Lucene search

K
debiancveDebian Security Bug TrackerDEBIANCVE:CVE-2024-43839
HistoryAug 17, 2024 - 10:15 a.m.

CVE-2024-43839

2024-08-1710:15:09
Debian Security Bug Tracker
security-tracker.debian.org
4
linux kernel
vulnerability
bna
sprintf
snprintf
static analysis

AI Score

7.2

Confidence

Low

EPSS

0

Percentile

13.7%

In the Linux kernel, the following vulnerability has been resolved: bna: adjust ‘name’ buf size of bna_tcb and bna_ccb structures To have enough space to write all possible sprintf() args. Currently ‘name’ size is 16, but the first ‘%s’ specifier may already need at least 16 characters, since ‘bnad->netdev->name’ is used there. For ‘%d’ specifiers, assume that they require: * 1 char for ‘tx_id + tx_info->tcb[i]->id’ sum, BNAD_MAX_TXQ_PER_TX is 8 * 2 chars for ‘rx_id + rx_info->rx_ctrl[i].ccb->id’, BNAD_MAX_RXP_PER_RX is 16 And replace sprintf with snprintf. Detected using the static analysis tool - Svace.

AI Score

7.2

Confidence

Low

EPSS

0

Percentile

13.7%