Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2024-50248

Опубликовано: 09 нояб. 2024
Источник: debian

Описание

In the Linux kernel, the following vulnerability has been resolved: ntfs3: Add bounds checking to mi_enum_attr() Added bounds checking to make sure that every attr don't stray beyond valid memory region.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed6.11.7-1package
linuxfixed6.1.123-1bookwormpackage
linuxnot-affectedbullseyepackage

Примечания

  • https://git.kernel.org/linus/556bdf27c2dd5c74a9caacbe524b943a6cd42d99 (6.12-rc3)

Связанные уязвимости

CVSS3: 5.5
ubuntu
около 1 года назад

In the Linux kernel, the following vulnerability has been resolved: ntfs3: Add bounds checking to mi_enum_attr() Added bounds checking to make sure that every attr don't stray beyond valid memory region.

CVSS3: 5.5
redhat
около 1 года назад

In the Linux kernel, the following vulnerability has been resolved: ntfs3: Add bounds checking to mi_enum_attr() Added bounds checking to make sure that every attr don't stray beyond valid memory region.

CVSS3: 5.5
nvd
около 1 года назад

In the Linux kernel, the following vulnerability has been resolved: ntfs3: Add bounds checking to mi_enum_attr() Added bounds checking to make sure that every attr don't stray beyond valid memory region.

CVSS3: 5.5
msrc
12 месяцев назад

Описание отсутствует

CVSS3: 5.5
github
около 1 года назад

In the Linux kernel, the following vulnerability has been resolved: ntfs3: Add bounds checking to mi_enum_attr() Added bounds checking to make sure that every attr don't stray beyond valid memory region.