Description
In the Linux kernel, the following vulnerability has been resolved: parport: Proper fix for array out-of-bounds access The recent fix for array out-of-bounds accesses replaced sprintf() calls blindly with snprintf(). However, since snprintf() returns the would-be-printed size, not the actually output size, the length calculation can still go over the given limit. Use scnprintf() instead of snprintf(), which returns the actually output letters, for addressing the potential out-of-bounds access properly.
References (10)
Core 10
Core References
Scores
CVSS v3
7.8
EPSS
0.0002
EPSS Percentile
6.1%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-125
Status
published
Products (11)
linux/Kernel
< 4.19.323linux
linux/Kernel
4.20.0 - 5.4.285linux
linux/Kernel
5.11.0 - 5.15.169linux
linux/Kernel
5.16.0 - 6.1.114linux
linux/Kernel
5.5.0 - 5.10.228linux
linux/Kernel
6.2.0 - 6.6.58linux
linux/Kernel
6.7.0 - 6.11.5linux
linux/linux_kernel
6.12 rc1 (3 CPE variants)
linux/linux_kernel
5.10.224 - 5.10.228
redhat/enterprise_linux
8.0
... and 1 more
Published
Oct 29, 2024
Tracked Since
Feb 18, 2026