In the Linux kernel, the following vulnerability has been resolved:
PM / devfreq: Fix buffer overflow in trans_stat_show
Fix buffer overflow in trans_stat_show().
Convert simple snprintf to the more secure scnprintf with size of
PAGE_SIZE.
Add condition checking if we are exceeding PAGE_SIZE and exit early from
loop. Also add at the end a warning that we exceeded PAGE_SIZE and that
stats is disabled.
Return -EFBIG in the case where we don't have enough space to write the
full transition table.
Also document in the ABI that this function can return -EFBIG error.
CVSS
No CVSS.
References
Configurations
No configuration.
History
03 May 2024, 06:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Summary |
|
18 Mar 2024, 11:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-03-18 11:15
Updated : 2024-05-03 06:15
NVD link : CVE-2023-52614
Mitre link : CVE-2023-52614
CVE.ORG link : CVE-2023-52614
JSON object : View
Products Affected
No product.
CWE
No CWE.