CVE-2023-52614

Source
https://cve.org/CVERecord?id=CVE-2023-52614
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-52614.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-52614
Downstream
Related
Published
2024-03-18T10:14:44.929Z
Modified
2026-03-14T12:23:13.238608Z
Summary
PM / devfreq: Fix buffer overflow in trans_stat_show
Details

In the Linux kernel, the following vulnerability has been resolved:

PM / devfreq: Fix buffer overflow in transstatshow

Fix buffer overflow in transstatshow().

Convert simple snprintf to the more secure scnprintf with size of PAGE_SIZE.

Add condition checking if we are exceeding PAGESIZE and exit early from loop. Also add at the end a warning that we exceeded PAGESIZE and that stats is disabled.

Return -EFBIG in the case where we don't have enough space to write the full transition table.

Also document in the ABI that this function can return -EFBIG error.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/52xxx/CVE-2023-52614.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
e552bbaf5b987f57c43e6981a452b8a3c700b1ae
Fixed
087de000e4f8c878c81d9dd3725f00a1d292980c
Fixed
796d3fad8c35ee9df9027899fb90ceaeb41b958f
Fixed
8a7729cda2dd276d7a3994638038fb89035b6f2c
Fixed
a979f56aa4b93579cf0e4265ae04d7e9300fd3e8
Fixed
eaef4650fa2050147ca25fd7ee43bc0082e03c87
Fixed
08e23d05fa6dc4fc13da0ccf09defdd4bbc92ff4

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-52614.json"