CVE-2024-38576

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-38576
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-38576.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-38576
Downstream
Related
Published
2024-06-19T14:15:17Z
Modified
2025-08-09T20:01:26Z
Summary
[none]
Details

In the Linux kernel, the following vulnerability has been resolved:

rcu: Fix buffer overflow in printcpustall_info()

The rcuc-starvation output from printcpustall_info() might overflow the buffer if there is a huge difference in jiffies difference. The situation might seem improbable, but computers sometimes get very confused about time, which can result in full-sized integers, and, in this case, buffer overflow.

Also, the unsigned jiffies difference is printed using %ld, which is normally for signed integers. This is intentional for debugging purposes, but it is not obvious from the code.

This commit therefore changes sprintf() to snprintf() and adds a clarifying comment about intention of %ld format.

Found by Linux Verification Center (linuxtesting.org) with SVACE.

References

Affected packages