In the Linux kernel, the following vulnerability has been resolved:
udf: Avoid excessive partition lengths
Avoid mounting filesystems where the partition would overflow the
32-bits used for block number. Also refuse to mount filesystems where
the partition length is so large we cannot safely index bits in a
block bitmap.
References
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 17:56
Type | Values Removed | Values Added |
---|---|---|
CWE | NVD-CWE-noinfo | |
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
First Time |
Linux linux Kernel
Linux |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
References | () https://git.kernel.org/stable/c/0173999123082280cf904bd640015951f194a294 - Patch | |
References | () https://git.kernel.org/stable/c/1497a4484cdb2cf6c37960d788fb6ba67567bdb7 - Patch | |
References | () https://git.kernel.org/stable/c/2ddf831451357c6da4b64645eb797c93c1c054d1 - Patch | |
References | () https://git.kernel.org/stable/c/551966371e17912564bc387fbeb2ac13077c3db1 - Patch | |
References | () https://git.kernel.org/stable/c/925fd8ee80d5348a5e965548e5484d164d19221d - Patch | |
References | () https://git.kernel.org/stable/c/a56330761950cb83de1dfb348479f20c56c95f90 - Patch | |
References | () https://git.kernel.org/stable/c/c0c23130d38e8bc28e9ef581443de9b1fc749966 - Patch | |
References | () https://git.kernel.org/stable/c/ebbe26fd54a9621994bc16b14f2ba8f84c089693 - Patch |
20 Sep 2024, 12:30
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
18 Sep 2024, 08:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-09-18 08:15
Updated : 2024-11-20 17:56
NVD link : CVE-2024-46777
Mitre link : CVE-2024-46777
CVE.ORG link : CVE-2024-46777
JSON object : View
Products Affected
linux
- linux_kernel
CWE