CVE-2024-38577

Severity CVSS v4.0:
Pending analysis
Type:
CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Publication date:
19/06/2024
Last modified:
27/05/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> rcu-tasks: Fix show_rcu_tasks_trace_gp_kthread buffer overflow<br /> <br /> There is a possibility of buffer overflow in<br /> show_rcu_tasks_trace_gp_kthread() if counters, passed<br /> to sprintf() are huge. Counter numbers, needed for this<br /> are unrealistically high, but buffer overflow is still<br /> possible.<br /> <br /> Use snprintf() with buffer size instead of sprintf().<br /> <br /> Found by Linux Verification Center (linuxtesting.org) with SVACE.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.8 (including) 5.10.226 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.11 (including) 5.15.167 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.16 (including) 6.1.93 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.2 (including) 6.6.33 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.7 (including) 6.8.12 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.9 (including) 6.9.3 (excluding)