Description
In the Linux kernel, the following vulnerability has been resolved:

mtd: Avoid boot crash in RedBoot partition table parser

Given CONFIG_FORTIFY_SOURCE=y and a recent compiler,
commit 439a1bcac648 ("fortify: Use __builtin_dynamic_object_size() when
available") produces the warning below and an oops.

Searching for RedBoot partition table in 50000000.flash at offset 0x7e0000
------------[ cut here ]------------
WARNING: lib/string_helpers.c:1035 at 0xc029e04c, CPU#0: swapper/0/1
memcmp: detected buffer overflow: 15 byte read of buffer size 14
Modules linked in:
CPU: 0 UID: 0 PID: 1 Comm: swapper/0 Not tainted 6.19.0 #1 NONE

As Kees said, "'names' is pointing to the final 'namelen' many bytes
of the allocation ... 'namelen' could be basically any length at all.
This fortify warning looks legit to me -- this code used to be reading
beyond the end of the allocation."

Since the size of the dynamic allocation is calculated with strlen()
we can use strcmp() instead of memcmp() and remain within bounds.
Published: 2026-04-03
Score: n/a
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service – kernel crash
Action: Immediate Patch
AI Analysis

Impact

A bounded buffer overflow exists in the RedBoot partition table parser of the Linux kernel when modern compiler fortification options are enabled. The overflow occurs because a dynamically allocated buffer is accessed beyond its size, causing a kernel oops and eventual crash. This flaw is a classic example of CWE‑805 and results in a loss of service.

Affected Systems

The vulnerability is present in any Linux kernel that contains the affected parser code, including the 6.19.0 release referenced in the description and all later kernels that have not yet incorporated the upstream fix. Distributions shipping such kernels are therefore potentially affected until a patched kernel is deployed.

Risk and Exploitability

The probability of exploitation is currently very low, with an EPSS less than 1 %. The flaw is not listed in the CISA KEV catalog. The most likely way to trigger the issue is through a malicious RedBoot partition table encountered during system boot, which would require control over the firmware image or the boot environment. Successful exploitation would result in a kernel crash and complete loss of service, rather than data compromise or privilege escalation.

Generated by OpenCVE AI on April 7, 2026 at 10:36 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply a kernel update that includes the commit fixing the buffer overflow issue.
  • Verify that the patch is present by checking the kernel source or vendor releases for the referenced commit changes.
  • If a kernel upgrade cannot be performed immediately, disable the RedBoot partition table feature or temporarily reduce the use of CONFIG_FORTIFY_SOURCE until the patch is available.

Generated by OpenCVE AI on April 7, 2026 at 10:36 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 18 Apr 2026 09:15:00 +0000


Tue, 07 Apr 2026 08:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-119

Sat, 04 Apr 2026 01:15:00 +0000


Fri, 03 Apr 2026 21:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-119

Fri, 03 Apr 2026 16:30:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: mtd: Avoid boot crash in RedBoot partition table parser Given CONFIG_FORTIFY_SOURCE=y and a recent compiler, commit 439a1bcac648 ("fortify: Use __builtin_dynamic_object_size() when available") produces the warning below and an oops. Searching for RedBoot partition table in 50000000.flash at offset 0x7e0000 ------------[ cut here ]------------ WARNING: lib/string_helpers.c:1035 at 0xc029e04c, CPU#0: swapper/0/1 memcmp: detected buffer overflow: 15 byte read of buffer size 14 Modules linked in: CPU: 0 UID: 0 PID: 1 Comm: swapper/0 Not tainted 6.19.0 #1 NONE As Kees said, "'names' is pointing to the final 'namelen' many bytes of the allocation ... 'namelen' could be basically any length at all. This fortify warning looks legit to me -- this code used to be reading beyond the end of the allocation." Since the size of the dynamic allocation is calculated with strlen() we can use strcmp() instead of memcmp() and remain within bounds.
Title mtd: Avoid boot crash in RedBoot partition table parser
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-04-18T08:59:13.577Z

Reserved: 2026-01-13T15:37:46.022Z

Link: CVE-2026-23474

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-03T16:16:35.260

Modified: 2026-04-18T09:16:29.257

Link: CVE-2026-23474

cve-icon Redhat

Severity :

Publid Date: 2026-04-03T00:00:00Z

Links: CVE-2026-23474 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-08T19:53:36Z

Weaknesses