CVE-2023-52464

Severity CVSS v4.0:
Pending analysis
Type:
CWE-119 Buffer Errors
Publication date:
23/02/2024
Last modified:
04/11/2024

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> EDAC/thunderx: Fix possible out-of-bounds string access<br /> <br /> Enabling -Wstringop-overflow globally exposes a warning for a common bug<br /> in the usage of strncat():<br /> <br /> drivers/edac/thunderx_edac.c: In function &amp;#39;thunderx_ocx_com_threaded_isr&amp;#39;:<br /> drivers/edac/thunderx_edac.c:1136:17: error: &amp;#39;strncat&amp;#39; specified bound 1024 equals destination size [-Werror=stringop-overflow=]<br /> 1136 | strncat(msg, other, OCX_MESSAGE_SIZE);<br /> | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~<br /> ...<br /> 1145 | strncat(msg, other, OCX_MESSAGE_SIZE);<br /> ...<br /> 1150 | strncat(msg, other, OCX_MESSAGE_SIZE);<br /> <br /> ...<br /> <br /> Apparently the author of this driver expected strncat() to behave the<br /> way that strlcat() does, which uses the size of the destination buffer<br /> as its third argument rather than the length of the source buffer. The<br /> result is that there is no check on the size of the allocated buffer.<br /> <br /> Change it to strlcat().<br /> <br /> [ bp: Trim compiler output, fixup commit message. ]

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.12.0 (including) 4.19.306 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.20.0 (including) 5.4.268 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.5.0 (including) 5.10.209 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.11.0 (including) 5.15.148 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.16.0 (including) 6.1.75 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.2.0 (including) 6.6.14 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.7.0 (including) 6.7.2 (excluding)