init/main.c: Fix potential static_command_line memory overflow
Summary
| CVE | CVE-2024-26988 |
|---|---|
| State | PUBLISHED |
| Assigner | Linux |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2024-05-01 06:15:16 UTC |
| Updated | 2026-05-12 12:16:29 UTC |
| Description | In the Linux kernel, the following vulnerability has been resolved: init/main.c: Fix potential static_command_line memory overflow We allocate memory of size 'xlen + strlen(boot_command_line) + 1' for static_command_line, but the strings copied into static_command_line are extra_command_line and command_line, rather than extra_command_line and boot_command_line. When strlen(command_line) > strlen(boot_command_line), static_command_line will overflow. This patch just recovers strlen(command_line) which was miss-consolidated with strlen(boot_command_line) in the commit f5c7310ac73e ("init/main: add checks for the return value of memblock_alloc*()") |
Risk And Classification
Primary CVSS: v3.1 7.8 HIGH from [email protected]
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Problem Types: CWE-787
CVSS v3.1 Breakdown
Attack Vector
LocalAttack Complexity
LowPrivileges Required
LowUser Interaction
NoneScope
UnchangedConfidentiality
HighIntegrity
HighAvailability
HighCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Operating System | Linux | Linux Kernel | All | All | All | All |
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|---|---|---|---|
| CNA | Linux | Linux | affected f5c7310ac73ea270e3a1acdb73d1b4817f11fd67 2ef607ea103616aec0289f1b65d103d499fa903a git | Not specified |
| CNA | Linux | Linux | affected f5c7310ac73ea270e3a1acdb73d1b4817f11fd67 0dc727a4e05400205358a22c3d01ccad2c8e1fe4 git | Not specified |
| CNA | Linux | Linux | affected f5c7310ac73ea270e3a1acdb73d1b4817f11fd67 76c2f4d426a5358fced5d5990744d46f10a4ccea git | Not specified |
| CNA | Linux | Linux | affected f5c7310ac73ea270e3a1acdb73d1b4817f11fd67 81cf85ae4f2dd5fa3e43021782aa72c4c85558e8 git | Not specified |
| CNA | Linux | Linux | affected f5c7310ac73ea270e3a1acdb73d1b4817f11fd67 936a02b5a9630c5beb0353c3085cc49d86c57034 git | Not specified |
| CNA | Linux | Linux | affected f5c7310ac73ea270e3a1acdb73d1b4817f11fd67 46dad3c1e57897ab9228332f03e1c14798d2d3b9 git | Not specified |
| CNA | Linux | Linux | affected 5.1 | Not specified |
| CNA | Linux | Linux | unaffected 5.1 semver | Not specified |
| CNA | Linux | Linux | unaffected 5.10.216 5.10.* semver | Not specified |
| CNA | Linux | Linux | unaffected 5.15.157 5.15.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.1.88 6.1.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.6.29 6.6.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.8.8 6.8.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.9 * original_commit_for_fix | Not specified |
| ADP | Siemens | RUGGEDCOM RST2428P | affected V3.1 custom | Not specified |
| ADP | Siemens | SCALANCE XC-300/XR-300/XC-400/XR-500WG/XR-500 Family | unaffected * custom | Not specified |
| ADP | Siemens | SCALANCE XCM-/XRM-/XCH-/XRH-300 Family | affected V3.1 custom | Not specified |
| ADP | Siemens | SIMATIC S7-1500 TM MFP - GNU/Linux Subsystem | affected * custom | Not specified |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| git.kernel.org/stable/c/46dad3c1e57897ab9228332f03e1c14798d2d3b9 | af854a3a-2127-422b-91ae-364da2661108 | git.kernel.org | Patch |
| lists.debian.org/debian-lts-announce/2024/06/msg00017.html | af854a3a-2127-422b-91ae-364da2661108 | lists.debian.org | Mailing List, Third Party Advisory |
| git.kernel.org/stable/c/76c2f4d426a5358fced5d5990744d46f10a4ccea | af854a3a-2127-422b-91ae-364da2661108 | git.kernel.org | Patch |
| lists.fedoraproject.org/archives/list/[email protected]/messag... | af854a3a-2127-422b-91ae-364da2661108 | lists.fedoraproject.org | Mailing List, Third Party Advisory |
| cert-portal.siemens.com/productcert/html/ssa-265688.html | 0b142b55-0307-4c5a-b3c9-f314f3fb7c5e | cert-portal.siemens.com | |
| git.kernel.org/stable/c/2ef607ea103616aec0289f1b65d103d499fa903a | af854a3a-2127-422b-91ae-364da2661108 | git.kernel.org | Patch |
| git.kernel.org/stable/c/81cf85ae4f2dd5fa3e43021782aa72c4c85558e8 | af854a3a-2127-422b-91ae-364da2661108 | git.kernel.org | Patch |
| lists.fedoraproject.org/archives/list/[email protected]/messag... | af854a3a-2127-422b-91ae-364da2661108 | lists.fedoraproject.org | Mailing List, Third Party Advisory |
| cert-portal.siemens.com/productcert/html/ssa-613116.html | 0b142b55-0307-4c5a-b3c9-f314f3fb7c5e | cert-portal.siemens.com | |
| git.kernel.org/stable/c/0dc727a4e05400205358a22c3d01ccad2c8e1fe4 | af854a3a-2127-422b-91ae-364da2661108 | git.kernel.org | Patch |
| lists.fedoraproject.org/archives/list/[email protected]/messag... | af854a3a-2127-422b-91ae-364da2661108 | lists.fedoraproject.org | Mailing List, Third Party Advisory |
| git.kernel.org/stable/c/936a02b5a9630c5beb0353c3085cc49d86c57034 | af854a3a-2127-422b-91ae-364da2661108 | git.kernel.org | Patch |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.