CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
5.1%
In the Linux kernel, the following vulnerability has been resolved:
EDAC/thunderx: Fix possible out-of-bounds string access Enabling
-Wstringop-overflow globally exposes a warning for a common bug in the
usage of strncat(): drivers/edac/thunderx_edac.c: In function
‘thunderx_ocx_com_threaded_isr’: drivers/edac/thunderx_edac.c:1136:17:
error: ‘strncat’ specified bound 1024 equals destination size
[-Werror=stringop-overflow=] 1136 | strncat(msg, other, OCX_MESSAGE_SIZE);
| ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ … 1145 | strncat(msg, other,
OCX_MESSAGE_SIZE); … 1150 | strncat(msg, other, OCX_MESSAGE_SIZE); …
Apparently the author of this driver expected strncat() to behave the way
that strlcat() does, which uses the size of the destination buffer as its
third argument rather than the length of the source buffer. The result is
that there is no check on the size of the allocated buffer. Change it to
strlcat(). [ bp: Trim compiler output, fixup commit message. ]
Author | Note |
---|---|
rodrigo-zaiden | USN-6765-1 for linux-oem-6.5 wrongly stated that this CVE was fixed in version 6.5.0-1022.23. The mentioned notice was revoked and the state of the fix for linux-oem-6.5 was recovered to the previous state. |
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | linux | < 4.15.0-224.236 | UNKNOWN |
ubuntu | 20.04 | noarch | linux | < 5.4.0-176.196 | UNKNOWN |
ubuntu | 22.04 | noarch | linux | < 5.15.0-102.112 | UNKNOWN |
ubuntu | 23.10 | noarch | linux | < 6.5.0-41.41 | UNKNOWN |
ubuntu | 18.04 | noarch | linux-aws | < 4.15.0-1167.180 | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws | < 5.4.0-1122.132 | UNKNOWN |
ubuntu | 22.04 | noarch | linux-aws | < 5.15.0-1057.63 | UNKNOWN |
ubuntu | 23.10 | noarch | linux-aws | < 6.5.0-1021.21 | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws-5.15 | < 5.15.0-1057.63~20.04.1 | UNKNOWN |
ubuntu | 18.04 | noarch | linux-aws-5.4 | < 5.4.0-1122.132~18.04.1 | UNKNOWN |
git.kernel.org/stable/c/426fae93c01dffa379225eb2bd4d3cdc42c6eec5
git.kernel.org/stable/c/475c58e1a471e9b873e3e39958c64a2d278275c8
git.kernel.org/stable/c/5da3b6e7196f0b4f3728e4e25eb20233a9ddfaf6
git.kernel.org/stable/c/6aa7865ba7ff7f0ede0035180fb3b9400ceb405a
git.kernel.org/stable/c/700cf4bead80fac994dcc43ae1ca5d86d8959b21
git.kernel.org/stable/c/71c17ee02538802ceafc830f0736aa35b564e601
git.kernel.org/stable/c/9dbac9fdae6e3b411fc4c3fca3bf48f70609c398
git.kernel.org/stable/c/e1c86511241588efffaa49556196f09a498d5057
launchpad.net/bugs/cve/CVE-2023-52464
nvd.nist.gov/vuln/detail/CVE-2023-52464
security-tracker.debian.org/tracker/CVE-2023-52464
ubuntu.com/security/notices/USN-6688-1
ubuntu.com/security/notices/USN-6725-1
ubuntu.com/security/notices/USN-6725-2
ubuntu.com/security/notices/USN-6726-1
ubuntu.com/security/notices/USN-6726-2
ubuntu.com/security/notices/USN-6726-3
ubuntu.com/security/notices/USN-6740-1
ubuntu.com/security/notices/USN-6818-1
ubuntu.com/security/notices/USN-6818-2
ubuntu.com/security/notices/USN-6818-3
ubuntu.com/security/notices/USN-6818-4
ubuntu.com/security/notices/USN-6819-1
ubuntu.com/security/notices/USN-6819-2
ubuntu.com/security/notices/USN-6819-3
ubuntu.com/security/notices/USN-6819-4
www.cve.org/CVERecord?id=CVE-2023-52464