CVE-2024-26818

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
17/04/2024
Last modified:
27/03/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> tools/rtla: Fix clang warning about mount_point var size<br /> <br /> clang is reporting this warning:<br /> <br /> $ make HOSTCC=clang CC=clang LLVM_IAS=1<br /> [...]<br /> clang -O -g -DVERSION=\"6.8.0-rc3\" -flto=auto -fexceptions<br /> -fstack-protector-strong -fasynchronous-unwind-tables<br /> -fstack-clash-protection -Wall -Werror=format-security<br /> -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS<br /> $(pkg-config --cflags libtracefs) -c -o src/utils.o src/utils.c<br /> <br /> src/utils.c:548:66: warning: &amp;#39;fscanf&amp;#39; may overflow; destination buffer in argument 3 has size 1024, but the corresponding specifier may require size 1025 [-Wfortify-source]<br /> 548 | while (fscanf(fp, "%*s %" STR(MAX_PATH) "s %99s %*s %*d %*d\n", mount_point, type) == 2) {<br /> | ^<br /> <br /> Increase mount_point variable size to MAX_PATH+1 to avoid the overflow.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.5 (including) 6.6.18 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.7 (including) 6.7.6 (excluding)
cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:*