CVE-2024-38624
Severity CVSS v4.0:
Pending analysis
Type:
CWE-190
Integer Overflow or Wraparound
Publication date:
21/06/2024
Last modified:
03/10/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
fs/ntfs3: Use 64 bit variable to avoid 32 bit overflow<br />
<br />
For example, in the expression:<br />
vbo = 2 * vbo + skip
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.15 (including) | 5.15.161 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.93 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.33 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.9.4 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/109d85a98345ee52d47c650405dc51bdd2bc7d40
- https://git.kernel.org/stable/c/2d1ad595d15f36a925480199bf1d9ad72614210b
- https://git.kernel.org/stable/c/847db4049f6189427ddaefcfc967d4d235b73c57
- https://git.kernel.org/stable/c/98db3155b54d3684ef0ab5bfa0b856d13f65843d
- https://git.kernel.org/stable/c/e931f6b630ffb22d66caab202a52aa8cbb10c649
- https://git.kernel.org/stable/c/109d85a98345ee52d47c650405dc51bdd2bc7d40
- https://git.kernel.org/stable/c/2d1ad595d15f36a925480199bf1d9ad72614210b
- https://git.kernel.org/stable/c/847db4049f6189427ddaefcfc967d4d235b73c57
- https://git.kernel.org/stable/c/98db3155b54d3684ef0ab5bfa0b856d13f65843d
- https://git.kernel.org/stable/c/e931f6b630ffb22d66caab202a52aa8cbb10c649



