CVE-2024-26818

In the Linux kernel, the following vulnerability has been resolved: tools/rtla: Fix clang warning about mount_point var size clang is reporting this warning: $ make HOSTCC=clang CC=clang LLVM_IAS=1 [...] clang -O -g -DVERSION=\"6.8.0-rc3\" -flto=auto -fexceptions -fstack-protector-strong -fasynchronous-unwind-tables -fstack-clash-protection -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS $(pkg-config --cflags libtracefs) -c -o src/utils.o src/utils.c src/utils.c:548:66: warning: 'fscanf' may overflow; destination buffer in argument 3 has size 1024, but the corresponding specifier may require size 1025 [-Wfortify-source] 548 | while (fscanf(fp, "%*s %" STR(MAX_PATH) "s %99s %*s %*d %*d\n", mount_point, type) == 2) { | ^ Increase mount_point variable size to MAX_PATH+1 to avoid the overflow.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:*

History

27 Mar 2025, 21:07

Type Values Removed Values Added
CWE NVD-CWE-noinfo
First Time Linux
Linux linux Kernel
CPE cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
References () https://git.kernel.org/stable/c/30369084ac6e27479a347899e74f523e6ca29b89 - () https://git.kernel.org/stable/c/30369084ac6e27479a347899e74f523e6ca29b89 - Patch
References () https://git.kernel.org/stable/c/6bdd43f62ab3bb5a306af7f0ab857af45777f5a8 - () https://git.kernel.org/stable/c/6bdd43f62ab3bb5a306af7f0ab857af45777f5a8 - Patch
References () https://git.kernel.org/stable/c/8a585914c266dc044f53b5c83c170f79b45fcf9a - () https://git.kernel.org/stable/c/8a585914c266dc044f53b5c83c170f79b45fcf9a - Patch

21 Nov 2024, 09:03

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: herramientas/rtla: Repare la advertencia de clang sobre el tamaño de var de mount_point clang informa esta advertencia: $ make HOSTCC=clang CC=clang LLVM_IAS=1 [...] clang -O -g -DVERSION=\"6.8.0-rc3\" -flto=auto -fExceptions -fstack-protector-strong -fasynchronous-unwind-tables -fstack-clash-protection -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE= 2 -Wp,-D_GLIBCXX_ASSERTIONS $(pkg-config --cflags libtracefs) -c -o src/utils.o src/utils.c src/utils.c:548:66: advertencia: 'fscanf' puede desbordarse; el búfer de destino en el argumento 3 tiene un tamaño 1024, pero el especificador correspondiente puede requerir un tamaño 1025 [-Wfortify-source] 548 | while (fscanf(fp, "%*s %" STR(MAX_PATH) "s %99s %*s %*d %*d\n", punto_montaje, tipo) == 2) { | ^ Aumente el tamaño de la variable mount_point a MAX_PATH+1 para evitar el desbordamiento.
References () https://git.kernel.org/stable/c/30369084ac6e27479a347899e74f523e6ca29b89 - () https://git.kernel.org/stable/c/30369084ac6e27479a347899e74f523e6ca29b89 -
References () https://git.kernel.org/stable/c/6bdd43f62ab3bb5a306af7f0ab857af45777f5a8 - () https://git.kernel.org/stable/c/6bdd43f62ab3bb5a306af7f0ab857af45777f5a8 -
References () https://git.kernel.org/stable/c/8a585914c266dc044f53b5c83c170f79b45fcf9a - () https://git.kernel.org/stable/c/8a585914c266dc044f53b5c83c170f79b45fcf9a -

17 Apr 2024, 10:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-04-17 10:15

Updated : 2025-03-27 21:07


NVD link : CVE-2024-26818

Mitre link : CVE-2024-26818

CVE.ORG link : CVE-2024-26818


JSON object : View

Products Affected

linux

  • linux_kernel