Description
In the Linux kernel, the following vulnerability has been resolved:

mtd: Avoid boot crash in RedBoot partition table parser

Given CONFIG_FORTIFY_SOURCE=y and a recent compiler,
commit 439a1bcac648 ("fortify: Use __builtin_dynamic_object_size() when
available") produces the warning below and an oops.

Searching for RedBoot partition table in 50000000.flash at offset 0x7e0000
------------[ cut here ]------------
WARNING: lib/string_helpers.c:1035 at 0xc029e04c, CPU#0: swapper/0/1
memcmp: detected buffer overflow: 15 byte read of buffer size 14
Modules linked in:
CPU: 0 UID: 0 PID: 1 Comm: swapper/0 Not tainted 6.19.0 #1 NONE

As Kees said, "'names' is pointing to the final 'namelen' many bytes
of the allocation ... 'namelen' could be basically any length at all.
This fortify warning looks legit to me -- this code used to be reading
beyond the end of the allocation."

Since the size of the dynamic allocation is calculated with strlen()
we can use strcmp() instead of memcmp() and remain within bounds.
Published: 2026-04-03
Score: n/a
EPSS: n/a
KEV: No
Impact: Buffer overflow leading to kernel panic during boot
Action: Patch
AI Analysis

Impact

A flaw in the Linux kernel's MTD RedBoot partition table parser can cause a buffer overflow when the kernel runs the comparison routine guarded by CONFIG_FORTIFY_SOURCE. The overflow occurs because a dynamic allocation’s size is incorrectly calculated using strlen, resulting in a memcmp that reads beyond the allocated memory. The immediate consequence is a kernel panic and system boot failure. The description does not indicate that arbitrary code can be executed; instead the primary impact is denial of service in the boot process. The weakness is a classic buffer overflow in kernel space.

Affected Systems

The vulnerability affects Linux kernel builds that include RedBoot support and enable CONFIG_FORTIFY_SOURCE. The exact kernel release is not specified, but any active kernel incorporating the vulnerable code path is at risk until the fix is integrated. No version numbers are provided; the fix is contained in commit 439a1bc as part of the kernel next cycle.

Risk and Exploitability

The CVSS and EPSS data are unavailable, and the vulnerability is not listed in the CISA KEV catalog, indicating relatively low known exploitation activity. Exploitation would require control over the boot process or a malicious RedBoot partition table, and thus is limited to local or compromised devices. Nevertheless, the potential for a local attacker to render a system unbootable presents a moderate to high risk for affected installations, especially in environments where boot integrity is critical.

Generated by OpenCVE AI on April 3, 2026 at 18:40 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply a kernel update that incorporates commit 439a1bc, which replaces the unsafe memcmp with a bounded string comparison.
  • If an immediate kernel upgrade is not possible, disable CONFIG_FORTIFY_SOURCE for the kernel build, or ensure that no unsafe partition table is loaded during boot.
  • Verify that any custom firmware or bootloader does not provide malformed RedBoot metadata that could trigger the overflow.

Generated by OpenCVE AI on April 3, 2026 at 18:40 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 04 Apr 2026 01:15:00 +0000


Fri, 03 Apr 2026 21:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-119

Fri, 03 Apr 2026 16:30:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: mtd: Avoid boot crash in RedBoot partition table parser Given CONFIG_FORTIFY_SOURCE=y and a recent compiler, commit 439a1bcac648 ("fortify: Use __builtin_dynamic_object_size() when available") produces the warning below and an oops. Searching for RedBoot partition table in 50000000.flash at offset 0x7e0000 ------------[ cut here ]------------ WARNING: lib/string_helpers.c:1035 at 0xc029e04c, CPU#0: swapper/0/1 memcmp: detected buffer overflow: 15 byte read of buffer size 14 Modules linked in: CPU: 0 UID: 0 PID: 1 Comm: swapper/0 Not tainted 6.19.0 #1 NONE As Kees said, "'names' is pointing to the final 'namelen' many bytes of the allocation ... 'namelen' could be basically any length at all. This fortify warning looks legit to me -- this code used to be reading beyond the end of the allocation." Since the size of the dynamic allocation is calculated with strlen() we can use strcmp() instead of memcmp() and remain within bounds.
Title mtd: Avoid boot crash in RedBoot partition table parser
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-04-03T15:15:53.406Z

Reserved: 2026-01-13T15:37:46.022Z

Link: CVE-2026-23474

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-04-03T16:16:35.260

Modified: 2026-04-03T16:16:35.260

Link: CVE-2026-23474

cve-icon Redhat

Severity :

Publid Date: 2026-04-03T00:00:00Z

Links: CVE-2026-23474 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-03T21:15:40Z

Weaknesses