In the Linux kernel, the following vulnerability has been resolved:
fs/ntfs3: Use 64 bit variable to avoid 32 bit overflow
For example, in the expression:
vbo = 2 * vbo + skip
References
Configurations
Configuration 1 (hide)
|
History
03 Oct 2025, 16:08
Type | Values Removed | Values Added |
---|---|---|
First Time |
Linux linux Kernel
Linux |
|
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
References | () https://git.kernel.org/stable/c/109d85a98345ee52d47c650405dc51bdd2bc7d40 - Patch | |
References | () https://git.kernel.org/stable/c/2d1ad595d15f36a925480199bf1d9ad72614210b - Patch | |
References | () https://git.kernel.org/stable/c/847db4049f6189427ddaefcfc967d4d235b73c57 - Patch | |
References | () https://git.kernel.org/stable/c/98db3155b54d3684ef0ab5bfa0b856d13f65843d - Patch | |
References | () https://git.kernel.org/stable/c/e931f6b630ffb22d66caab202a52aa8cbb10c649 - Patch | |
CWE | CWE-190 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
21 Nov 2024, 09:26
Type | Values Removed | Values Added |
---|---|---|
References | () https://git.kernel.org/stable/c/109d85a98345ee52d47c650405dc51bdd2bc7d40 - | |
References | () https://git.kernel.org/stable/c/2d1ad595d15f36a925480199bf1d9ad72614210b - | |
References | () https://git.kernel.org/stable/c/847db4049f6189427ddaefcfc967d4d235b73c57 - | |
References | () https://git.kernel.org/stable/c/98db3155b54d3684ef0ab5bfa0b856d13f65843d - | |
References | () https://git.kernel.org/stable/c/e931f6b630ffb22d66caab202a52aa8cbb10c649 - | |
Summary |
|
21 Jun 2024, 11:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-06-21 11:15
Updated : 2025-10-03 16:08
NVD link : CVE-2024-38624
Mitre link : CVE-2024-38624
CVE.ORG link : CVE-2024-38624
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-190
Integer Overflow or Wraparound