CVE-2024-38624

In the Linux kernel, the following vulnerability has been resolved: fs/ntfs3: Use 64 bit variable to avoid 32 bit overflow For example, in the expression: vbo = 2 * vbo + skip
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

03 Oct 2025, 16:08

Type Values Removed Values Added
First Time Linux linux Kernel
Linux
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/109d85a98345ee52d47c650405dc51bdd2bc7d40 - () https://git.kernel.org/stable/c/109d85a98345ee52d47c650405dc51bdd2bc7d40 - Patch
References () https://git.kernel.org/stable/c/2d1ad595d15f36a925480199bf1d9ad72614210b - () https://git.kernel.org/stable/c/2d1ad595d15f36a925480199bf1d9ad72614210b - Patch
References () https://git.kernel.org/stable/c/847db4049f6189427ddaefcfc967d4d235b73c57 - () https://git.kernel.org/stable/c/847db4049f6189427ddaefcfc967d4d235b73c57 - Patch
References () https://git.kernel.org/stable/c/98db3155b54d3684ef0ab5bfa0b856d13f65843d - () https://git.kernel.org/stable/c/98db3155b54d3684ef0ab5bfa0b856d13f65843d - Patch
References () https://git.kernel.org/stable/c/e931f6b630ffb22d66caab202a52aa8cbb10c649 - () https://git.kernel.org/stable/c/e931f6b630ffb22d66caab202a52aa8cbb10c649 - Patch
CWE CWE-190
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5

21 Nov 2024, 09:26

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/109d85a98345ee52d47c650405dc51bdd2bc7d40 - () https://git.kernel.org/stable/c/109d85a98345ee52d47c650405dc51bdd2bc7d40 -
References () https://git.kernel.org/stable/c/2d1ad595d15f36a925480199bf1d9ad72614210b - () https://git.kernel.org/stable/c/2d1ad595d15f36a925480199bf1d9ad72614210b -
References () https://git.kernel.org/stable/c/847db4049f6189427ddaefcfc967d4d235b73c57 - () https://git.kernel.org/stable/c/847db4049f6189427ddaefcfc967d4d235b73c57 -
References () https://git.kernel.org/stable/c/98db3155b54d3684ef0ab5bfa0b856d13f65843d - () https://git.kernel.org/stable/c/98db3155b54d3684ef0ab5bfa0b856d13f65843d -
References () https://git.kernel.org/stable/c/e931f6b630ffb22d66caab202a52aa8cbb10c649 - () https://git.kernel.org/stable/c/e931f6b630ffb22d66caab202a52aa8cbb10c649 -
Summary
  • (es) En el kernel de Linux se ha resuelto la siguiente vulnerabilidad: fs/ntfs3: Utilice variable de 64 bits para evitar el desbordamiento de 32 bits. Por ejemplo, en la expresión: vbo = 2 * vbo + skip

21 Jun 2024, 11:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-06-21 11:15

Updated : 2025-10-03 16:08


NVD link : CVE-2024-38624

Mitre link : CVE-2024-38624

CVE.ORG link : CVE-2024-38624


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-190

Integer Overflow or Wraparound