U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

CVE-2024-46777 Detail

Description

In the Linux kernel, the following vulnerability has been resolved: udf: Avoid excessive partition lengths Avoid mounting filesystems where the partition would overflow the 32-bits used for block number. Also refuse to mount filesystems where the partition length is so large we cannot safely index bits in a block bitmap.


Metrics

NVD enrichment efforts reference publicly available information to associate vector strings. CVSS information contributed by other sources is also displayed.
CVSS 4.0 Severity and Vector Strings:

NIST CVSS score
NIST: NVD
N/A
NVD assessment not yet provided.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

Hyperlink Resource
https://git.kernel.org/stable/c/0173999123082280cf904bd640015951f194a294 Patch 
https://git.kernel.org/stable/c/1497a4484cdb2cf6c37960d788fb6ba67567bdb7 Patch 
https://git.kernel.org/stable/c/2ddf831451357c6da4b64645eb797c93c1c054d1 Patch 
https://git.kernel.org/stable/c/551966371e17912564bc387fbeb2ac13077c3db1 Patch 
https://git.kernel.org/stable/c/925fd8ee80d5348a5e965548e5484d164d19221d Patch 
https://git.kernel.org/stable/c/a56330761950cb83de1dfb348479f20c56c95f90 Patch 
https://git.kernel.org/stable/c/c0c23130d38e8bc28e9ef581443de9b1fc749966 Patch 
https://git.kernel.org/stable/c/ebbe26fd54a9621994bc16b14f2ba8f84c089693 Patch 

Weakness Enumeration

CWE-ID CWE Name Source
NVD-CWE-noinfo Insufficient Information cwe source acceptance level NIST  

Known Affected Software Configurations Switch to CPE 2.2

CPEs loading, please wait.

Denotes Vulnerable Software
Are we missing a CPE here? Please let us know.

Change History

2 change records found show changes

Quick Info

CVE Dictionary Entry:
CVE-2024-46777
NVD Published Date:
09/18/2024
NVD Last Modified:
11/20/2024
Source:
kernel.org