First published: Tue Dec 24 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: exfat: fix out-of-bounds access of directory entries In the case of the directory size is greater than or equal to the cluster size, if start_clu becomes an EOF cluster(an invalid cluster) due to file system corruption, then the directory entry where ei->hint_femp.eidx hint is outside the directory, resulting in an out-of-bounds access, which may cause further file system corruption. This commit adds a check for start_clu, if it is an invalid cluster, the file or directory will be treated as empty.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | ||
debian/linux | <=5.10.223-1<=5.10.226-1<=6.1.123-1<=6.1.128-1 | 6.12.12-1 6.12.15-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-53147 has been assigned a severity rating that indicates it could lead to out-of-bounds access in the Linux kernel.
To fix CVE-2024-53147, update your Linux kernel to the latest version that includes the patch for this vulnerability.
CVE-2024-53147 affects multiple versions of the Linux kernel that utilize the exfat file system.
The potential impacts of CVE-2024-53147 include system crashes or data corruption due to out-of-bounds access.
Currently, the recommended action for CVE-2024-53147 is to apply the official patch rather than relying on temporary workarounds.