U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

CVE-2024-26994 Detail

Description

In the Linux kernel, the following vulnerability has been resolved: speakup: Avoid crash on very long word In case a console is set up really large and contains a really long word (> 256 characters), we have to stop before the length of the word buffer.


Metrics

NVD enrichment efforts reference publicly available information to associate vector strings. CVSS information contributed by other sources is also displayed.
CVSS 4.0 Severity and Vector Strings:

NIST CVSS score
NIST: NVD
N/A
NVD assessment not yet provided.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

Hyperlink Resource
https://git.kernel.org/stable/c/0d130158db29f5e0b3893154908cf618896450a8
https://git.kernel.org/stable/c/0d130158db29f5e0b3893154908cf618896450a8
https://git.kernel.org/stable/c/0efb15c14c493263cb3a5f65f5ddfd4603d19a76
https://git.kernel.org/stable/c/0efb15c14c493263cb3a5f65f5ddfd4603d19a76
https://git.kernel.org/stable/c/6401038acfa24cba9c28cce410b7505efadd0222
https://git.kernel.org/stable/c/6401038acfa24cba9c28cce410b7505efadd0222
https://git.kernel.org/stable/c/756c5cb7c09e537b87b5d3acafcb101b2ccf394f
https://git.kernel.org/stable/c/756c5cb7c09e537b87b5d3acafcb101b2ccf394f
https://git.kernel.org/stable/c/89af25bd4b4bf6a71295f07e07a8ae7dc03c6595
https://git.kernel.org/stable/c/89af25bd4b4bf6a71295f07e07a8ae7dc03c6595
https://git.kernel.org/stable/c/8defb1d22ba0395b81feb963b96e252b097ba76f
https://git.kernel.org/stable/c/8defb1d22ba0395b81feb963b96e252b097ba76f
https://git.kernel.org/stable/c/8f6b62125befe1675446923e4171eac2c012959c
https://git.kernel.org/stable/c/8f6b62125befe1675446923e4171eac2c012959c
https://git.kernel.org/stable/c/c8d2f34ea96ea3bce6ba2535f867f0d4ee3b22e1
https://git.kernel.org/stable/c/c8d2f34ea96ea3bce6ba2535f867f0d4ee3b22e1
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html

Weakness Enumeration

CWE-ID CWE Name Source

Change History

10 change records found show changes

Quick Info

CVE Dictionary Entry:
CVE-2024-26994
NVD Published Date:
05/01/2024
NVD Last Modified:
11/21/2024
Source:
kernel.org