CVE-2024-39480

In the Linux kernel, the following vulnerability has been resolved: kdb: Fix buffer overflow during tab-complete Currently, when the user attempts symbol completion with the Tab key, kdb will use strncpy() to insert the completed symbol into the command buffer. Unfortunately it passes the size of the source buffer rather than the destination to strncpy() with predictably horrible results. Most obviously if the command buffer is already full but cp, the cursor position, is in the middle of the buffer, then we will write past the end of the supplied buffer. Fix this by replacing the dubious strncpy() calls with memmove()/memcpy() calls plus explicit boundary checks to make sure we have enough space before we start moving characters around.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

21 Aug 2024, 08:35

Type Values Removed Values Added
CWE CWE-121

08 Jul 2024, 18:01

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/107e825cc448b7834b31e8b1b3cf0f57426d46d5 - () https://git.kernel.org/stable/c/107e825cc448b7834b31e8b1b3cf0f57426d46d5 - Mailing List, Patch
References () https://git.kernel.org/stable/c/33d9c814652b971461d1e30bead6792851c209e7 - () https://git.kernel.org/stable/c/33d9c814652b971461d1e30bead6792851c209e7 - Mailing List, Patch
References () https://git.kernel.org/stable/c/cfdc2fa4db57503bc6d3817240547c8ddc55fa96 - () https://git.kernel.org/stable/c/cfdc2fa4db57503bc6d3817240547c8ddc55fa96 - Mailing List, Patch
References () https://git.kernel.org/stable/c/ddd2972d8e2dee3b33e8121669d55def59f0be8a - () https://git.kernel.org/stable/c/ddd2972d8e2dee3b33e8121669d55def59f0be8a - Mailing List, Patch
References () https://git.kernel.org/stable/c/e9730744bf3af04cda23799029342aa3cddbc454 - () https://git.kernel.org/stable/c/e9730744bf3af04cda23799029342aa3cddbc454 - Mailing List, Patch
References () https://git.kernel.org/stable/c/f636a40834d22e5e3fc748f060211879c056cd33 - () https://git.kernel.org/stable/c/f636a40834d22e5e3fc748f060211879c056cd33 - Mailing List, Patch
References () https://git.kernel.org/stable/c/f694da720dcf795dc3eb97bf76d220213f76aaa7 - () https://git.kernel.org/stable/c/f694da720dcf795dc3eb97bf76d220213f76aaa7 - Mailing List, Patch
References () https://git.kernel.org/stable/c/fb824a99e148ff272a53d71d84122728b5f00992 - () https://git.kernel.org/stable/c/fb824a99e148ff272a53d71d84122728b5f00992 - Mailing List, Patch
CWE CWE-120
First Time Linux
Linux linux Kernel

05 Jul 2024, 12:55

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se resolvió la siguiente vulnerabilidad: kdb: corrige el desbordamiento del búfer durante la finalización de tabulación Actualmente, cuando el usuario intenta completar el símbolo con la tecla Tab, kdb usará strncpy() para insertar el símbolo completado en el búfer de comando. Desafortunadamente, pasa el tamaño del búfer de origen en lugar del destino a strncpy() con resultados predeciblemente horribles. Lo más obvio es que si el búfer de comando ya está lleno pero cp, la posición del cursor, está en el medio del búfer, entonces escribiremos más allá del final del búfer proporcionado. Solucione este problema reemplazando las dudosas llamadas strncpy() con llamadas memmove()/memcpy() más comprobaciones explícitas de los límites para asegurarnos de que tenemos suficiente espacio antes de comenzar a mover los personajes.

05 Jul 2024, 07:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-07-05 07:15

Updated : 2024-08-21 08:35


NVD link : CVE-2024-39480

Mitre link : CVE-2024-39480

CVE.ORG link : CVE-2024-39480


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')

CWE-121

Stack-based Buffer Overflow