| Title | Linux の Linux Kernel における境界外読み取りに関する脆弱性 |
|---|---|
| Summary | Linux の Linux Kernel には、境界外読み取りに関する脆弱性が存在します。 |
| Possible impacts | サービス運用妨害 (DoS) 状態にされる可能性があります。 |
| Solution | ベンダより正式な対策が公開されています。ベンダ情報を参照して適切な対策を実施してください。 |
| Publication Date | March 14, 2025, midnight |
| Registration Date | April 25, 2025, 5:46 p.m. |
| Last Update | April 25, 2025, 5:46 p.m. |
| CVSS3.0 : 警告 | |
| Score | 5.5 |
|---|---|
| Vector | CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
| Linux |
| Linux Kernel 6.13 以上 6.13.9 未満 |
| Linux Kernel 6.14 |
| Linux Kernel 6.2 以上 6.6.85 未満 |
| Linux Kernel 6.7 以上 6.12.21 未満 |
| No | Changed Details | Date of change |
|---|---|---|
| 1 | [2025年04月11日] 掲載 | April 11, 2025, 9:57 a.m. |
| Summary | In the Linux kernel, the following vulnerability has been resolved: can: ucan: fix out of bound read in strscpy() source Commit 7fdaf8966aae ("can: ucan: use strscpy() to instead of strncpy()") Let's consider below buffers: dest[len + 1]; /* will be NUL terminated */ When doing: strncpy(dest, src, len); strncpy() will read up to len bytes from src. On the other hand: strscpy(dest, src, len + 1); will read up to len + 1 bytes from src, that is to say, an out of bound This exact pattern happened in ucan. The root cause is that the source is not NUL terminated. Instead of On top of this do a couple refactors: - ucan_ctl_payload->raw is only used for the firmware string, so - ucan_device_request_in() is only used to retrieve the firmware |
|---|---|
| Publication Date | April 3, 2025, 5:15 p.m. |
| Registration Date | April 4, 2025, 4:01 a.m. |
| Last Update | April 11, 2025, 1:13 a.m. |
| Configuration1 | or higher | or less | more than | less than | |
| cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:* | |||||
| cpe:2.3:o:linux:linux_kernel:6.14:rc2:*:*:*:*:*:* | |||||
| cpe:2.3:o:linux:linux_kernel:6.14:rc3:*:*:*:*:*:* | |||||
| cpe:2.3:o:linux:linux_kernel:6.14:rc4:*:*:*:*:*:* | |||||
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 | 6.13.9 | |||
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 | 6.6.85 | |||
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 | 6.12.21 | |||
| cpe:2.3:o:linux:linux_kernel:6.14:rc5:*:*:*:*:*:* | |||||
| cpe:2.3:o:linux:linux_kernel:6.14:rc6:*:*:*:*:*:* | |||||
| cpe:2.3:o:linux:linux_kernel:6.14:rc7:*:*:*:*:*:* | |||||