Overview
About vulnerability
In the Linux kernel, the following vulnerability has been resolved:
fbdev: fix potential buffer overflow in do_register_framebuffer()
The current implementation may lead to buffer overflow when:
- Unregistration creates NULL gaps in registered_fb[]
- All array slots become occupied despite num_registered_fb < FB_MAX
- The registration loop exceeds array bounds
Add boundary check to prevent registered_fb[FB_MAX] access.
Details
- Affected product:
- AlmaLinux 9.2 ESU , CentOS 6 ELS , CentOS 7 ELS , CentOS 8.4 ELS , CentOS 8.5 ELS , CentOS Stream 8 ELS , CloudLinux 7 ELS , Oracle Linux 6 ELS , Oracle Linux 7 ELS , RHEL 7 ELS , TuxCare 9.6 ESU , Ubuntu 16.04 ELS , Ubuntu 18.04 ELS , Ubuntu 20.04 ELS
- Affected packages:
- linux @ 5.4.0 (+15 more)
In the Linux kernel, the following vulnerability has been resolved:
fbdev: fix potential buffer overflow in do_register_framebuffer()
The current implementation may lead to buffer overflow when:
- Unregistration creates NULL gaps in registered_fb[]
- All array slots become occupied despite num_registered_fb < FB_MAX
- The registration loop exceeds array bounds
Add boundary check to prevent registered_fb[FB_MAX] access.