CVE-2024-50074

high

Description

In the Linux kernel, the following vulnerability has been resolved: parport: Proper fix for array out-of-bounds access The recent fix for array out-of-bounds accesses replaced sprintf() calls blindly with snprintf(). However, since snprintf() returns the would-be-printed size, not the actually output size, the length calculation can still go over the given limit. Use scnprintf() instead of snprintf(), which returns the actually output letters, for addressing the potential out-of-bounds access properly.

References

https://git.kernel.org/stable/c/fca048f222ce9dcbde5708ba2bf81d85a4a27952

https://git.kernel.org/stable/c/b0641e53e6cb937487b6cfb15772374f0ba149b3

https://git.kernel.org/stable/c/8aadef73ba3b325704ed5cfc4696a25c350182cf

https://git.kernel.org/stable/c/66029078fee00646e2e9dbb8f41ff7819f8e7569

https://git.kernel.org/stable/c/440311903231c6e6c9bcf8acb6a2885a422e00bc

https://git.kernel.org/stable/c/2a8b26a09c8e3ea03da1ef3cd0ef6b96e559fba6

https://git.kernel.org/stable/c/1826b6d69bbb7f9ae8711827facbb2ad7f8d0aaa

https://git.kernel.org/stable/c/02ac3a9ef3a18b58d8f3ea2b6e46de657bf6c4f9

Details

Source: Mitre, NVD

Published: 2024-10-29

Updated: 2024-11-08

Risk Information

CVSS v2

Base Score: 6.8

Vector: CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:C

Severity: Medium

CVSS v3

Base Score: 7.8

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Severity: High