CVE-2024-38576

Severity CVSS v4.0:
Pending analysis
Type:
CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Publication date:
19/06/2024
Last modified:
01/04/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> rcu: Fix buffer overflow in print_cpu_stall_info()<br /> <br /> The rcuc-starvation output from print_cpu_stall_info() might overflow the<br /> buffer if there is a huge difference in jiffies difference. The situation<br /> might seem improbable, but computers sometimes get very confused about<br /> time, which can result in full-sized integers, and, in this case,<br /> buffer overflow.<br /> <br /> Also, the unsigned jiffies difference is printed using %ld, which is<br /> normally for signed integers. This is intentional for debugging purposes,<br /> but it is not obvious from the code.<br /> <br /> This commit therefore changes sprintf() to snprintf() and adds a<br /> clarifying comment about intention of %ld format.<br /> <br /> Found by Linux Verification Center (linuxtesting.org) with SVACE.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.0 (including) 6.1.93 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.2 (including) 6.6.33 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.7 (including) 6.8.12 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.9 (including) 6.9.3 (excluding)