CVE-2024-38577

In the Linux kernel, the following vulnerability has been resolved: rcu-tasks: Fix show_rcu_tasks_trace_gp_kthread buffer overflow There is a possibility of buffer overflow in show_rcu_tasks_trace_gp_kthread() if counters, passed to sprintf() are huge. Counter numbers, needed for this are unrealistically high, but buffer overflow is still possible. Use snprintf() with buffer size instead of sprintf(). Found by Linux Verification Center (linuxtesting.org) with SVACE.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

21 Nov 2024, 09:26

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/08186d0c5fb64a1cc4b43e009314ee6b173ed222 - Patch () https://git.kernel.org/stable/c/08186d0c5fb64a1cc4b43e009314ee6b173ed222 - Patch
References () https://git.kernel.org/stable/c/1a240e138071b25944ded0f5b3e357aa99fabcb7 - Patch () https://git.kernel.org/stable/c/1a240e138071b25944ded0f5b3e357aa99fabcb7 - Patch
References () https://git.kernel.org/stable/c/32d988f48ed287e676a29a15ac30701c35849aec - Patch () https://git.kernel.org/stable/c/32d988f48ed287e676a29a15ac30701c35849aec - Patch
References () https://git.kernel.org/stable/c/6593d857ce5b5b802fb73d8091ac9c84b92c1697 - Patch () https://git.kernel.org/stable/c/6593d857ce5b5b802fb73d8091ac9c84b92c1697 - Patch
References () https://git.kernel.org/stable/c/cc5645fddb0ce28492b15520306d092730dffa48 - Patch () https://git.kernel.org/stable/c/cc5645fddb0ce28492b15520306d092730dffa48 - Patch

12 Sep 2024, 12:15

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/17c43211d45f13d1badea3942b76bf16bcc49281 -
  • () https://git.kernel.org/stable/c/af7b560c88fb420099e29890aa682b8a3efc8784 -

01 Aug 2024, 20:13

Type Values Removed Values Added
First Time Linux
Linux linux Kernel
CWE CWE-120
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
References () https://git.kernel.org/stable/c/08186d0c5fb64a1cc4b43e009314ee6b173ed222 - () https://git.kernel.org/stable/c/08186d0c5fb64a1cc4b43e009314ee6b173ed222 - Patch
References () https://git.kernel.org/stable/c/1a240e138071b25944ded0f5b3e357aa99fabcb7 - () https://git.kernel.org/stable/c/1a240e138071b25944ded0f5b3e357aa99fabcb7 - Patch
References () https://git.kernel.org/stable/c/32d988f48ed287e676a29a15ac30701c35849aec - () https://git.kernel.org/stable/c/32d988f48ed287e676a29a15ac30701c35849aec - Patch
References () https://git.kernel.org/stable/c/6593d857ce5b5b802fb73d8091ac9c84b92c1697 - () https://git.kernel.org/stable/c/6593d857ce5b5b802fb73d8091ac9c84b92c1697 - Patch
References () https://git.kernel.org/stable/c/cc5645fddb0ce28492b15520306d092730dffa48 - () https://git.kernel.org/stable/c/cc5645fddb0ce28492b15520306d092730dffa48 - Patch
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

20 Jun 2024, 12:44

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: rcu-tasks: Corrige show_rcu_tasks_trace_gp_kthread desbordamiento del búfer. Existe la posibilidad de que se produzca un desbordamiento del búfer en show_rcu_tasks_trace_gp_kthread() si los contadores pasados a sprintf() son enormes. Los números de contador necesarios para esto son excesivamente altos, pero aún es posible un desbordamiento del búfer. Utilice snprintf() con tamaño de búfer en lugar de sprintf(). Encontrado por el Centro de verificación de Linux (linuxtesting.org) con SVACE.

19 Jun 2024, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-06-19 14:15

Updated : 2024-11-21 09:26


NVD link : CVE-2024-38577

Mitre link : CVE-2024-38577

CVE.ORG link : CVE-2024-38577


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')