vulnerability

Oracle Linux: CVE-2024-43839: ELSA-2024-12780: Unbreakable Enterprise kernel security update (IMPORTANT) (Multiple Advisories)

Severity
6
CVSS
(AV:L/AC:L/Au:S/C:P/I:P/A:C)
Published
Aug 17, 2024
Added
Oct 16, 2024
Modified
Dec 3, 2025

Description

In the Linux kernel, the following vulnerability has been resolved:
bna: adjust 'name' buf size of bna_tcb and bna_ccb structures
To have enough space to write all possible sprintf() args. Currently
'name' size is 16, but the first '%s' specifier may already need at
least 16 characters, since 'bnad->netdev->name' is used there.
For '%d' specifiers, assume that they require:
* 1 char for 'tx_id + tx_info->tcb[i]->id' sum, BNAD_MAX_TXQ_PER_TX is 8
* 2 chars for 'rx_id + rx_info->rx_ctrl[i].ccb->id', BNAD_MAX_RXP_PER_RX
is 16
And replace sprintf with snprintf.
Detected using the static analysis tool - Svace.
A vulnerability was found in the Linux kernel involving insufficient buffer size in the bna_tcb and bna_ccb structures. The buffer, named name, was originally 16 bytes, which was inadequate for all possible sprintf() arguments, especially when handling %s and %d specifiers. This limitation could potentially lead to buffer overflows.

Solution

oracle-linux-upgrade-kernel-uek
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.