Описание
In the Linux kernel, the following vulnerability has been resolved:
fs/ntfs3: Use 64 bit variable to avoid 32 bit overflow
For example, in the expression: vbo = 2 * vbo + skip
In the Linux kernel, the following vulnerability has been resolved:
fs/ntfs3: Use 64 bit variable to avoid 32 bit overflow
For example, in the expression: vbo = 2 * vbo + skip
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2024-38624
- https://git.kernel.org/stable/c/109d85a98345ee52d47c650405dc51bdd2bc7d40
- https://git.kernel.org/stable/c/2d1ad595d15f36a925480199bf1d9ad72614210b
- https://git.kernel.org/stable/c/847db4049f6189427ddaefcfc967d4d235b73c57
- https://git.kernel.org/stable/c/98db3155b54d3684ef0ab5bfa0b856d13f65843d
- https://git.kernel.org/stable/c/e931f6b630ffb22d66caab202a52aa8cbb10c649
EPSS
CVE ID
Связанные уязвимости
In the Linux kernel, the following vulnerability has been resolved: fs/ntfs3: Use 64 bit variable to avoid 32 bit overflow For example, in the expression: vbo = 2 * vbo + skip
In the Linux kernel, the following vulnerability has been resolved: fs/ntfs3: Use 64 bit variable to avoid 32 bit overflow For example, in the expression: vbo = 2 * vbo + skip
In the Linux kernel, the following vulnerability has been resolved: fs/ntfs3: Use 64 bit variable to avoid 32 bit overflow For example, in the expression: vbo = 2 * vbo + skip
In the Linux kernel, the following vulnerability has been resolved: f ...
Уязвимость компонента fslog.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
EPSS