First published: Mon Oct 21 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: scsi: sd: Fix off-by-one error in sd_read_block_characteristics() Ff the device returns page 0xb1 with length 8 (happens with qemu v2.x, for example), sd_read_block_characteristics() may attempt an out-of-bounds memory access when accessing the zoned field at offset 8.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | >=5.19<6.1.113 | |
Linux Kernel | >=6.2<6.6.54 | |
Linux Kernel | >=6.7<6.10.13 | |
Linux Kernel | >=6.11<6.11.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-47682 has a significant severity level due to the potential for an out-of-bounds read that can lead to security issues.
To fix CVE-2024-47682, update your Linux kernel to a version that includes the patch for this vulnerability.
CVE-2024-47682 affects Linux kernel versions between 5.19 and 6.1.113, from 6.2 to 6.6.54, from 6.7 to 6.10.13, and 6.11 to 6.11.2.
Systems running affected versions of the Linux kernel, particularly those utilizing SCSI devices, are impacted by CVE-2024-47682.
CVE-2024-47682 is related to the Linux kernel and may affect virtual environments running on QEMU and similar platforms.