CVE-2024-38576

Source
https://cve.org/CVERecord?id=CVE-2024-38576
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-38576.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-38576
Downstream
Related
Published
2024-06-19T13:37:35.142Z
Modified
2026-03-13T07:56:55.184184Z
Severity
  • 7.1 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H CVSS Calculator
Summary
rcu: Fix buffer overflow in print_cpu_stall_info()
Details

In the Linux kernel, the following vulnerability has been resolved:

rcu: Fix buffer overflow in printcpustall_info()

The rcuc-starvation output from printcpustall_info() might overflow the buffer if there is a huge difference in jiffies difference. The situation might seem improbable, but computers sometimes get very confused about time, which can result in full-sized integers, and, in this case, buffer overflow.

Also, the unsigned jiffies difference is printed using %ld, which is normally for signed integers. This is intentional for debugging purposes, but it is not obvious from the code.

This commit therefore changes sprintf() to snprintf() and adds a clarifying comment about intention of %ld format.

Found by Linux Verification Center (linuxtesting.org) with SVACE.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/38xxx/CVE-2024-38576.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
245a62982502255314b63dd2c4daaedd1cd595a6
Fixed
e2228ed3fe7aa838fba87c79a76fb1ad9ea47138
Fixed
afb39909bfb5c08111f99e21bf5be7505f59ff1c
Fixed
9351e1338539cb7f319ffc1210fa9b2aa27384b5
Fixed
4c3e2ef4d8ddd313c8ce3ac30505940bea8d6257
Fixed
3758f7d9917bd7ef0482c4184c0ad673b4c4e069

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-38576.json"