In the Linux kernel, the following vulnerability has been resolved: fs/ntfs3: Use 64 bit variable to avoid 32 bit overflow For example, in the expression: vbo = 2 * vbo + skip
git.kernel.org/linus/e931f6b630ffb22d66caab202a52aa8cbb10c649
git.kernel.org/stable/c/109d85a98345ee52d47c650405dc51bdd2bc7d40
git.kernel.org/stable/c/2d1ad595d15f36a925480199bf1d9ad72614210b
git.kernel.org/stable/c/847db4049f6189427ddaefcfc967d4d235b73c57
git.kernel.org/stable/c/98db3155b54d3684ef0ab5bfa0b856d13f65843d
git.kernel.org/stable/c/e931f6b630ffb22d66caab202a52aa8cbb10c649
ubuntu.com/security/CVE-2024-38624
ubuntu.com/security/notices/USN-6999-1
ubuntu.com/security/notices/USN-6999-2
ubuntu.com/security/notices/USN-7004-1
ubuntu.com/security/notices/USN-7005-1
ubuntu.com/security/notices/USN-7005-2
ubuntu.com/security/notices/USN-7007-1
ubuntu.com/security/notices/USN-7007-2
ubuntu.com/security/notices/USN-7007-3
ubuntu.com/security/notices/USN-7008-1
ubuntu.com/security/notices/USN-7009-1
ubuntu.com/security/notices/USN-7009-2
ubuntu.com/security/notices/USN-7019-1
ubuntu.com/security/notices/USN-7029-1
www.cve.org/CVERecord?id=CVE-2024-38624