Safety vulnerability ID: 79853
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Affected versions of the codechecker package are vulnerable to Buffer Overflow due to unsafe copying of user-controlled strings into a fixed-size stack buffer in the internal ldlogger library executed by the CodeChecker log command. The ldlogger component, invoked by CodeChecker’s log command, uses strcpy() without bounds checking to copy inputs into a 4096-byte stack-allocated buffer, allowing an overrun when given excessively long arguments. A local attacker who can pass crafted command-line parameters or environment variables to the CodeChecker log can overflow the buffer and crash the process, with limited potential for data exposure or modification within the process context.
Latest version: 6.26.0
CodeChecker is an analyzer tooling, defect database and viewer extension
This vulnerability has no description
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application