5.5 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.4 Medium
AI Score
Confidence
High
0.0004 Low
EPSS
Percentile
12.6%
In the Linux kernel, the following vulnerability has been resolved: fbdev:
sis: Error out if pixclock equals zero The userspace program could pass any
values to the driver through ioctl() interface. If the driver doesn’t check
the value of pixclock, it may cause divide-by-zero error. In
sisfb_check_var(), var->pixclock is used as a divisor to caculate drate
before it is checked against zero. Fix this by checking it at the
beginning. This is similar to CVE-2022-3061 in i740fb which was fixed by
commit 15cf0b8.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 20.04 | noarch | linux | < 5.4.0-186.206 | UNKNOWN |
ubuntu | 22.04 | noarch | linux | < 5.15.0-112.122 | UNKNOWN |
ubuntu | 23.10 | noarch | linux | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws | < 5.4.0-1126.136 | UNKNOWN |
ubuntu | 22.04 | noarch | linux-aws | < 5.15.0-1063.69 | UNKNOWN |
ubuntu | 23.10 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws-5.15 | < 5.15.0-1063.69~20.04.1 | UNKNOWN |
ubuntu | 18.04 | noarch | linux-aws-5.4 | < 5.4.0-1126.136~18.04.1 | UNKNOWN |
ubuntu | 22.04 | noarch | linux-aws-6.5 | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-azure | < 5.4.0-1131.138 | UNKNOWN |
git.kernel.org/linus/e421946be7d9bf545147bea8419ef8239cb7ca52 (6.8-rc2)
git.kernel.org/stable/c/1d11dd3ea5d039c7da089f309f39c4cd363b924b
git.kernel.org/stable/c/6db07619d173765bd8622d63809cbfe361f04207
git.kernel.org/stable/c/84246c35ca34207114055a87552a1c4289c8fd7e
git.kernel.org/stable/c/99f1abc34a6dde248d2219d64aa493c76bbdd9eb
git.kernel.org/stable/c/cd36da760bd1f78c63c7078407baf01dd724f313
git.kernel.org/stable/c/df6e2088c6f4cad539cf67cba2d6764461e798d1
git.kernel.org/stable/c/e421946be7d9bf545147bea8419ef8239cb7ca52
git.kernel.org/stable/c/f329523f6a65c3bbce913ad35473d83a319d5d99
launchpad.net/bugs/cve/CVE-2024-26777
nvd.nist.gov/vuln/detail/CVE-2024-26777
security-tracker.debian.org/tracker/CVE-2024-26777
ubuntu.com/security/notices/USN-6820-1
ubuntu.com/security/notices/USN-6820-2
ubuntu.com/security/notices/USN-6821-1
ubuntu.com/security/notices/USN-6821-2
ubuntu.com/security/notices/USN-6821-3
ubuntu.com/security/notices/USN-6821-4
ubuntu.com/security/notices/USN-6828-1
ubuntu.com/security/notices/USN-6831-1
ubuntu.com/security/notices/USN-6867-1
ubuntu.com/security/notices/USN-6871-1
www.cve.org/CVERecord?id=CVE-2024-26777
5.5 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.4 Medium
AI Score
Confidence
High
0.0004 Low
EPSS
Percentile
12.6%