发布时间: 2024年4月19日
修改时间: 2024年4月19日
In the Linux kernel, the following vulnerability has been resolved:EDAC/thunderx: Fix possible out-of-bounds string accessEnabling -Wstringop-overflow globally exposes a warning for a common bugin the usage of strncat(): drivers/edac/thunderx_edac.c: In function thunderx_ocx_com_threaded_isr : drivers/edac/thunderx_edac.c:1136:17: error: strncat specified bound 1024 equals destination size [-Werror=stringop-overflow=] 1136 | strncat(msg, other, OCX_MESSAGE_SIZE); | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ... 1145 | strncat(msg, other, OCX_MESSAGE_SIZE); ... 1150 | strncat(msg, other, OCX_MESSAGE_SIZE); ...Apparently the author of this driver expected strncat() to behave theway that strlcat() does, which uses the size of the destination bufferas its third argument rather than the length of the source buffer. Theresult is that there is no check on the size of the allocated buffer.Change it to strlcat(). [ bp: Trim compiler output, fixup commit message. ]
NVD | openEuler | |
---|---|---|
CVSS评分 | 7.8 | 5.5 |
Attack Vector | Local | Local |
Attack Complexity | Low | Low |
Privileges Required | Low | Low |
User Interaction | None | None |
Scope | Unchanged | Unchanged |
Confidentiality | High | High |
Integrity | High | None |
Availability | High | None |
公告名 | 概要 | 发布时间 |
---|---|---|
KylinSec-SA-2024-1512 | kernel security update | 2024年4月19日 |
KylinSec-SA-2024-4773 | kernel security update | 2024年4月19日 |
产品 | 包 | 状态 |
---|---|---|
KY3.4-4A | kernel | Fixed |
KY3.4-5A | kernel | Fixed |
KY3.5.1 | kernel | Fixed |
KY3.5.2 | kernel | Fixed |