
We found results for “”
CVE-2025-40843
Good to know:


Date: September 22, 2025
Summary CodeChecker versions up to 6.26.1 contain a buffer overflow vulnerability in the internal "ldlogger" library, which is executed by the "CodeChecker log" command. Details Unsafe usage of "strcpy()" function in the internal "ldlogger" library allows attackers to trigger a buffer overflow by supplying crafted inputs from the command line. Specifically, the destination buffer is stack-allocated with a fixed size of 4096 bytes, while "strcpy()" is called without any length checks, enabling an attacker to overrun the buffer. PoC Example script is included below to illustrate how this vulnerability can be exploited. #!/bin/bash export CC_LOGGER_DEF_DIRS=1; payload=''; for i in $(seq 1 4090); do payload+='A'; done CodeChecker log -b "/very/long/path/to/$payload/gcc a.c" -o compilation.json Impact Any environment where the vulnerable "CodeChecker log" command is executed with untrusted user input is affected by this vulnerability.
Severity Score
Related Resources (5)
Severity Score
Weakness Type (CWE)
Stack-based Buffer Overflow
CWE-121Top Fix

CVSS v3.1
Base Score: |
|
---|---|
Attack Vector (AV): | LOCAL |
Attack Complexity (AC): | LOW |
Privileges Required (PR): | NONE |
User Interaction (UI): | NONE |
Scope (S): | UNCHANGED |
Confidentiality (C): | LOW |
Integrity (I): | LOW |
Availability (A): | LOW |