CVE-2024-43839
Severity CVSS v4.0:
Pending analysis
Type:
CWE-787
Out-of-bounds Write
Publication date:
17/08/2024
Last modified:
03/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
bna: adjust &#39;name&#39; buf size of bna_tcb and bna_ccb structures<br />
<br />
To have enough space to write all possible sprintf() args. Currently<br />
&#39;name&#39; size is 16, but the first &#39;%s&#39; specifier may already need at<br />
least 16 characters, since &#39;bnad->netdev->name&#39; is used there.<br />
<br />
For &#39;%d&#39; specifiers, assume that they require:<br />
* 1 char for &#39;tx_id + tx_info->tcb[i]->id&#39; sum, BNAD_MAX_TXQ_PER_TX is 8<br />
* 2 chars for &#39;rx_id + rx_info->rx_ctrl[i].ccb->id&#39;, BNAD_MAX_RXP_PER_RX<br />
is 16<br />
<br />
And replace sprintf with snprintf.<br />
<br />
Detected using the static analysis tool - Svace.
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 2.6.37 (including) | 6.1.103 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.44 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.10.3 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/6ce46045f9b90d952602e2c0b8886cfadf860bf1
- https://git.kernel.org/stable/c/6d20c4044ab4d0e6a99aa35853e66f0aed5589e3
- https://git.kernel.org/stable/c/ab748dd10d8742561f2980fea08ffb4f0cacfdef
- https://git.kernel.org/stable/c/b0ff0cd0847b03c0a0abe20cfa900eabcfcb9e43
- https://git.kernel.org/stable/c/c90b1cd7758fd4839909e838ae195d19f8065d76
- https://git.kernel.org/stable/c/c9741a03dc8e491e57b95fba0058ab46b7e506da
- https://git.kernel.org/stable/c/e0f48f51d55fb187400e9787192eda09fa200ff5
- https://git.kernel.org/stable/c/f121740f69eda4da2de9a20a6687a13593e72540
- https://lists.debian.org/debian-lts-announce/2024/10/msg00003.html
- https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html



