CVE-2024-57850

In the Linux kernel, the following vulnerability has been resolved: jffs2: Prevent rtime decompress memory corruption The rtime decompression routine does not fully check bounds during the entirety of the decompression pass and can corrupt memory outside the decompression buffer if the compressed data is corrupted. This adds the required check to prevent this failure mode.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

01 Oct 2025, 20:17

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: jffs2: evitar la corrupción de la memoria de descompresión de rtime La rutina de descompresión de rtime no comprueba completamente los límites durante la totalidad del paso de descompresión y puede dañar la memoria fuera del búfer de descompresión si los datos comprimidos están dañados. Esto agrega la verificación requerida para evitar este modo de falla.
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
CWE CWE-787
First Time Linux linux Kernel
Linux
References () https://git.kernel.org/stable/c/421f9e9f0fae9f8e721ffa07f22d9765fa1214d5 - () https://git.kernel.org/stable/c/421f9e9f0fae9f8e721ffa07f22d9765fa1214d5 - Patch
References () https://git.kernel.org/stable/c/47c9a7f81027a78afea9d2e9a54bfd8fabb6b3d0 - () https://git.kernel.org/stable/c/47c9a7f81027a78afea9d2e9a54bfd8fabb6b3d0 - Patch
References () https://git.kernel.org/stable/c/6808a1812a3419542223e7fe9e2de577e99e45d1 - () https://git.kernel.org/stable/c/6808a1812a3419542223e7fe9e2de577e99e45d1 - Patch
References () https://git.kernel.org/stable/c/bd384b04ad1995441b18fe6c1366d02de8c5d5eb - () https://git.kernel.org/stable/c/bd384b04ad1995441b18fe6c1366d02de8c5d5eb - Patch
References () https://git.kernel.org/stable/c/dc39b08fcc3831b0bc46add91ba93cd2aab50716 - () https://git.kernel.org/stable/c/dc39b08fcc3831b0bc46add91ba93cd2aab50716 - Patch
References () https://git.kernel.org/stable/c/f6fc251baefc3cdc4f41f2f5a47940d7d4a67332 - () https://git.kernel.org/stable/c/f6fc251baefc3cdc4f41f2f5a47940d7d4a67332 - Patch
References () https://git.kernel.org/stable/c/fe051552f5078fa02d593847529a3884305a6ffe - () https://git.kernel.org/stable/c/fe051552f5078fa02d593847529a3884305a6ffe - Patch
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

11 Jan 2025, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-01-11 15:15

Updated : 2025-10-01 20:17


NVD link : CVE-2024-57850

Mitre link : CVE-2024-57850

CVE.ORG link : CVE-2024-57850


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-787

Out-of-bounds Write