CVE-2024-27407
Severity CVSS v4.0:
Pending analysis
Type:
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Publication date:
17/05/2024
Last modified:
08/04/2025
Description
In the Linux kernel, the following vulnerability has been resolved: fs/ntfs3: Fixed overflow check in mi_enum_attr()
Impact
Base Score 3.x
8.40
Severity 3.x
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.15 (including) | 6.1.120 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.19 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.7.7 (excluding) |
cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/1c0a95d99b1b2b5d842e5abc7ef7eed1193b60d7
- https://git.kernel.org/stable/c/652cfeb43d6b9aba5c7c4902bed7a7340df131fb
- https://git.kernel.org/stable/c/8c77398c72618101d66480b94b34fe9087ee3d08
- https://git.kernel.org/stable/c/e99faa97359654b6e4e769246c72cf50a57e05b2
- https://git.kernel.org/stable/c/1c0a95d99b1b2b5d842e5abc7ef7eed1193b60d7
- https://git.kernel.org/stable/c/652cfeb43d6b9aba5c7c4902bed7a7340df131fb
- https://git.kernel.org/stable/c/8c77398c72618101d66480b94b34fe9087ee3d08