CVE-2025-40843
BaseFortify
Publication date: 2025-10-28
Last updated on: 2025-11-14
Assigner: Ericsson
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| ericsson | codechecker | to 6.26.2 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-121 | A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function). |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a buffer overflow in the internal ldlogger library used by the CodeChecker log command in CodeChecker versions up to 6.26.1. A buffer overflow occurs when more data is written to a buffer than it can hold, potentially leading to unexpected behavior or exploitation.
How can this vulnerability impact me? :
The buffer overflow vulnerability can lead to impacts on confidentiality, integrity, and availability of the affected system, as indicated by the CVSS score. This means an attacker could potentially cause data leakage, data modification, or denial of service by exploiting this issue locally.