Lucene search

K
redhatcveRedhat.comRH:CVE-2024-43839
HistoryAug 19, 2024 - 1:16 p.m.

CVE-2024-43839

2024-08-1913:16:09
redhat.com
access.redhat.com
3
linux kernel
vulnerability
resolved
sprintf
snprintf
static analysis

AI Score

7.8

Confidence

High

In the Linux kernel, the following vulnerability has been resolved: bna: adjust ‘name’ buf size of bna_tcb and bna_ccb structures To have enough space to write all possible sprintf() args. Currently ‘name’ size is 16, but the first ‘%s’ specifier may already need at least 16 characters, since ‘bnad->netdev->name’ is used there. For ‘%d’ specifiers, assume that they require: * 1 char for ‘tx_id + tx_info->tcb[i]->id’ sum, BNAD_MAX_TXQ_PER_TX is 8 * 2 chars for ‘rx_id + rx_info->rx_ctrl[i].ccb->id’, BNAD_MAX_RXP_PER_RX is 16 And replace sprintf with snprintf. Detected using the static analysis tool - Svace.

Mitigation

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

AI Score

7.8

Confidence

High