Zero Day MonitorZDM
DashboardVulnerabilitiesTrendingZero-DaysNewsAbout
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
1817 articles · 103958 vulns · 38/41 feeds (7d)
← Back to list
—
CVE-2026-23474EXPLOITEDPATCHED
linux · linux kernel

mtd: Avoid boot crash in RedBoot partition table parser

Description

In the Linux kernel, the following vulnerability has been resolved: mtd: Avoid boot crash in RedBoot partition table parser Given CONFIG_FORTIFY_SOURCE=y and a recent compiler, commit 439a1bcac648 ("fortify: Use __builtin_dynamic_object_size() when available") produces the warning below and an oops. Searching for RedBoot partition table in 50000000.flash at offset 0x7e0000 ------------[ cut here ]------------ WARNING: lib/string_helpers.c:1035 at 0xc029e04c, CPU#0: swapper/0/1 memcmp: detected buffer overflow: 15 byte read of buffer size 14 Modules linked in: CPU: 0 UID: 0 PID: 1 Comm: swapper/0 Not tainted 6.19.0 #1 NONE As Kees said, "'names' is pointing to the final 'namelen' many bytes of the allocation ... 'namelen' could be basically any length at all. This fortify warning looks legit to me -- this code used to be reading beyond the end of the allocation." Since the size of the dynamic allocation is calculated with strlen() we can use strcmp() instead of memcmp() and remain within bounds.

Affected Products

VendorProductVersions
linuxlinux kernel1da177e4c3f41524e886b7f1b8a0c1fc7321cac2, 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2, 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2, 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2, 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2, 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2, 2.6.12, 7.0-rc4

References

  • https://git.kernel.org/stable/c/0b08be5aca212a99f8ba786fee4922feac08002c
  • https://git.kernel.org/stable/c/d8570211a2b1ec886a462daa0be4e9983ac768bb
  • https://git.kernel.org/stable/c/2025b2d1f9d5cad6ea6fe85654c6c41297c3130b
  • https://git.kernel.org/stable/c/c4054ad2d8bff4e8e937cd4a1d1a04c1e8f77a2c
  • https://git.kernel.org/stable/c/75a4d8cfe7784f909b3bd69325abac8e04ecb385
  • https://git.kernel.org/stable/c/8e2f8020270af7777d49c2e7132260983e4fc566

Related News (2 articles)

Tier C
VulDB7h ago
CVE-2026-23474 | Linux Kernel up to 7.0-rc4 mtd __builtin_dynamic_object_size buffer overflow
→ No new info (linked only)
Tier C
Linux Kernel CVEs7h ago
CVE-2026-23474: mtd: Avoid boot crash in RedBoot partition table parser
→ No new info (linked only)
CISA KEV❌ No
Actively exploited✅ Yes
Patch available
0b08be5aca212a99f8ba786fee4922feac08002cd8570211a2b1ec886a462daa0be4e9983ac768bb2025b2d1f9d5cad6ea6fe85654c6c41297c3130bc4054ad2d8bff4e8e937cd4a1d1a04c1e8f77a2c75a4d8cfe7784f909b3bd69325abac8e04ecb3858e2f8020270af7777d49c2e7132260983e4fc56606.1.1676.6.1306.12.786.18.206.19.107.0-rc5
PublishedApr 3, 2026
Last enriched6h agov2
Trending Score59
Source articles2
Independent2
Info Completeness7/14
Missing: cvss, epss, cwe, kev, exploit, iocs, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Related CVEs (5)

CRITICALCVE-2026-31393EXP
Bluetooth: L2CAP: Validate L2CAP_INFO_RSP payload length before access
Trending: 59
CRITICALCVE-2026-31397EXP
mm/huge_memory: fix use of NULL folio in move_pages_huge_pmd()
Trending: 59
CRITICALCVE-2026-23463EXP
soc: fsl: qbman: fix race condition in qman_destroy_fq
Trending: 59
CRITICALCVE-2026-23438EXP
net: mvpp2: guard flow control update with global_tx_fc in buffer switching
Trending: 59
CRITICALCVE-2026-23449EXP
net/sched: teql: Fix double-free in teql_master_xmit
Trending: 59

Pin to Dashboard

Verification

State: unverified
Confidence: 0%

Vulnerability Timeline

CVE Published
Apr 3, 2026
Actively Exploited
Apr 3, 2026
Patch Available
Apr 3, 2026
Discovered by ZDM
Apr 3, 2026
Updated: severity, affectedVersions, activelyExploited
Apr 3, 2026

Version History

v2
Last enriched 6h ago
v2Tier C6h ago

Updated severity to CRITICAL, added affected version 7.0-rc4, and noted that no exploit is available.

severityaffectedVersionsactivelyExploited
via VulDB
v17h ago

Initial creation