{"id":"CVE-2024-42301","summary":"dev/parport: fix the array out-of-bounds risk","details":"In the Linux kernel, the following vulnerability has been resolved:\n\ndev/parport: fix the array out-of-bounds risk\n\nFixed array out-of-bounds issues caused by sprintf\nby replacing it with snprintf for safer data copying,\nensuring the destination buffer is not overflowed.\n\nBelow is the stack trace I encountered during the actual issue:\n\n[ 66.575408s] [pid:5118,cpu4,QThread,4]Kernel panic - not syncing: stack-protector:\nKernel stack is corrupted in: do_hardware_base_addr+0xcc/0xd0 [parport]\n[ 66.575408s] [pid:5118,cpu4,QThread,5]CPU: 4 PID: 5118 Comm:\nQThread Tainted: G S W O 5.10.97-arm64-desktop #7100.57021.2\n[ 66.575439s] [pid:5118,cpu4,QThread,6]TGID: 5087 Comm: EFileApp\n[ 66.575439s] [pid:5118,cpu4,QThread,7]Hardware name: HUAWEI HUAWEI QingYun\nPGUX-W515x-B081/SP1PANGUXM, BIOS 1.00.07 04/29/2024\n[ 66.575439s] [pid:5118,cpu4,QThread,8]Call trace:\n[ 66.575469s] [pid:5118,cpu4,QThread,9] dump_backtrace+0x0/0x1c0\n[ 66.575469s] [pid:5118,cpu4,QThread,0] show_stack+0x14/0x20\n[ 66.575469s] [pid:5118,cpu4,QThread,1] dump_stack+0xd4/0x10c\n[ 66.575500s] [pid:5118,cpu4,QThread,2] panic+0x1d8/0x3bc\n[ 66.575500s] [pid:5118,cpu4,QThread,3] __stack_chk_fail+0x2c/0x38\n[ 66.575500s] [pid:5118,cpu4,QThread,4] do_hardware_base_addr+0xcc/0xd0 [parport]","modified":"2026-04-16T04:37:18.756246721Z","published":"2024-08-17T09:09:08.057Z","related":["ALSA-2024:8856","ALSA-2024:8870","SUSE-SU-2024:3189-1","SUSE-SU-2024:3190-1","SUSE-SU-2024:3194-1","SUSE-SU-2024:3195-1","SUSE-SU-2024:3209-1","SUSE-SU-2024:3251-1","SUSE-SU-2024:3252-1","SUSE-SU-2024:3383-1","SUSE-SU-2024:3483-1","SUSE-SU-2024:3547-1","SUSE-SU-2024:3563-1","SUSE-SU-2025:20044-1","SUSE-SU-2025:20047-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/42xxx/CVE-2024-42301.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/166a0bddcc27de41fe13f861c8348e8e53e988c8"},{"type":"WEB","url":"https://git.kernel.org/stable/c/47b3dce100778001cd76f7e9188944b5cb27a76d"},{"type":"WEB","url":"https://git.kernel.org/stable/c/7789a1d6792af410aa9b39a1eb237ed24fa2170a"},{"type":"WEB","url":"https://git.kernel.org/stable/c/7f4da759092a1a6ce35fb085182d02de8cc4cc84"},{"type":"WEB","url":"https://git.kernel.org/stable/c/a44f88f7576bc1916d8d6293f5c62fbe7cbe03e0"},{"type":"WEB","url":"https://git.kernel.org/stable/c/ab11dac93d2d568d151b1918d7b84c2d02bacbd5"},{"type":"WEB","url":"https://git.kernel.org/stable/c/b579ea3516c371ecf59d073772bc45dfd28c8a0e"},{"type":"WEB","url":"https://git.kernel.org/stable/c/c719b393374d3763e64900ee19aaed767d5a08d6"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2024/10/msg00003.html"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/42xxx/CVE-2024-42301.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-42301"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"1da177e4c3f41524e886b7f1b8a0c1fc7321cac2"},{"fixed":"166a0bddcc27de41fe13f861c8348e8e53e988c8"},{"fixed":"47b3dce100778001cd76f7e9188944b5cb27a76d"},{"fixed":"a44f88f7576bc1916d8d6293f5c62fbe7cbe03e0"},{"fixed":"c719b393374d3763e64900ee19aaed767d5a08d6"},{"fixed":"7f4da759092a1a6ce35fb085182d02de8cc4cc84"},{"fixed":"b579ea3516c371ecf59d073772bc45dfd28c8a0e"},{"fixed":"7789a1d6792af410aa9b39a1eb237ed24fa2170a"},{"fixed":"ab11dac93d2d568d151b1918d7b84c2d02bacbd5"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-42301.json"}}],"schema_version":"1.7.5"}