CVE-2026-23474
Gravedad:
Pendiente de análisis
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
03/04/2026
Última modificación:
03/04/2026
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
mtd: Avoid boot crash in RedBoot partition table parser<br />
<br />
Given CONFIG_FORTIFY_SOURCE=y and a recent compiler,<br />
commit 439a1bcac648 ("fortify: Use __builtin_dynamic_object_size() when<br />
available") produces the warning below and an oops.<br />
<br />
Searching for RedBoot partition table in 50000000.flash at offset 0x7e0000<br />
------------[ cut here ]------------<br />
WARNING: lib/string_helpers.c:1035 at 0xc029e04c, CPU#0: swapper/0/1<br />
memcmp: detected buffer overflow: 15 byte read of buffer size 14<br />
Modules linked in:<br />
CPU: 0 UID: 0 PID: 1 Comm: swapper/0 Not tainted 6.19.0 #1 NONE<br />
<br />
As Kees said, "&#39;names&#39; is pointing to the final &#39;namelen&#39; many bytes<br />
of the allocation ... &#39;namelen&#39; could be basically any length at all.<br />
This fortify warning looks legit to me -- this code used to be reading<br />
beyond the end of the allocation."<br />
<br />
Since the size of the dynamic allocation is calculated with strlen()<br />
we can use strcmp() instead of memcmp() and remain within bounds.
Impacto
Referencias a soluciones, herramientas e información
- https://git.kernel.org/stable/c/0b08be5aca212a99f8ba786fee4922feac08002c
- https://git.kernel.org/stable/c/2025b2d1f9d5cad6ea6fe85654c6c41297c3130b
- https://git.kernel.org/stable/c/75a4d8cfe7784f909b3bd69325abac8e04ecb385
- https://git.kernel.org/stable/c/8e2f8020270af7777d49c2e7132260983e4fc566
- https://git.kernel.org/stable/c/c4054ad2d8bff4e8e937cd4a1d1a04c1e8f77a2c
- https://git.kernel.org/stable/c/d8570211a2b1ec886a462daa0be4e9983ac768bb



