CVE-2023-52464

In the Linux kernel, the following vulnerability has been resolved: EDAC/thunderx: Fix possible out-of-bounds string access Enabling -Wstringop-overflow globally exposes a warning for a common bug in the usage of strncat(): drivers/edac/thunderx_edac.c: In function 'thunderx_ocx_com_threaded_isr': drivers/edac/thunderx_edac.c:1136:17: error: 'strncat' specified bound 1024 equals destination size [-Werror=stringop-overflow=] 1136 | strncat(msg, other, OCX_MESSAGE_SIZE); | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ... 1145 | strncat(msg, other, OCX_MESSAGE_SIZE); ... 1150 | strncat(msg, other, OCX_MESSAGE_SIZE); ... Apparently the author of this driver expected strncat() to behave the way that strlcat() does, which uses the size of the destination buffer as its third argument rather than the length of the source buffer. The result is that there is no check on the size of the allocated buffer. Change it to strlcat(). [ bp: Trim compiler output, fixup commit message. ]
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

21 Nov 2024, 08:39

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html -
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html -
References () https://git.kernel.org/stable/c/426fae93c01dffa379225eb2bd4d3cdc42c6eec5 - Patch () https://git.kernel.org/stable/c/426fae93c01dffa379225eb2bd4d3cdc42c6eec5 - Patch
References () https://git.kernel.org/stable/c/475c58e1a471e9b873e3e39958c64a2d278275c8 - Patch () https://git.kernel.org/stable/c/475c58e1a471e9b873e3e39958c64a2d278275c8 - Patch
References () https://git.kernel.org/stable/c/5da3b6e7196f0b4f3728e4e25eb20233a9ddfaf6 - Patch () https://git.kernel.org/stable/c/5da3b6e7196f0b4f3728e4e25eb20233a9ddfaf6 - Patch
References () https://git.kernel.org/stable/c/6aa7865ba7ff7f0ede0035180fb3b9400ceb405a - Patch () https://git.kernel.org/stable/c/6aa7865ba7ff7f0ede0035180fb3b9400ceb405a - Patch
References () https://git.kernel.org/stable/c/700cf4bead80fac994dcc43ae1ca5d86d8959b21 - Patch () https://git.kernel.org/stable/c/700cf4bead80fac994dcc43ae1ca5d86d8959b21 - Patch
References () https://git.kernel.org/stable/c/71c17ee02538802ceafc830f0736aa35b564e601 - Patch () https://git.kernel.org/stable/c/71c17ee02538802ceafc830f0736aa35b564e601 - Patch
References () https://git.kernel.org/stable/c/9dbac9fdae6e3b411fc4c3fca3bf48f70609c398 - Patch () https://git.kernel.org/stable/c/9dbac9fdae6e3b411fc4c3fca3bf48f70609c398 - Patch
References () https://git.kernel.org/stable/c/e1c86511241588efffaa49556196f09a498d5057 - Patch () https://git.kernel.org/stable/c/e1c86511241588efffaa49556196f09a498d5057 - Patch

04 Nov 2024, 13:16

Type Values Removed Values Added
References
  • {'url': 'https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html', 'source': '416baaa9-dc9f-4396-8d5f-8c081fb06d67'}
  • {'url': 'https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html', 'source': '416baaa9-dc9f-4396-8d5f-8c081fb06d67'}

27 Jun 2024, 13:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html -

25 Jun 2024, 21:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html -

17 Apr 2024, 20:03

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/426fae93c01dffa379225eb2bd4d3cdc42c6eec5 - () https://git.kernel.org/stable/c/426fae93c01dffa379225eb2bd4d3cdc42c6eec5 - Patch
References () https://git.kernel.org/stable/c/475c58e1a471e9b873e3e39958c64a2d278275c8 - () https://git.kernel.org/stable/c/475c58e1a471e9b873e3e39958c64a2d278275c8 - Patch
References () https://git.kernel.org/stable/c/5da3b6e7196f0b4f3728e4e25eb20233a9ddfaf6 - () https://git.kernel.org/stable/c/5da3b6e7196f0b4f3728e4e25eb20233a9ddfaf6 - Patch
References () https://git.kernel.org/stable/c/6aa7865ba7ff7f0ede0035180fb3b9400ceb405a - () https://git.kernel.org/stable/c/6aa7865ba7ff7f0ede0035180fb3b9400ceb405a - Patch
References () https://git.kernel.org/stable/c/700cf4bead80fac994dcc43ae1ca5d86d8959b21 - () https://git.kernel.org/stable/c/700cf4bead80fac994dcc43ae1ca5d86d8959b21 - Patch
References () https://git.kernel.org/stable/c/71c17ee02538802ceafc830f0736aa35b564e601 - () https://git.kernel.org/stable/c/71c17ee02538802ceafc830f0736aa35b564e601 - Patch
References () https://git.kernel.org/stable/c/9dbac9fdae6e3b411fc4c3fca3bf48f70609c398 - () https://git.kernel.org/stable/c/9dbac9fdae6e3b411fc4c3fca3bf48f70609c398 - Patch
References () https://git.kernel.org/stable/c/e1c86511241588efffaa49556196f09a498d5057 - () https://git.kernel.org/stable/c/e1c86511241588efffaa49556196f09a498d5057 - Patch
CWE CWE-119
First Time Linux linux Kernel
Linux

23 Feb 2024, 16:14

Type Values Removed Values Added
New CVE

Information

Published : 2024-02-23 15:15

Updated : 2024-11-21 08:39


NVD link : CVE-2023-52464

Mitre link : CVE-2023-52464

CVE.ORG link : CVE-2023-52464


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer