CVE-2023-52614

Severity CVSS v4.0:
Pending analysis
Type:
CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Publication date:
18/03/2024
Last modified:
12/12/2024

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> PM / devfreq: Fix buffer overflow in trans_stat_show<br /> <br /> Fix buffer overflow in trans_stat_show().<br /> <br /> Convert simple snprintf to the more secure scnprintf with size of<br /> PAGE_SIZE.<br /> <br /> Add condition checking if we are exceeding PAGE_SIZE and exit early from<br /> loop. Also add at the end a warning that we exceeded PAGE_SIZE and that<br /> stats is disabled.<br /> <br /> Return -EFBIG in the case where we don&amp;#39;t have enough space to write the<br /> full transition table.<br /> <br /> Also document in the ABI that this function can return -EFBIG error.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 3.8 (including) 5.10.216 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.11 (including) 5.15.149 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.16 (including) 6.1.76 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.2 (including) 6.6.15 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.7 (including) 6.7.3 (excluding)