{"uuid": "e5bf0209-3d0b-4c68-aaee-f422d935412f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57850", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/1328", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-57850\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\njffs2: Prevent rtime decompress memory corruption\n\nThe rtime decompression routine does not fully check bounds during the\nentirety of the decompression pass and can corrupt memory outside the\ndecompression buffer if the compressed data is corrupted. This adds the\nrequired check to prevent this failure mode.\n\ud83d\udccf Published: 2025-01-11T14:30:59.271Z\n\ud83d\udccf Modified: 2025-01-11T14:30:59.271Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/421f9e9f0fae9f8e721ffa07f22d9765fa1214d5\n2. https://git.kernel.org/stable/c/f6fc251baefc3cdc4f41f2f5a47940d7d4a67332\n3. https://git.kernel.org/stable/c/bd384b04ad1995441b18fe6c1366d02de8c5d5eb\n4. https://git.kernel.org/stable/c/47c9a7f81027a78afea9d2e9a54bfd8fabb6b3d0\n5. https://git.kernel.org/stable/c/6808a1812a3419542223e7fe9e2de577e99e45d1\n6. https://git.kernel.org/stable/c/dc39b08fcc3831b0bc46add91ba93cd2aab50716\n7. https://git.kernel.org/stable/c/fe051552f5078fa02d593847529a3884305a6ffe", "creation_timestamp": "2025-01-11T15:05:19.000000Z"}