In the Linux kernel, the following vulnerability has been resolved:
EDAC/thunderx: Fix possible out-of-bounds string access
Enabling -Wstringop-overflow globally exposes a warning for a common bug
in the usage of strncat():
drivers/edac/thunderx_edac.c: In function 'thunderx_ocx_com_threaded_isr':
drivers/edac/thunderx_edac.c:1136:17: error: 'strncat' specified bound 1024 equals destination size [-Werror=stringop-overflow=]
1136 | strncat(msg, other, OCX_MESSAGE_SIZE);
| ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
...
1145 | strncat(msg, other, OCX_MESSAGE_SIZE);
...
1150 | strncat(msg, other, OCX_MESSAGE_SIZE);
...
Apparently the author of this driver expected strncat() to behave the
way that strlcat() does, which uses the size of the destination buffer
as its third argument rather than the length of the source buffer. The
result is that there is no check on the size of the allocated buffer.
Change it to strlcat().
[ bp: Trim compiler output, fixup commit message. ]
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 08:39
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
References | () https://git.kernel.org/stable/c/426fae93c01dffa379225eb2bd4d3cdc42c6eec5 - Patch | |
References | () https://git.kernel.org/stable/c/475c58e1a471e9b873e3e39958c64a2d278275c8 - Patch | |
References | () https://git.kernel.org/stable/c/5da3b6e7196f0b4f3728e4e25eb20233a9ddfaf6 - Patch | |
References | () https://git.kernel.org/stable/c/6aa7865ba7ff7f0ede0035180fb3b9400ceb405a - Patch | |
References | () https://git.kernel.org/stable/c/700cf4bead80fac994dcc43ae1ca5d86d8959b21 - Patch | |
References | () https://git.kernel.org/stable/c/71c17ee02538802ceafc830f0736aa35b564e601 - Patch | |
References | () https://git.kernel.org/stable/c/9dbac9fdae6e3b411fc4c3fca3bf48f70609c398 - Patch | |
References | () https://git.kernel.org/stable/c/e1c86511241588efffaa49556196f09a498d5057 - Patch |
04 Nov 2024, 13:16
Type | Values Removed | Values Added |
---|---|---|
References |
|
27 Jun 2024, 13:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
25 Jun 2024, 21:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
17 Apr 2024, 20:03
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
References | () https://git.kernel.org/stable/c/426fae93c01dffa379225eb2bd4d3cdc42c6eec5 - Patch | |
References | () https://git.kernel.org/stable/c/475c58e1a471e9b873e3e39958c64a2d278275c8 - Patch | |
References | () https://git.kernel.org/stable/c/5da3b6e7196f0b4f3728e4e25eb20233a9ddfaf6 - Patch | |
References | () https://git.kernel.org/stable/c/6aa7865ba7ff7f0ede0035180fb3b9400ceb405a - Patch | |
References | () https://git.kernel.org/stable/c/700cf4bead80fac994dcc43ae1ca5d86d8959b21 - Patch | |
References | () https://git.kernel.org/stable/c/71c17ee02538802ceafc830f0736aa35b564e601 - Patch | |
References | () https://git.kernel.org/stable/c/9dbac9fdae6e3b411fc4c3fca3bf48f70609c398 - Patch | |
References | () https://git.kernel.org/stable/c/e1c86511241588efffaa49556196f09a498d5057 - Patch | |
CWE | CWE-119 | |
First Time |
Linux linux Kernel
Linux |
23 Feb 2024, 16:14
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-02-23 15:15
Updated : 2024-11-21 08:39
NVD link : CVE-2023-52464
Mitre link : CVE-2023-52464
CVE.ORG link : CVE-2023-52464
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer