CVE-2024-38623

Source
https://cve.org/CVERecord?id=CVE-2024-38623
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-38623.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-38623
Downstream
Related
Published
2024-06-21T10:18:16.291Z
Modified
2026-03-14T12:34:35.910341Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
fs/ntfs3: Use variable length array instead of fixed size
Details

In the Linux kernel, the following vulnerability has been resolved:

fs/ntfs3: Use variable length array instead of fixed size

Should fix smatch warning: ntfssetlabel() error: _builtinmemcpy() 'uni->name' too small (20 vs 256)

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/38xxx/CVE-2024-38623.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
4534a70b7056fd4b9a1c6db5a4ce3c98546b291e
Fixed
a2de301d90b782ac5d7a5fe32995caaee9ab3a0f
Fixed
3839a9b19a4b70eff6b6ad70446f639f7fd5a3d7
Fixed
1fe1c9dc21ee52920629d2d9b9bd84358931a8d1
Fixed
cceef44b34819c24bb6ed70dce5b524bd3e368d1
Fixed
1997cdc3e727526aa5d84b32f7cbb3f56459b7ef

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-38623.json"