CodeChecker has a buffer overflow in the log command
Moderate severity
GitHub Reviewed
Published
Sep 22, 2025
in
Ericsson/codechecker
•
Updated Oct 29, 2025
Description
Published to the GitHub Advisory Database
Sep 22, 2025
Reviewed
Sep 22, 2025
Published by the National Vulnerability Database
Oct 28, 2025
Last updated
Oct 29, 2025
Summary
CodeChecker versions up to 6.26.1 contain a buffer overflow vulnerability in the internal
ldloggerlibrary, which is executed by theCodeChecker logcommand.Details
Unsafe usage of
strcpy()function in the internalldloggerlibrary allows attackers to trigger a buffer overflow by supplying crafted inputs from the command line. Specifically, the destination buffer is stack-allocated with a fixed size of 4096 bytes, whilestrcpy()is called without any length checks, enabling an attacker to overrun the buffer.PoC
Example script is included below to illustrate how this vulnerability can be exploited.
Impact
Any environment where the vulnerable
CodeChecker logcommand is executed with untrusted user input is affected by this vulnerability.References