This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
Metrics
Affected Vendors & Products
References
History
Thu, 22 Aug 2024 00:30:00 +0000
Thu, 22 Aug 2024 00:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In the Linux kernel, the following vulnerability has been resolved: orangefs: fix out-of-bounds fsid access Arnd Bergmann sent a patch to fsdevel, he says: "orangefs_statfs() copies two consecutive fields of the superblock into the statfs structure, which triggers a warning from the string fortification helpers" Jan Kara suggested an alternate way to do the patch to make it more readable. I ran both ideas through xfstests and both seem fine. This patch is based on Jan Kara's suggestion. | This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. |
Title | orangefs: fix out-of-bounds fsid access | kernel: orangefs: fix out-of-bounds fsid access |
Sat, 17 Aug 2024 02:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-125 | |
Metrics |
cvssV3_1
|
cvssV3_1
|

Status: REJECTED
Assigner: Linux
Published:
Updated: 2024-08-22T00:01:12.570Z
Reserved: 2024-07-29T15:50:41.190Z
Link: CVE-2024-42143

No data.

Status : Rejected
Published: 2024-07-30T08:15:06.073
Modified: 2024-08-22T00:15:06.020
Link: CVE-2024-42143
