CVE-2024-42301Improper Validation of Array Index in Linux

Severity
7.8HIGHNVD
OSV8.8OSV7.1OSV5.5
EPSS
0.0%
top 94.06%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedAug 17
Latest updateJun 9

Description

In the Linux kernel, the following vulnerability has been resolved: dev/parport: fix the array out-of-bounds risk Fixed array out-of-bounds issues caused by sprintf by replacing it with snprintf for safer data copying, ensuring the destination buffer is not overflowed. Below is the stack trace I encountered during the actual issue: [ 66.575408s] [pid:5118,cpu4,QThread,4]Kernel panic - not syncing: stack-protector: Kernel stack is corrupted in: do_hardware_base_addr+0xcc/0xd0 [parport] [ 66.5

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages14 packages

Patches

🔴Vulnerability Details

27
OSV
linux-azure, linux-azure-4.15 vulnerabilities2025-06-09
OSV
linux-azure-fips vulnerabilities2025-06-09
OSV
linux-azure vulnerabilities2025-06-09
OSV
linux-fips vulnerabilities2025-06-06
OSV
linux-aws, linux-lts-xenial vulnerabilities2025-06-04

📋Vendor Advisories

28
Ubuntu
Linux kernel (Azure) vulnerabilities2025-06-09
Ubuntu
Linux kernel (Azure FIPS) vulnerabilities2025-06-09
Ubuntu
Linux kernel (Azure) vulnerabilities2025-06-09
Ubuntu
Linux kernel (FIPS) vulnerabilities2025-06-06
Ubuntu
Linux kernel (FIPS) vulnerabilities2025-06-04
CVE-2024-42301 — Improper Validation of Array Index | cvebase