Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2024-50242
PUBLISHED
More InfoOfficial Page
Assigner-Linux
Assigner Org ID-416baaa9-dc9f-4396-8d5f-8c081fb06d67
View Known Exploited Vulnerability (KEV) details
Published At-09 Nov, 2024 | 10:14
Updated At-03 Nov, 2025 | 22:27
Rejected At-
▼CVE Numbering Authority (CNA)
fs/ntfs3: Additional check in ntfs_file_release

In the Linux kernel, the following vulnerability has been resolved: fs/ntfs3: Additional check in ntfs_file_release

Affected Products
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • fs/ntfs3/file.c
Default Status
unaffected
Versions
Affected
  • From 4534a70b7056fd4b9a1c6db5a4ce3c98546b291e before 542532afe249588ae88d8409d4bf861c315f8862 (git)
  • From 4534a70b7056fd4b9a1c6db5a4ce3c98546b291e before d1ac7e2620302e3e49573df39bd4e868e8b4962a (git)
  • From 4534a70b7056fd4b9a1c6db5a4ce3c98546b291e before 550ef40fa6366d5d11b122e5f36b1f9aa20c087e (git)
  • From 4534a70b7056fd4b9a1c6db5a4ce3c98546b291e before 82685eb6ca1db2bd11190451085bcb86ed03aa24 (git)
  • From 4534a70b7056fd4b9a1c6db5a4ce3c98546b291e before 031d6f608290c847ba6378322d0986d08d1a645a (git)
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • fs/ntfs3/file.c
Default Status
affected
Versions
Affected
  • 5.15
Unaffected
  • From 0 before 5.15 (semver)
  • From 5.15.178 through 5.15.* (semver)
  • From 6.1.119 through 6.1.* (semver)
  • From 6.6.60 through 6.6.* (semver)
  • From 6.11.7 through 6.11.* (semver)
  • From 6.12 through * (original_commit_for_fix)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/542532afe249588ae88d8409d4bf861c315f8862
N/A
https://git.kernel.org/stable/c/d1ac7e2620302e3e49573df39bd4e868e8b4962a
N/A
https://git.kernel.org/stable/c/550ef40fa6366d5d11b122e5f36b1f9aa20c087e
N/A
https://git.kernel.org/stable/c/82685eb6ca1db2bd11190451085bcb86ed03aa24
N/A
https://git.kernel.org/stable/c/031d6f608290c847ba6378322d0986d08d1a645a
N/A
Hyperlink: https://git.kernel.org/stable/c/542532afe249588ae88d8409d4bf861c315f8862
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/d1ac7e2620302e3e49573df39bd4e868e8b4962a
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/550ef40fa6366d5d11b122e5f36b1f9aa20c087e
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/82685eb6ca1db2bd11190451085bcb86ed03aa24
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/031d6f608290c847ba6378322d0986d08d1a645a
Resource: N/A
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html
N/A
Hyperlink: https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html
Resource: N/A
Details not found