First published: Sat Nov 09 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: fs/ntfs3: Check if more than chunk-size bytes are written A incorrectly formatted chunk may decompress into more than LZNT_CHUNK_SIZE bytes and a index out of bounds will occur in s_max_off.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | <5.15.171 | |
Linux Kernel | >=5.16<6.1.116 | |
Linux Kernel | >=6.2<6.6.60 | |
Linux Kernel | >=6.7<6.11.7 | |
Linux Kernel | =6.12-rc1 | |
Linux Kernel | =6.12-rc2 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.15-1 | |
debian/linux-6.1 | 6.1.119-1~deb11u1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-50247 is considered to be moderate due to the potential for an index out of bounds error in the Linux kernel.
To fix CVE-2024-50247, you should upgrade to the patched versions of the Linux kernel specified in the vulnerability report.
CVE-2024-50247 affects several versions of the Linux kernel, specifically versions prior to 5.15.171 and certain versions between 5.16 and 6.6, as well as between 6.7 and 6.12.
Systems running vulnerable versions of the Linux kernel that manage NTFS file systems are impacted by CVE-2024-50247.
There are no known workarounds for CVE-2024-50247; updating the kernel is the recommended action to mitigate the vulnerability.