U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

CVE-2024-26988 Detail

Description

In the Linux kernel, the following vulnerability has been resolved: init/main.c: Fix potential static_command_line memory overflow We allocate memory of size 'xlen + strlen(boot_command_line) + 1' for static_command_line, but the strings copied into static_command_line are extra_command_line and command_line, rather than extra_command_line and boot_command_line. When strlen(command_line) > strlen(boot_command_line), static_command_line will overflow. This patch just recovers strlen(command_line) which was miss-consolidated with strlen(boot_command_line) in the commit f5c7310ac73e ("init/main: add checks for the return value of memblock_alloc*()")


Metrics

NVD enrichment efforts reference publicly available information to associate vector strings. CVSS information contributed by other sources is also displayed.
CVSS 4.0 Severity and Vector Strings:

NIST CVSS score
NIST: NVD
N/A
NVD assessment not yet provided.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

Hyperlink Resource
https://git.kernel.org/stable/c/0dc727a4e05400205358a22c3d01ccad2c8e1fe4
https://git.kernel.org/stable/c/0dc727a4e05400205358a22c3d01ccad2c8e1fe4
https://git.kernel.org/stable/c/2ef607ea103616aec0289f1b65d103d499fa903a
https://git.kernel.org/stable/c/2ef607ea103616aec0289f1b65d103d499fa903a
https://git.kernel.org/stable/c/46dad3c1e57897ab9228332f03e1c14798d2d3b9
https://git.kernel.org/stable/c/46dad3c1e57897ab9228332f03e1c14798d2d3b9
https://git.kernel.org/stable/c/76c2f4d426a5358fced5d5990744d46f10a4ccea
https://git.kernel.org/stable/c/76c2f4d426a5358fced5d5990744d46f10a4ccea
https://git.kernel.org/stable/c/81cf85ae4f2dd5fa3e43021782aa72c4c85558e8
https://git.kernel.org/stable/c/81cf85ae4f2dd5fa3e43021782aa72c4c85558e8
https://git.kernel.org/stable/c/936a02b5a9630c5beb0353c3085cc49d86c57034
https://git.kernel.org/stable/c/936a02b5a9630c5beb0353c3085cc49d86c57034
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html

Weakness Enumeration

CWE-ID CWE Name Source

Change History

8 change records found show changes

Quick Info

CVE Dictionary Entry:
CVE-2024-26988
NVD Published Date:
05/01/2024
NVD Last Modified:
11/21/2024
Source:
kernel.org