CVE-2024-43839

In the Linux kernel, the following vulnerability has been resolved: bna: adjust 'name' buf size of bna_tcb and bna_ccb structures To have enough space to write all possible sprintf() args. Currently 'name' size is 16, but the first '%s' specifier may already need at least 16 characters, since 'bnad->netdev->name' is used there. For '%d' specifiers, assume that they require: * 1 char for 'tx_id + tx_info->tcb[i]->id' sum, BNAD_MAX_TXQ_PER_TX is 8 * 2 chars for 'rx_id + rx_info->rx_ctrl[i].ccb->id', BNAD_MAX_RXP_PER_RX is 16 And replace sprintf with snprintf. Detected using the static analysis tool - Svace.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

30 Oct 2024, 21:49

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
First Time Linux
Linux linux Kernel
CWE CWE-787
References () https://git.kernel.org/stable/c/6ce46045f9b90d952602e2c0b8886cfadf860bf1 - () https://git.kernel.org/stable/c/6ce46045f9b90d952602e2c0b8886cfadf860bf1 - Patch
References () https://git.kernel.org/stable/c/6d20c4044ab4d0e6a99aa35853e66f0aed5589e3 - () https://git.kernel.org/stable/c/6d20c4044ab4d0e6a99aa35853e66f0aed5589e3 - Patch
References () https://git.kernel.org/stable/c/ab748dd10d8742561f2980fea08ffb4f0cacfdef - () https://git.kernel.org/stable/c/ab748dd10d8742561f2980fea08ffb4f0cacfdef - Patch
References () https://git.kernel.org/stable/c/b0ff0cd0847b03c0a0abe20cfa900eabcfcb9e43 - () https://git.kernel.org/stable/c/b0ff0cd0847b03c0a0abe20cfa900eabcfcb9e43 - Patch
References () https://git.kernel.org/stable/c/c90b1cd7758fd4839909e838ae195d19f8065d76 - () https://git.kernel.org/stable/c/c90b1cd7758fd4839909e838ae195d19f8065d76 - Patch
References () https://git.kernel.org/stable/c/c9741a03dc8e491e57b95fba0058ab46b7e506da - () https://git.kernel.org/stable/c/c9741a03dc8e491e57b95fba0058ab46b7e506da - Patch
References () https://git.kernel.org/stable/c/e0f48f51d55fb187400e9787192eda09fa200ff5 - () https://git.kernel.org/stable/c/e0f48f51d55fb187400e9787192eda09fa200ff5 - Patch
References () https://git.kernel.org/stable/c/f121740f69eda4da2de9a20a6687a13593e72540 - () https://git.kernel.org/stable/c/f121740f69eda4da2de9a20a6687a13593e72540 - Patch

19 Aug 2024, 12:59

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: bna: ajuste el tamaño del buf 'nombre' de las estructuras bna_tcb y bna_ccb para tener suficiente espacio para escribir todos los argumentos posibles de sprintf(). Actualmente el tamaño de 'nombre' es 16, pero es posible que el primer especificador '%s' ya necesite al menos 16 caracteres, ya que allí se usa 'bnad->netdev->name'. Para los especificadores '%d', supongamos que requieren: * 1 carácter para la suma 'tx_id + tx_info->tcb[i]->id', BNAD_MAX_TXQ_PER_TX es 8 * 2 caracteres para 'rx_id + rx_info->rx_ctrl[i]. ccb->id', BNAD_MAX_RXP_PER_RX es 16 y reemplace sprintf con snprintf. Detectado utilizando la herramienta de análisis estático - Svace.

19 Aug 2024, 05:15

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/6ce46045f9b90d952602e2c0b8886cfadf860bf1 -
  • () https://git.kernel.org/stable/c/6d20c4044ab4d0e6a99aa35853e66f0aed5589e3 -
  • () https://git.kernel.org/stable/c/c90b1cd7758fd4839909e838ae195d19f8065d76 -
  • () https://git.kernel.org/stable/c/f121740f69eda4da2de9a20a6687a13593e72540 -

17 Aug 2024, 10:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-08-17 10:15

Updated : 2024-10-30 21:49


NVD link : CVE-2024-43839

Mitre link : CVE-2024-43839

CVE.ORG link : CVE-2024-43839


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-787

Out-of-bounds Write