Lucene search

K
nvd416baaa9-dc9f-4396-8d5f-8c081fb06d67NVD:CVE-2024-43839
HistoryAug 17, 2024 - 10:15 a.m.

CVE-2024-43839

2024-08-1710:15:09
416baaa9-dc9f-4396-8d5f-8c081fb06d67
web.nvd.nist.gov
4
linux kernel
bna_tcb
bna_ccb
vulnerability
sprintf
snprintf
static analysis

EPSS

0

Percentile

13.7%

In the Linux kernel, the following vulnerability has been resolved:

bna: adjust ‘name’ buf size of bna_tcb and bna_ccb structures

To have enough space to write all possible sprintf() args. Currently
‘name’ size is 16, but the first ‘%s’ specifier may already need at
least 16 characters, since ‘bnad->netdev->name’ is used there.

For ‘%d’ specifiers, assume that they require:

  • 1 char for ‘tx_id + tx_info->tcb[i]->id’ sum, BNAD_MAX_TXQ_PER_TX is 8
  • 2 chars for ‘rx_id + rx_info->rx_ctrl[i].ccb->id’, BNAD_MAX_RXP_PER_RX
    is 16

And replace sprintf with snprintf.

Detected using the static analysis tool - Svace.