vulnerability
Ubuntu: (Multiple Advisories) (CVE-2024-26777): Linux kernel vulnerabilities
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 5 | (AV:L/AC:L/Au:S/C:N/I:N/A:C) | Apr 3, 2024 | Jul 1, 2024 | Mar 27, 2026 |
Severity
5
CVSS
(AV:L/AC:L/Au:S/C:N/I:N/A:C)
Published
Apr 3, 2024
Added
Jul 1, 2024
Modified
Mar 27, 2026
Description
In the Linux kernel, the following vulnerability has been resolved:
fbdev: sis: Error out if pixclock equals zero
The userspace program could pass any values to the driver through
ioctl() interface. If the driver doesn't check the value of pixclock,
it may cause divide-by-zero error.
In sisfb_check_var(), var->pixclock is used as a divisor to caculate
drate before it is checked against zero. Fix this by checking it
at the beginning.
This is similar to CVE-2022-3061 in i740fb which was fixed by
commit 15cf0b8.
Solutions
ubuntu-upgrade-linux-image-4-15-0-1138-oracleubuntu-upgrade-linux-image-4-15-0-1159-kvmubuntu-upgrade-linux-image-4-15-0-1169-gcpubuntu-upgrade-linux-image-4-15-0-1176-awsubuntu-upgrade-linux-image-4-15-0-1184-azureubuntu-upgrade-linux-image-4-15-0-232-genericubuntu-upgrade-linux-image-4-15-0-232-lowlatencyubuntu-upgrade-linux-image-4-4-0-1139-awsubuntu-upgrade-linux-image-4-4-0-1140-kvmubuntu-upgrade-linux-image-4-4-0-1177-awsubuntu-upgrade-linux-image-4-4-0-262-genericubuntu-upgrade-linux-image-4-4-0-262-lowlatencyubuntu-upgrade-linux-image-5-15-0-1030-xilinx-zynqmpubuntu-upgrade-linux-image-5-15-0-1046-gkeopubuntu-upgrade-linux-image-5-15-0-1056-ibmubuntu-upgrade-linux-image-5-15-0-1057-ibmubuntu-upgrade-linux-image-5-15-0-1058-intel-iotgubuntu-upgrade-linux-image-5-15-0-1058-nvidiaubuntu-upgrade-linux-image-5-15-0-1058-nvidia-lowlatencyubuntu-upgrade-linux-image-5-15-0-1058-raspiubuntu-upgrade-linux-image-5-15-0-1060-gkeubuntu-upgrade-linux-image-5-15-0-1060-kvmubuntu-upgrade-linux-image-5-15-0-1061-oracleubuntu-upgrade-linux-image-5-15-0-1062-gcpubuntu-upgrade-linux-image-5-15-0-1063-awsubuntu-upgrade-linux-image-5-15-0-1065-azure-fdeubuntu-upgrade-linux-image-5-15-0-1066-azureubuntu-upgrade-linux-image-5-15-0-110-lowlatencyubuntu-upgrade-linux-image-5-15-0-110-lowlatency-64kubuntu-upgrade-linux-image-5-15-0-112-genericubuntu-upgrade-linux-image-5-15-0-112-generic-64kubuntu-upgrade-linux-image-5-15-0-112-generic-lpaeubuntu-upgrade-linux-image-5-15-0-113-genericubuntu-upgrade-linux-image-5-15-0-113-generic-64kubuntu-upgrade-linux-image-5-15-0-113-generic-lpaeubuntu-upgrade-linux-image-5-4-0-1038-iotubuntu-upgrade-linux-image-5-4-0-1045-xilinx-zynqmpubuntu-upgrade-linux-image-5-4-0-1073-ibmubuntu-upgrade-linux-image-5-4-0-1086-bluefieldubuntu-upgrade-linux-image-5-4-0-1093-gkeopubuntu-upgrade-linux-image-5-4-0-1110-raspiubuntu-upgrade-linux-image-5-4-0-1114-kvmubuntu-upgrade-linux-image-5-4-0-1125-oracleubuntu-upgrade-linux-image-5-4-0-1126-awsubuntu-upgrade-linux-image-5-4-0-1130-gcpubuntu-upgrade-linux-image-5-4-0-1131-azureubuntu-upgrade-linux-image-5-4-0-186-genericubuntu-upgrade-linux-image-5-4-0-186-generic-lpaeubuntu-upgrade-linux-image-5-4-0-186-lowlatencyubuntu-upgrade-linux-image-awsubuntu-upgrade-linux-image-aws-hweubuntu-upgrade-linux-image-aws-lts-18-04ubuntu-upgrade-linux-image-aws-lts-20-04ubuntu-upgrade-linux-image-aws-lts-22-04ubuntu-upgrade-linux-image-azureubuntu-upgrade-linux-image-azure-fde-lts-22-04ubuntu-upgrade-linux-image-azure-lts-18-04ubuntu-upgrade-linux-image-azure-lts-20-04ubuntu-upgrade-linux-image-azure-lts-22-04ubuntu-upgrade-linux-image-bluefieldubuntu-upgrade-linux-image-gcpubuntu-upgrade-linux-image-gcp-lts-18-04ubuntu-upgrade-linux-image-gcp-lts-20-04ubuntu-upgrade-linux-image-gcp-lts-22-04ubuntu-upgrade-linux-image-genericubuntu-upgrade-linux-image-generic-64kubuntu-upgrade-linux-image-generic-64k-hwe-20-04ubuntu-upgrade-linux-image-generic-hwe-16-04ubuntu-upgrade-linux-image-generic-hwe-18-04ubuntu-upgrade-linux-image-generic-hwe-20-04ubuntu-upgrade-linux-image-generic-lpaeubuntu-upgrade-linux-image-generic-lpae-hwe-20-04ubuntu-upgrade-linux-image-generic-lts-xenialubuntu-upgrade-linux-image-gkeubuntu-upgrade-linux-image-gke-5-15ubuntu-upgrade-linux-image-gkeopubuntu-upgrade-linux-image-gkeop-5-15ubuntu-upgrade-linux-image-gkeop-5-4ubuntu-upgrade-linux-image-ibmubuntu-upgrade-linux-image-ibm-lts-20-04ubuntu-upgrade-linux-image-intelubuntu-upgrade-linux-image-intel-iotgubuntu-upgrade-linux-image-kvmubuntu-upgrade-linux-image-lowlatencyubuntu-upgrade-linux-image-lowlatency-64kubuntu-upgrade-linux-image-lowlatency-64k-hwe-20-04ubuntu-upgrade-linux-image-lowlatency-hwe-16-04ubuntu-upgrade-linux-image-lowlatency-hwe-18-04ubuntu-upgrade-linux-image-lowlatency-hwe-20-04ubuntu-upgrade-linux-image-lowlatency-lts-xenialubuntu-upgrade-linux-image-nvidiaubuntu-upgrade-linux-image-nvidia-lowlatencyubuntu-upgrade-linux-image-oemubuntu-upgrade-linux-image-oem-20-04ubuntu-upgrade-linux-image-oem-20-04bubuntu-upgrade-linux-image-oem-20-04cubuntu-upgrade-linux-image-oem-20-04dubuntu-upgrade-linux-image-oem-osp1ubuntu-upgrade-linux-image-oracleubuntu-upgrade-linux-image-oracle-lts-18-04ubuntu-upgrade-linux-image-oracle-lts-20-04ubuntu-upgrade-linux-image-oracle-lts-22-04ubuntu-upgrade-linux-image-raspiubuntu-upgrade-linux-image-raspi-hwe-18-04ubuntu-upgrade-linux-image-raspi-nolpaeubuntu-upgrade-linux-image-raspi2ubuntu-upgrade-linux-image-snapdragon-hwe-18-04ubuntu-upgrade-linux-image-virtualubuntu-upgrade-linux-image-virtual-hwe-16-04ubuntu-upgrade-linux-image-virtual-hwe-18-04ubuntu-upgrade-linux-image-virtual-hwe-20-04ubuntu-upgrade-linux-image-virtual-lts-xenialubuntu-upgrade-linux-image-xilinx-zynqmp
References
Rapid7 Labs
2026 Global Threat Landscape Report
The predictive window has collapsed. Exploitation follows disclosure in days. See how attackers are accelerating and how to stay ahead.