Impact
A flaw in the Linux kernel's MTD RedBoot partition table parser can cause a buffer overflow when the kernel runs the comparison routine guarded by CONFIG_FORTIFY_SOURCE. The overflow occurs because a dynamic allocation’s size is incorrectly calculated using strlen, resulting in a memcmp that reads beyond the allocated memory. The immediate consequence is a kernel panic and system boot failure. The description does not indicate that arbitrary code can be executed; instead the primary impact is denial of service in the boot process. The weakness is a classic buffer overflow in kernel space.
Affected Systems
The vulnerability affects Linux kernel builds that include RedBoot support and enable CONFIG_FORTIFY_SOURCE. The exact kernel release is not specified, but any active kernel incorporating the vulnerable code path is at risk until the fix is integrated. No version numbers are provided; the fix is contained in commit 439a1bc as part of the kernel next cycle.
Risk and Exploitability
The CVSS and EPSS data are unavailable, and the vulnerability is not listed in the CISA KEV catalog, indicating relatively low known exploitation activity. Exploitation would require control over the boot process or a malicious RedBoot partition table, and thus is limited to local or compromised devices. Nevertheless, the potential for a local attacker to render a system unbootable presents a moderate to high risk for affected installations, especially in environments where boot integrity is critical.
OpenCVE Enrichment