Impact
A bounded buffer overflow exists in the RedBoot partition table parser of the Linux kernel when modern compiler fortification options are enabled. The overflow occurs because a dynamically allocated buffer is accessed beyond its size, causing a kernel oops and eventual crash. This flaw is a classic example of CWE‑805 and results in a loss of service.
Affected Systems
The vulnerability is present in any Linux kernel that contains the affected parser code, including the 6.19.0 release referenced in the description and all later kernels that have not yet incorporated the upstream fix. Distributions shipping such kernels are therefore potentially affected until a patched kernel is deployed.
Risk and Exploitability
The probability of exploitation is currently very low, with an EPSS less than 1 %. The flaw is not listed in the CISA KEV catalog. The most likely way to trigger the issue is through a malicious RedBoot partition table encountered during system boot, which would require control over the firmware image or the boot environment. Successful exploitation would result in a kernel crash and complete loss of service, rather than data compromise or privilege escalation.
OpenCVE Enrichment