In the Linux kernel, the following vulnerability has been resolved:
exfat: fix out-of-bounds access of directory entries
In the case of the directory size is greater than or equal to
the cluster size, if start_clu becomes an EOF cluster(an invalid
cluster) due to file system corruption, then the directory entry
where ei->hint_femp.eidx hint is outside the directory, resulting
in an out-of-bounds access, which may cause further file system
corruption.
This commit adds a check for start_clu, if it is an invalid cluster,
the file or directory will be treated as empty.
Metrics
Affected Vendors & Products
References
History
Thu, 26 Dec 2024 02:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-119 | |
Metrics |
cvssV3_1
|
cvssV3_1
|
Wed, 25 Dec 2024 13:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|
Tue, 24 Dec 2024 11:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In the Linux kernel, the following vulnerability has been resolved: exfat: fix out-of-bounds access of directory entries In the case of the directory size is greater than or equal to the cluster size, if start_clu becomes an EOF cluster(an invalid cluster) due to file system corruption, then the directory entry where ei->hint_femp.eidx hint is outside the directory, resulting in an out-of-bounds access, which may cause further file system corruption. This commit adds a check for start_clu, if it is an invalid cluster, the file or directory will be treated as empty. | |
Title | exfat: fix out-of-bounds access of directory entries | |
References |
|

Status: PUBLISHED
Assigner: Linux
Published:
Updated: 2025-01-20T06:19:44.694Z
Reserved: 2024-11-19T17:17:24.998Z
Link: CVE-2024-53147

No data.

Status : Received
Published: 2024-12-24T12:15:22.777
Modified: 2024-12-24T12:15:22.777
Link: CVE-2024-53147
