CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
Low
In the Linux kernel, the following vulnerability has been resolved: fs/ntfs3: Use variable length array instead of fixed size Should fix smatch warning: ntfs_set_label() error: __builtin_memcpy() ‘uni->name’ too small (20 vs 256)
git.kernel.org/linus/1997cdc3e727526aa5d84b32f7cbb3f56459b7ef
git.kernel.org/stable/c/1997cdc3e727526aa5d84b32f7cbb3f56459b7ef
git.kernel.org/stable/c/1fe1c9dc21ee52920629d2d9b9bd84358931a8d1
git.kernel.org/stable/c/3839a9b19a4b70eff6b6ad70446f639f7fd5a3d7
git.kernel.org/stable/c/a2de301d90b782ac5d7a5fe32995caaee9ab3a0f
git.kernel.org/stable/c/cceef44b34819c24bb6ed70dce5b524bd3e368d1
ubuntu.com/security/CVE-2024-38623
ubuntu.com/security/notices/USN-6999-1
ubuntu.com/security/notices/USN-6999-2
ubuntu.com/security/notices/USN-7004-1
ubuntu.com/security/notices/USN-7005-1
ubuntu.com/security/notices/USN-7005-2
ubuntu.com/security/notices/USN-7007-1
ubuntu.com/security/notices/USN-7007-2
ubuntu.com/security/notices/USN-7007-3
ubuntu.com/security/notices/USN-7008-1
ubuntu.com/security/notices/USN-7009-1
ubuntu.com/security/notices/USN-7009-2
ubuntu.com/security/notices/USN-7019-1
ubuntu.com/security/notices/USN-7029-1
www.cve.org/CVERecord?id=CVE-2024-38623