CVE-2023-52464

In the Linux kernel, the following vulnerability has been resolved: EDAC/thunderx: Fix possible out-of-bounds string access Enabling -Wstringop-overflow globally exposes a warning for a common bug in the usage of strncat(): drivers/edac/thunderx_edac.c: In function 'thunderx_ocx_com_threaded_isr': drivers/edac/thunderx_edac.c:1136:17: error: 'strncat' specified bound 1024 equals destination size [-Werror=stringop-overflow=] 1136 | strncat(msg, other, OCX_MESSAGE_SIZE); | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ... 1145 | strncat(msg, other, OCX_MESSAGE_SIZE); ... 1150 | strncat(msg, other, OCX_MESSAGE_SIZE); ... Apparently the author of this driver expected strncat() to behave the way that strlcat() does, which uses the size of the destination buffer as its third argument rather than the length of the source buffer. The result is that there is no check on the size of the allocated buffer. Change it to strlcat(). [ bp: Trim compiler output, fixup commit message. ]
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

27 Jun 2024, 13:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html -

25 Jun 2024, 21:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html -

17 Apr 2024, 20:03

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/426fae93c01dffa379225eb2bd4d3cdc42c6eec5 - () https://git.kernel.org/stable/c/426fae93c01dffa379225eb2bd4d3cdc42c6eec5 - Patch
References () https://git.kernel.org/stable/c/475c58e1a471e9b873e3e39958c64a2d278275c8 - () https://git.kernel.org/stable/c/475c58e1a471e9b873e3e39958c64a2d278275c8 - Patch
References () https://git.kernel.org/stable/c/5da3b6e7196f0b4f3728e4e25eb20233a9ddfaf6 - () https://git.kernel.org/stable/c/5da3b6e7196f0b4f3728e4e25eb20233a9ddfaf6 - Patch
References () https://git.kernel.org/stable/c/6aa7865ba7ff7f0ede0035180fb3b9400ceb405a - () https://git.kernel.org/stable/c/6aa7865ba7ff7f0ede0035180fb3b9400ceb405a - Patch
References () https://git.kernel.org/stable/c/700cf4bead80fac994dcc43ae1ca5d86d8959b21 - () https://git.kernel.org/stable/c/700cf4bead80fac994dcc43ae1ca5d86d8959b21 - Patch
References () https://git.kernel.org/stable/c/71c17ee02538802ceafc830f0736aa35b564e601 - () https://git.kernel.org/stable/c/71c17ee02538802ceafc830f0736aa35b564e601 - Patch
References () https://git.kernel.org/stable/c/9dbac9fdae6e3b411fc4c3fca3bf48f70609c398 - () https://git.kernel.org/stable/c/9dbac9fdae6e3b411fc4c3fca3bf48f70609c398 - Patch
References () https://git.kernel.org/stable/c/e1c86511241588efffaa49556196f09a498d5057 - () https://git.kernel.org/stable/c/e1c86511241588efffaa49556196f09a498d5057 - Patch
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: EDAC/thunderx: corrige un posible acceso a cadenas fuera de los límites Al habilitar -Wstringop-overflow globalmente se expone una advertencia para un error común en el uso de strncat(): drivers/edac/ thunderx_edac.c: En la función 'thunderx_ocx_com_threaded_isr': drivers/edac/thunderx_edac.c:1136:17: error: 'strncat' el límite especificado 1024 es igual al tamaño de destino [-Werror=stringop-overflow=] 1136 | strncat(msj, otro, OCX_MESSAGE_SIZE); | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ... 1145 | strncat(msj, otro, OCX_MESSAGE_SIZE); ... 1150 | strncat(msj, otro, OCX_MESSAGE_SIZE); ... Aparentemente, el autor de este controlador esperaba que strncat() se comportara de la manera que lo hace strlcat(), que utiliza el tamaño del búfer de destino como tercer argumento en lugar de la longitud del búfer de origen. El resultado es que no se comprueba el tamaño del búfer asignado. Cámbielo a strlcat(). [bp: recortar la salida del compilador, mensaje de confirmación de reparación. ]
First Time Linux linux Kernel
Linux
CWE CWE-119
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

23 Feb 2024, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-02-23 15:15

Updated : 2024-06-27 13:15


NVD link : CVE-2023-52464

Mitre link : CVE-2023-52464

CVE.ORG link : CVE-2023-52464


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer