CVE-2024-26994

NameCVE-2024-26994
DescriptionIn the Linux kernel, the following vulnerability has been resolved: speakup: Avoid crash on very long word In case a console is set up really large and contains a really long word (> 256 characters), we have to stop before the length of the word buffer.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDSA-5680-1, DSA-5681-1, ELA-1093-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
linux (PTS)jessie, jessie (lts)3.16.84-1vulnerable
stretch (security)4.9.320-2vulnerable
stretch (lts), stretch4.9.320-3vulnerable
buster4.19.249-2vulnerable
buster (security)4.19.304-1vulnerable
bullseye5.10.209-2vulnerable
bullseye (security)5.10.216-1fixed
bookworm6.1.76-1vulnerable
bookworm (security)6.1.90-1fixed
trixie6.7.12-1vulnerable
sid6.8.9-1fixed
linux-5.10 (PTS)jessie, jessie (lts)5.10.216-1~deb8u1fixed
stretch (lts), stretch5.10.216-1~deb9u1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
linuxsourcejessie(unfixed)end-of-life
linuxsourcestretch(unfixed)end-of-life
linuxsourcebullseye5.10.216-1DSA-5681-1
linuxsourcebookworm6.1.90-1DSA-5680-1
linuxsource(unstable)6.8.9-1
linux-5.10sourcejessie5.10.216-1~deb8u1ELA-1093-1
linux-5.10sourcestretch5.10.216-1~deb9u1ELA-1093-1

Notes

https://git.kernel.org/linus/c8d2f34ea96ea3bce6ba2535f867f0d4ee3b22e1 (6.9-rc5)

Search for package or bug name: Reporting problems