In the Linux kernel, the following vulnerability has been resolved:
tools/rtla: Fix clang warning about mount_point var size
clang is reporting this warning:
$ make HOSTCC=clang CC=clang LLVMIAS=1 [...] clang -O -g -DVERSION=\"6.8.0-rc3\" -flto=auto -fexceptions -fstack-protector-strong -fasynchronous-unwind-tables -fstack-clash-protection -Wall -Werror=format-security -Wp,-DFORTIFYSOURCE=2 -Wp,-DGLIBCXX_ASSERTIONS $(pkg-config --cflags libtracefs) -c -o src/utils.o src/utils.c
src/utils.c:548:66: warning: 'fscanf' may overflow; destination buffer in argument 3 has size 1024, but the corresponding specifier may require size 1025 [-Wfortify-source] 548 | while (fscanf(fp, "%s %" STR(MAX_PATH) "s %99s %s %d %d\n", mount_point, type) == 2) { | ^
Increase mountpoint variable size to MAXPATH+1 to avoid the overflow.
{ "vanir_signatures": [ { "deprecated": false, "signature_type": "Line", "target": { "file": "tools/tracing/rtla/src/utils.c" }, "id": "CVE-2024-26818-0337bb42", "digest": { "line_hashes": [ "22526265602848362682354452137656047307", "188350348678734391207974353483375435395", "85123579684793366689355599721104352370", "144996002307634676690766188255648969794" ], "threshold": 0.9 }, "signature_version": "v1", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@8a585914c266dc044f53b5c83c170f79b45fcf9a" }, { "deprecated": false, "signature_type": "Line", "target": { "file": "tools/tracing/rtla/src/utils.c" }, "id": "CVE-2024-26818-27cbc25b", "digest": { "line_hashes": [ "22526265602848362682354452137656047307", "188350348678734391207974353483375435395", "85123579684793366689355599721104352370", "144996002307634676690766188255648969794" ], "threshold": 0.9 }, "signature_version": "v1", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@6bdd43f62ab3bb5a306af7f0ab857af45777f5a8" }, { "deprecated": false, "signature_type": "Line", "target": { "file": "tools/tracing/rtla/src/utils.c" }, "id": "CVE-2024-26818-6d8fdb94", "digest": { "line_hashes": [ "22526265602848362682354452137656047307", "188350348678734391207974353483375435395", "85123579684793366689355599721104352370", "144996002307634676690766188255648969794" ], "threshold": 0.9 }, "signature_version": "v1", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@30369084ac6e27479a347899e74f523e6ca29b89" }, { "deprecated": false, "signature_type": "Function", "target": { "file": "tools/tracing/rtla/src/utils.c", "function": "find_mount" }, "id": "CVE-2024-26818-ec842623", "digest": { "length": 560.0, "function_hash": "13241580211198212206139571968298185097" }, "signature_version": "v1", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@8a585914c266dc044f53b5c83c170f79b45fcf9a" }, { "deprecated": false, "signature_type": "Function", "target": { "file": "tools/tracing/rtla/src/utils.c", "function": "find_mount" }, "id": "CVE-2024-26818-f3706105", "digest": { "length": 560.0, "function_hash": "13241580211198212206139571968298185097" }, "signature_version": "v1", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@6bdd43f62ab3bb5a306af7f0ab857af45777f5a8" }, { "deprecated": false, "signature_type": "Function", "target": { "file": "tools/tracing/rtla/src/utils.c", "function": "find_mount" }, "id": "CVE-2024-26818-ffc6d5d2", "digest": { "length": 560.0, "function_hash": "13241580211198212206139571968298185097" }, "signature_version": "v1", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@30369084ac6e27479a347899e74f523e6ca29b89" } ] }