CVE-2024-50074
parport: Proper fix for array out-of-bounds access
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
In the Linux kernel, the following vulnerability has been resolved: parport: Proper fix for array out-of-bounds access The recent fix for array out-of-bounds accesses replaced sprintf() calls blindly with snprintf(). However, since snprintf() returns the would-be-printed size, not the actually output size, the length calculation can still go over the given limit. Use scnprintf() instead of snprintf(), which returns the actually output letters, for addressing the potential out-of-bounds access properly.
| Vendor | linux |
| Product | linux |
| Ecosystems | |
| Industries | Technology |
| Published | Oct 29, 2024 |
| Last Updated | May 11, 2026 |
Stay Ahead of the Next One
Get instant alerts for linux linux
Be the first to know when new unknown vulnerabilities affecting linux linux are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
Linux / Linux
166a0bddcc27de41fe13f861c8348e8e53e988c8 < 8aadef73ba3b325704ed5cfc4696a25c350182cf 47b3dce100778001cd76f7e9188944b5cb27a76d < b0641e53e6cb937487b6cfb15772374f0ba149b3 a44f88f7576bc1916d8d6293f5c62fbe7cbe03e0 < 1826b6d69bbb7f9ae8711827facbb2ad7f8d0aaa c719b393374d3763e64900ee19aaed767d5a08d6 < 440311903231c6e6c9bcf8acb6a2885a422e00bc 7f4da759092a1a6ce35fb085182d02de8cc4cc84 < fca048f222ce9dcbde5708ba2bf81d85a4a27952 b579ea3516c371ecf59d073772bc45dfd28c8a0e < 66029078fee00646e2e9dbb8f41ff7819f8e7569 ab11dac93d2d568d151b1918d7b84c2d02bacbd5 < 2a8b26a09c8e3ea03da1ef3cd0ef6b96e559fba6 ab11dac93d2d568d151b1918d7b84c2d02bacbd5 < 02ac3a9ef3a18b58d8f3ea2b6e46de657bf6c4f9 7789a1d6792af410aa9b39a1eb237ed24fa2170a
Linux / Linux
6.11
References
git.kernel.org: https://git.kernel.org/stable/c/8aadef73ba3b325704ed5cfc4696a25c350182cf git.kernel.org: https://git.kernel.org/stable/c/b0641e53e6cb937487b6cfb15772374f0ba149b3 git.kernel.org: https://git.kernel.org/stable/c/1826b6d69bbb7f9ae8711827facbb2ad7f8d0aaa git.kernel.org: https://git.kernel.org/stable/c/440311903231c6e6c9bcf8acb6a2885a422e00bc git.kernel.org: https://git.kernel.org/stable/c/fca048f222ce9dcbde5708ba2bf81d85a4a27952 git.kernel.org: https://git.kernel.org/stable/c/66029078fee00646e2e9dbb8f41ff7819f8e7569 git.kernel.org: https://git.kernel.org/stable/c/2a8b26a09c8e3ea03da1ef3cd0ef6b96e559fba6 git.kernel.org: https://git.kernel.org/stable/c/02ac3a9ef3a18b58d8f3ea2b6e46de657bf6c4f9 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html