
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2024-50074 is a vulnerability discovered in the Linux kernel's parport driver that involves an array out-of-bounds access issue. The vulnerability was disclosed on October 28, 2024, and affects multiple versions of the Linux kernel. The issue stems from improper handling of buffer length calculations when using snprintf() function calls (NVD).
The vulnerability occurs in the parport driver's procfs implementation where snprintf() was used to replace sprintf() calls. The issue arises because snprintf() returns the would-be-printed size rather than the actual output size, which can lead to length calculations exceeding the given buffer limits. The vulnerability has been assigned a CVSS v3.1 base score of 7.8 (HIGH) with vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H, indicating local access requirements but high potential impact (NVD).
The vulnerability could potentially lead to array out-of-bounds access in the Linux kernel's parport driver, which could result in memory corruption. This could affect system stability and potentially lead to privilege escalation, information disclosure, or system crashes (NVD).
The vulnerability has been fixed by replacing snprintf() with scnprintf(), which returns the actual number of characters written to the buffer. The fix has been implemented through patches in various kernel versions. System administrators should update their Linux kernel to the latest patched version that includes this fix (Kernel Patch).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."