Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2024-26973
Modified
More InfoOfficial Page
Source-416baaa9-dc9f-4396-8d5f-8c081fb06d67
View Known Exploited Vulnerability (KEV) details
Published At-01 May, 2024 | 06:15
Updated At-12 May, 2026 | 12:16

In the Linux kernel, the following vulnerability has been resolved: fat: fix uninitialized field in nostale filehandles When fat_encode_fh_nostale() encodes file handle without a parent it stores only first 10 bytes of the file handle. However the length of the file handle must be a multiple of 4 so the file handle is actually 12 bytes long and the last two bytes remain uninitialized. This is not great at we potentially leak uninitialized information with the handle to userspace. Properly initialize the full handle length.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.15.5MEDIUM
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Type: Primary
Version: 3.1
Base score: 5.5
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CPE Matches

Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 3.10(inclusive) to 4.19.312(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 4.20(inclusive) to 5.4.274(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 5.5(inclusive) to 5.10.215(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 5.11(inclusive) to 5.15.154(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 5.16(inclusive) to 6.1.84(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 6.2(inclusive) to 6.6.24(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 6.7(inclusive) to 6.7.12(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 6.8(inclusive) to 6.8.3(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Debian GNU/Linux
debian
>>debian_linux>>10.0
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-908Primarynvd@nist.gov
CWE ID: CWE-908
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://git.kernel.org/stable/c/03a7e3f2ba3ca25f1da1d3898709a08db14c1abb416baaa9-dc9f-4396-8d5f-8c081fb06d67
Mailing List
Patch
https://git.kernel.org/stable/c/74f852654b8b7866f15323685f1e178d3386c688416baaa9-dc9f-4396-8d5f-8c081fb06d67
Mailing List
Patch
https://git.kernel.org/stable/c/9840d1897e28f8733cc1e38f97e044f987dc0a63416baaa9-dc9f-4396-8d5f-8c081fb06d67
Mailing List
Patch
https://git.kernel.org/stable/c/a276c595c3a629170b0f052a3724f755d7c6adc6416baaa9-dc9f-4396-8d5f-8c081fb06d67
Mailing List
Patch
https://git.kernel.org/stable/c/b7fb63e807c6dadf7ecc1d43448c4f1711d7eeee416baaa9-dc9f-4396-8d5f-8c081fb06d67
Mailing List
Patch
https://git.kernel.org/stable/c/c8cc05de8e6b5612b6e9f92c385c1a064b0db375416baaa9-dc9f-4396-8d5f-8c081fb06d67
Mailing List
Patch
https://git.kernel.org/stable/c/cdd33d54e789d229d6d5007cbf3f53965ca1a5c6416baaa9-dc9f-4396-8d5f-8c081fb06d67
Mailing List
Patch
https://git.kernel.org/stable/c/f52d7663a10a1266a2d3871a6dd8fd111edc549f416baaa9-dc9f-4396-8d5f-8c081fb06d67
Mailing List
Patch
https://git.kernel.org/stable/c/fde2497d2bc3a063d8af88b258dbadc86bd7b57c416baaa9-dc9f-4396-8d5f-8c081fb06d67
Mailing List
Patch
https://git.kernel.org/stable/c/03a7e3f2ba3ca25f1da1d3898709a08db14c1abbaf854a3a-2127-422b-91ae-364da2661108
Mailing List
Patch
https://git.kernel.org/stable/c/74f852654b8b7866f15323685f1e178d3386c688af854a3a-2127-422b-91ae-364da2661108
Mailing List
Patch
https://git.kernel.org/stable/c/9840d1897e28f8733cc1e38f97e044f987dc0a63af854a3a-2127-422b-91ae-364da2661108
Mailing List
Patch
https://git.kernel.org/stable/c/a276c595c3a629170b0f052a3724f755d7c6adc6af854a3a-2127-422b-91ae-364da2661108
Mailing List
Patch
https://git.kernel.org/stable/c/b7fb63e807c6dadf7ecc1d43448c4f1711d7eeeeaf854a3a-2127-422b-91ae-364da2661108
Mailing List
Patch
https://git.kernel.org/stable/c/c8cc05de8e6b5612b6e9f92c385c1a064b0db375af854a3a-2127-422b-91ae-364da2661108
Mailing List
Patch
https://git.kernel.org/stable/c/cdd33d54e789d229d6d5007cbf3f53965ca1a5c6af854a3a-2127-422b-91ae-364da2661108
Mailing List
Patch
https://git.kernel.org/stable/c/f52d7663a10a1266a2d3871a6dd8fd111edc549faf854a3a-2127-422b-91ae-364da2661108
Mailing List
Patch
https://git.kernel.org/stable/c/fde2497d2bc3a063d8af88b258dbadc86bd7b57caf854a3a-2127-422b-91ae-364da2661108
Mailing List
Patch
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.htmlaf854a3a-2127-422b-91ae-364da2661108
Mailing List
https://lists.debian.org/debian-lts-announce/2024/06/msg00020.htmlaf854a3a-2127-422b-91ae-364da2661108
Mailing List
https://cert-portal.siemens.com/productcert/html/ssa-265688.html0b142b55-0307-4c5a-b3c9-f314f3fb7c5e
N/A
https://cert-portal.siemens.com/productcert/html/ssa-398330.html0b142b55-0307-4c5a-b3c9-f314f3fb7c5e
N/A
Hyperlink: https://git.kernel.org/stable/c/03a7e3f2ba3ca25f1da1d3898709a08db14c1abb
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Mailing List
Patch
Hyperlink: https://git.kernel.org/stable/c/74f852654b8b7866f15323685f1e178d3386c688
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Mailing List
Patch
Hyperlink: https://git.kernel.org/stable/c/9840d1897e28f8733cc1e38f97e044f987dc0a63
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Mailing List
Patch
Hyperlink: https://git.kernel.org/stable/c/a276c595c3a629170b0f052a3724f755d7c6adc6
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Mailing List
Patch
Hyperlink: https://git.kernel.org/stable/c/b7fb63e807c6dadf7ecc1d43448c4f1711d7eeee
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Mailing List
Patch
Hyperlink: https://git.kernel.org/stable/c/c8cc05de8e6b5612b6e9f92c385c1a064b0db375
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Mailing List
Patch
Hyperlink: https://git.kernel.org/stable/c/cdd33d54e789d229d6d5007cbf3f53965ca1a5c6
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Mailing List
Patch
Hyperlink: https://git.kernel.org/stable/c/f52d7663a10a1266a2d3871a6dd8fd111edc549f
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Mailing List
Patch
Hyperlink: https://git.kernel.org/stable/c/fde2497d2bc3a063d8af88b258dbadc86bd7b57c
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Mailing List
Patch
Hyperlink: https://git.kernel.org/stable/c/03a7e3f2ba3ca25f1da1d3898709a08db14c1abb
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Patch
Hyperlink: https://git.kernel.org/stable/c/74f852654b8b7866f15323685f1e178d3386c688
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Patch
Hyperlink: https://git.kernel.org/stable/c/9840d1897e28f8733cc1e38f97e044f987dc0a63
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Patch
Hyperlink: https://git.kernel.org/stable/c/a276c595c3a629170b0f052a3724f755d7c6adc6
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Patch
Hyperlink: https://git.kernel.org/stable/c/b7fb63e807c6dadf7ecc1d43448c4f1711d7eeee
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Patch
Hyperlink: https://git.kernel.org/stable/c/c8cc05de8e6b5612b6e9f92c385c1a064b0db375
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Patch
Hyperlink: https://git.kernel.org/stable/c/cdd33d54e789d229d6d5007cbf3f53965ca1a5c6
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Patch
Hyperlink: https://git.kernel.org/stable/c/f52d7663a10a1266a2d3871a6dd8fd111edc549f
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Patch
Hyperlink: https://git.kernel.org/stable/c/fde2497d2bc3a063d8af88b258dbadc86bd7b57c
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Patch
Hyperlink: https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Hyperlink: https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Hyperlink: https://cert-portal.siemens.com/productcert/html/ssa-265688.html
Source: 0b142b55-0307-4c5a-b3c9-f314f3fb7c5e
Resource: N/A
Hyperlink: https://cert-portal.siemens.com/productcert/html/ssa-398330.html
Source: 0b142b55-0307-4c5a-b3c9-f314f3fb7c5e
Resource: N/A
Change History
0Changes found

Details not found