CVE-2023-52464
Severity CVSS v4.0:
Pending analysis
Type:
CWE-119
Buffer Errors
Publication date:
23/02/2024
Last modified:
04/11/2024
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
EDAC/thunderx: Fix possible out-of-bounds string access<br />
<br />
Enabling -Wstringop-overflow globally exposes a warning for a common bug<br />
in the usage of strncat():<br />
<br />
drivers/edac/thunderx_edac.c: In function &#39;thunderx_ocx_com_threaded_isr&#39;:<br />
drivers/edac/thunderx_edac.c:1136:17: error: &#39;strncat&#39; specified bound 1024 equals destination size [-Werror=stringop-overflow=]<br />
1136 | strncat(msg, other, OCX_MESSAGE_SIZE);<br />
| ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~<br />
...<br />
1145 | strncat(msg, other, OCX_MESSAGE_SIZE);<br />
...<br />
1150 | strncat(msg, other, OCX_MESSAGE_SIZE);<br />
<br />
...<br />
<br />
Apparently the author of this driver expected strncat() to behave the<br />
way that strlcat() does, which uses the size of the destination buffer<br />
as its third argument rather than the length of the source buffer. The<br />
result is that there is no check on the size of the allocated buffer.<br />
<br />
Change it to strlcat().<br />
<br />
[ bp: Trim compiler output, fixup commit message. ]
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.12.0 (including) | 4.19.306 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.20.0 (including) | 5.4.268 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.5.0 (including) | 5.10.209 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11.0 (including) | 5.15.148 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16.0 (including) | 6.1.75 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2.0 (including) | 6.6.14 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7.0 (including) | 6.7.2 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/426fae93c01dffa379225eb2bd4d3cdc42c6eec5
- https://git.kernel.org/stable/c/475c58e1a471e9b873e3e39958c64a2d278275c8
- https://git.kernel.org/stable/c/5da3b6e7196f0b4f3728e4e25eb20233a9ddfaf6
- https://git.kernel.org/stable/c/6aa7865ba7ff7f0ede0035180fb3b9400ceb405a
- https://git.kernel.org/stable/c/700cf4bead80fac994dcc43ae1ca5d86d8959b21
- https://git.kernel.org/stable/c/71c17ee02538802ceafc830f0736aa35b564e601
- https://git.kernel.org/stable/c/9dbac9fdae6e3b411fc4c3fca3bf48f70609c398
- https://git.kernel.org/stable/c/e1c86511241588efffaa49556196f09a498d5057



