### [CVE-2024-36957](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36957) ![](https://img.shields.io/static/v1?label=Product&message=Linux&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=3a2eb515d1367c0f667b76089a6e727279c688b8%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=5.12%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=c9a2ed3fdd037314a71e6a6ba5d99a3605f6f9c7%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=dae49384d0d7695540e2d75168f323cef1384810%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=blue) ### Description In the Linux kernel, the following vulnerability has been resolved:octeontx2-af: avoid off-by-one read from userspaceWe try to access count + 1 byte from userspace with memdup_user(buffer,count + 1). However, the userspace only provides buffer of count bytes andonly these count bytes are verified to be okay to access. To ensure thecopied buffer is NUL terminated, we use memdup_user_nul instead. ### POC #### Reference No PoCs from references. #### Github - https://github.com/fkie-cad/nvd-json-data-feeds