CVE-2024-50259
Published: November 12, 2024Last modified: November 12, 2024
Description
In the Linux kernel, the following vulnerability has been resolved: netdevsim: Add trailing zero to terminate the string in nsim_nexthop_bucket_activity_write() This was found by a static analyzer. We should not forget the trailing zero after copy_from_user() if we will further do some string operations, sscanf() in this case. Adding a trailing zero will ensure that the function performs properly.
Severity score breakdown
| Parameter | Value | 
|---|---|
| Base score | 5.5 | 
| Attack Vector | LOCAL | 
| Attack complexity | LOW | 
| Privileges required | LOW | 
| User interaction | NONE | 
| Scope | UNCHANGED | 
| Confidentiality | NONE | 
| Integrity impact | NONE | 
| Availability impact | HIGH | 
| Vector | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H | 
Status
| Product | Release | Package | Status | 
|---|---|---|---|
| Alpaquita Linux | 23 LTS | linux-lts | Fixed (6.1.116-r0) | 
| 25 LTS | linux-lts | Fixed (6.12.41-r0) | |
| Stream | linux-lts | Fixed (6.12.41-r0) | 
References
- https://git.kernel.org/stable/c/27bd7a742e171362c9eb52ad5d1d71d3321f949f
 - https://git.kernel.org/stable/c/4ce1f56a1eaced2523329bef800d004e30f2f76c
 - https://git.kernel.org/stable/c/6a604877160fe5ab2e1985d5ce1ba6a61abe0693
 - https://git.kernel.org/stable/c/bcba86e03b3aac361ea671672cf48eed11f9011c
 - https://git.kernel.org/stable/c/c2150f666c6fc301d5d1643ed0f92251f1a0ff0d