• CVE-2024-39480

发布时间: 2024年7月12日

修改时间: 2024年7月22日

概要

In the Linux kernel, the following vulnerability has been resolved:kdb: Fix buffer overflow during tab-completeCurrently, when the user attempts symbol completion with the Tab key, kdbwill use strncpy() to insert the completed symbol into the command buffer.Unfortunately it passes the size of the source buffer rather than thedestination to strncpy() with predictably horrible results. Most obviouslyif the command buffer is already full but cp, the cursor position, is inthe middle of the buffer, then we will write past the end of the suppliedbuffer.Fix this by replacing the dubious strncpy() calls with memmove()/memcpy()calls plus explicit boundary checks to make sure we have enough spacebefore we start moving characters around.

CVSS v3 指标

NVD openEuler
CVSS评分 7.8 5.5
Attack Vector Local Local
Attack Complexity Low Low
Privileges Required Low Low
User Interaction None None
Scope Unchanged Unchanged
Confidentiality High None
Integrity High None
Availability High High

安全公告

公告名 概要 发布时间
KylinSec-SA-2024-3115 In the Linux kernel, the following vulnerability has been resolved:kdb: Fix buffer overflow during tab-completeCurrently, when the user attempts symbol completion with the Tab key, kdbwill use strncpy() to insert the completed symbol into the command buffer.Unfortunately it passes the size of the source buffer rather than thedestination to strncpy() with predictably horrible results. Most obviouslyif the command buffer is already full but cp, the cursor position, is inthe middle of the buffer, then we will write past the end of the suppliedbuffer.Fix this by replacing the dubious strncpy() calls with memmove()/memcpy()calls plus explicit boundary checks to make sure we have enough spacebefore we start moving characters around. 2024年7月12日
KylinSec-SA-2024-4806 kernel security update 2024年7月19日
KylinSec-SA-2024-4966 kernel security update 2024年7月19日

影响产品

产品 状态
KY3.4-5A kernel Fixed
KY3.5.2 kernel Fixed
KY3.5.2 kernel Unaffected
V6 kernel Fixed