icon

We found results for “

CVE-2025-40843

Good to know:

icon
icon

Date: September 22, 2025

Summary CodeChecker versions up to 6.26.1 contain a buffer overflow vulnerability in the internal "ldlogger" library, which is executed by the "CodeChecker log" command. Details Unsafe usage of "strcpy()" function in the internal "ldlogger" library allows attackers to trigger a buffer overflow by supplying crafted inputs from the command line. Specifically, the destination buffer is stack-allocated with a fixed size of 4096 bytes, while "strcpy()" is called without any length checks, enabling an attacker to overrun the buffer. PoC Example script is included below to illustrate how this vulnerability can be exploited. #!/bin/bash export CC_LOGGER_DEF_DIRS=1; payload=''; for i in $(seq 1 4090); do payload+='A'; done CodeChecker log -b "/very/long/path/to/$payload/gcc a.c" -o compilation.json Impact Any environment where the vulnerable "CodeChecker log" command is executed with untrusted user input is affected by this vulnerability.

Severity Score

Severity Score

Weakness Type (CWE)

Stack-based Buffer Overflow

CWE-121

Top Fix

icon

Upgrade Version

Upgrade to version codechecker - 6.26.2

Learn More

CVSS v3.1

Base Score:
Attack Vector (AV): LOCAL
Attack Complexity (AC): LOW
Privileges Required (PR): NONE
User Interaction (UI): NONE
Scope (S): UNCHANGED
Confidentiality (C): LOW
Integrity (I): LOW
Availability (A): LOW

Do you need more information?

Contact Us