In the Linux kernel, the following vulnerability has been resolved:
tty: Fix out-of-bound vmalloc access in imageblit
This issue happens when a userspace program does an ioctl FBIOPUTVSCREENINFO passing the fbvarscreeninfo struct containing only the fields xres, yres, and bitsper_pixel with values.
If this struct is the same as the previous ioctl, the vcresize() detects it and doesn't call the resizescreen(), leaving the fbvarscreeninfo incomplete. And this leads to the updatescrollmode() calculates a wrong value to fbcondisplay->vrows, which makes the realy() return a wrong value of y, and that value, eventually, causes the imageblit to access an out-of-bound address value.
To solve this issue I made the resizescreen() be called even if the screen does not need any resizing, so it will "fix and fill" the fbvar_screeninfo independently.