: Patch Added Reference Type CVE: https://git.kernel.org/stable/c/1f84a2744ad813be23fc4be99fb74bfb24aadb95 Types: Patch Added Reference Type kernel.org: https://git.kernel.org/stable/c/4907f5ad246fa9b51093ed7dfc7da9ebbd3f20b8 Types: Patch Added Reference Type CVE: https://git.kernel.org/stable/c/4907f5ad246fa9b51093ed7dfc7da9ebbd3f20b8 Types: Patch Added Reference Type kernel.org: https://git.kernel.org/stable/c/563e609275927c0b75fbfd0d90441543aa7b5e0d Types: Patch Added Reference Type CVE: https://git.kernel.org/stable/c/563e609275927c0b75fbfd0d90441543aa7b5e0d Types: Patch Added Reference Type kernel.org: https://git.kernel.org/stable/c/769b9fd2af02c069451fe9108dba73355d9a021c Types: Patch Added Reference Type CVE: https://git.kernel.org/stable/c/769b9fd2af02c069451fe9108dba73355d9a021c Types: Patch Added Reference Type kernel.org: https://git.kernel.org/stable/c/a75001678e1d38aa607d5b898ec7ff8ed0700d59 Types: Patch Added Reference Type CVE: https://git.kernel.org/stable/c/a75001678e1d38aa607d5b898ec7ff8ed0700d59 Types: Patch Added Reference Type kernel.org: https://git.kernel.org/stable/c/d0184a375ee797eb657d74861ba0935b6e405c62 Types: Patch Added Reference Type CVE: https://git.kernel.org/stable/c/d0184a375ee797eb657d74861ba0935b6e405c62 Types: Patch Added Reference Type kernel.org: https://git.kernel.org/stable/c/d93318f19d1e1a6d5f04f5d965eaa9055bb7c613 Types: Patch Added Reference Type CVE: https://git.kernel.org/stable/c/d93318f19d1e1a6d5f04f5d965eaa9055bb7c613 Types: Patch Added Reference Type kernel.org: https://git.kernel.org/stable/c/dccd97b39ab2f2b1b9a47a1394647a4d65815255 Types: Patch Added Reference Type CVE: https://git.kernel.org/stable/c/dccd97b39ab2f2b1b9a47a1394647a4d65815255 Types: Patch -
CVE Modified by af854a3a-2127-422b-91ae-364da2661108
Nov. 21, 2024
Action Type Old Value New Value Added Reference https://git.kernel.org/stable/c/177f43c6892e6055de6541fe9391a8a3d1f95fc9 Added Reference https://git.kernel.org/stable/c/1f84a2744ad813be23fc4be99fb74bfb24aadb95 Added Reference https://git.kernel.org/stable/c/4907f5ad246fa9b51093ed7dfc7da9ebbd3f20b8 Added Reference https://git.kernel.org/stable/c/563e609275927c0b75fbfd0d90441543aa7b5e0d Added Reference https://git.kernel.org/stable/c/769b9fd2af02c069451fe9108dba73355d9a021c Added Reference https://git.kernel.org/stable/c/a75001678e1d38aa607d5b898ec7ff8ed0700d59 Added Reference https://git.kernel.org/stable/c/d0184a375ee797eb657d74861ba0935b6e405c62 Added Reference https://git.kernel.org/stable/c/d93318f19d1e1a6d5f04f5d965eaa9055bb7c613 Added Reference https://git.kernel.org/stable/c/dccd97b39ab2f2b1b9a47a1394647a4d65815255 -
CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0
Nov. 01, 2024
Action Type Old Value New Value Added CWE CISA-ADP CWE-476 Added CVSS V3.1 CISA-ADP AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H -
CVE Modified by 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Jul. 15, 2024
Action Type Old Value New Value Removed Reference kernel.org https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html -
CVE Modified by 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Jun. 27, 2024
Action Type Old Value New Value Added Reference kernel.org https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html [No types assigned] -
CVE Received by 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Jun. 19, 2024
Action Type Old Value New Value Added Description In the Linux kernel, the following vulnerability has been resolved: scsi: qedf: Ensure the copied buf is NUL terminated Currently, we allocate a count-sized kernel buffer and copy count from userspace to that buffer. Later, we use kstrtouint on this buffer but we don't ensure that the string is terminated inside the buffer, this can lead to OOB read when using kstrtouint. Fix this issue by using memdup_user_nul instead of memdup_user. Added Reference kernel.org https://git.kernel.org/stable/c/1f84a2744ad813be23fc4be99fb74bfb24aadb95 [No types assigned] Added Reference kernel.org https://git.kernel.org/stable/c/a75001678e1d38aa607d5b898ec7ff8ed0700d59 [No types assigned] Added Reference kernel.org https://git.kernel.org/stable/c/769b9fd2af02c069451fe9108dba73355d9a021c [No types assigned] Added Reference kernel.org https://git.kernel.org/stable/c/dccd97b39ab2f2b1b9a47a1394647a4d65815255 [No types assigned] Added Reference kernel.org https://git.kernel.org/stable/c/d93318f19d1e1a6d5f04f5d965eaa9055bb7c613 [No types assigned] Added Reference kernel.org https://git.kernel.org/stable/c/563e609275927c0b75fbfd0d90441543aa7b5e0d [No types assigned] Added Reference kernel.org https://git.kernel.org/stable/c/4907f5ad246fa9b51093ed7dfc7da9ebbd3f20b8 [No types assigned] Added Reference kernel.org https://git.kernel.org/stable/c/177f43c6892e6055de6541fe9391a8a3d1f95fc9 [No types assigned] Added Reference kernel.org https://git.kernel.org/stable/c/d0184a375ee797eb657d74861ba0935b6e405c62 [No types assigned]
CWE - Common Weakness Enumeration
While CVE identifies
specific instances of vulnerabilities, CWE categorizes the common flaws or
weaknesses that can lead to vulnerabilities. CVE-2024-38559
is
associated with the following CWEs:
Common Attack Pattern Enumeration and Classification (CAPEC)
Common Attack Pattern Enumeration and Classification
(CAPEC)
stores attack patterns, which are descriptions of the common attributes and
approaches employed by adversaries to exploit the CVE-2024-38559
weaknesses.