CVE-2024-38577
CVSS v3.1
7.8 (High)
EPSS
0.04 % (5th)
Affected Products
1
Advisories
5
NVD Status
Modified
In the Linux kernel, the following vulnerability has been resolved:
rcu-tasks: Fix show_rcu_tasks_trace_gp_kthread buffer overflow
There is a possibility of buffer overflow in
show_rcu_tasks_trace_gp_kthread() if counters, passed
to sprintf() are huge. Counter numbers, needed for this
are unrealistically high, but buffer overflow is still
possible.
Use snprintf() with buffer size instead of sprintf().
Found by Linux Verification Center (linuxtesting.org) with SVACE.
Weaknesses
- CWE-120
- Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
- CVE Status
- PUBLISHED
- NVD Status
- Modified
- CNA
- kernel.org
- Published Date
-
2024-06-19 14:15:17
(2 months ago) - Updated Date
-
2024-09-12 12:15:47
(4 days ago)
Affected Products
Loading...
Loading...
Loading...
Configuration #1
|
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...