First published: Fri Nov 08 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: fbdev: sisfb: Fix strbuf array overflow The values of the variables xres and yres are placed in strbuf. These variables are obtained from strbuf1. The strbuf1 array contains digit characters and a space if the array contains non-digit characters. Then, when executing sprintf(strbuf, "%ux%ux8", xres, yres); more than 16 bytes will be written to strbuf. It is suggested to increase the size of the strbuf array to 24. Found by Linux Verification Center (linuxtesting.org) with SVACE.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | <4.19.323 | |
Linux Kernel | >=4.20<5.4.285 | |
Linux Kernel | >=5.5<5.10.227 | |
Linux Kernel | >=5.11<5.15.168 | |
Linux Kernel | >=5.16<6.1.113 | |
Linux Kernel | >=6.2<6.6.57 | |
Linux Kernel | >=6.7<6.11.4 | |
debian/linux | <=5.10.223-1<=5.10.226-1 | 6.1.123-1 6.1.128-1 6.12.12-1 6.12.15-1 |
debian/linux-6.1 | 6.1.119-1~deb11u1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-50180 has been classified with a moderate severity due to potential exploitation enabling information leakage.
To resolve CVE-2024-50180, upgrading to the latest kernel versions that include the fix is required.
CVE-2024-50180 affects Linux kernel versions prior to 4.19.323 and versions between 4.20 and 6.2, as well as various other specific versions.
CVE-2024-50180 is categorized as a buffer overflow vulnerability in the fbdev subsystem of the Linux kernel.
As of now, there are no known public exploits actively targeting CVE-2024-50180.