CVE-2024-50180
fbdev: sisfb: Fix strbuf array overflow
CVSS Score
7.8
EPSS Score
0.0%
EPSS Percentile
0th
In the Linux kernel, the following vulnerability has been resolved: fbdev: sisfb: Fix strbuf array overflow The values of the variables xres and yres are placed in strbuf. These variables are obtained from strbuf1. The strbuf1 array contains digit characters and a space if the array contains non-digit characters. Then, when executing sprintf(strbuf, "%ux%ux8", xres, yres); more than 16 bytes will be written to strbuf. It is suggested to increase the size of the strbuf array to 24. Found by Linux Verification Center (linuxtesting.org) with SVACE.
| Vendor | linux |
| Product | linux |
| Ecosystems | |
| Industries | Technology |
| Published | Nov 8, 2024 |
| Last Updated | May 11, 2026 |
Stay Ahead of the Next One
Get instant alerts for linux linux
Be the first to know when new high vulnerabilities affecting linux linux are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
Linux / Linux
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 433c84c8495008922534c5cafdae6ff970fb3241 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 57c4f4db0a194416da237fd09dad9527e00cb587 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 252f147b1826cbb30ae0304cf86b66d3bb12b743 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 41cf6f26abe4f491b694c54bd1aa2530369b7510 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 889304120ecb2ca30674d89cd4ef15990b6a571c 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 688872c4ea4a528cd6a057d545c83506b533ee1f 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 11c0d49093b82f6c547fd419c41a982d26bdf5ef 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 9cf14f5a2746c19455ce9cb44341b5527b5e19c3
Linux / Linux
2.6.12
References
git.kernel.org: https://git.kernel.org/stable/c/433c84c8495008922534c5cafdae6ff970fb3241 git.kernel.org: https://git.kernel.org/stable/c/57c4f4db0a194416da237fd09dad9527e00cb587 git.kernel.org: https://git.kernel.org/stable/c/252f147b1826cbb30ae0304cf86b66d3bb12b743 git.kernel.org: https://git.kernel.org/stable/c/41cf6f26abe4f491b694c54bd1aa2530369b7510 git.kernel.org: https://git.kernel.org/stable/c/889304120ecb2ca30674d89cd4ef15990b6a571c git.kernel.org: https://git.kernel.org/stable/c/688872c4ea4a528cd6a057d545c83506b533ee1f git.kernel.org: https://git.kernel.org/stable/c/11c0d49093b82f6c547fd419c41a982d26bdf5ef git.kernel.org: https://git.kernel.org/stable/c/9cf14f5a2746c19455ce9cb44341b5527b5e19c3 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html