{"vulnerability": "CVE-2024-46780", "sightings": [{"uuid": "b6479510-5074-47fc-9456-76d99e6696db", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-46780", "type": "seen", "source": "https://t.me/cvedetector/5941", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-46780 - \"Linux Nilfs2 Sysfs Attribute Denial of Service Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2024-46780 \nPublished : Sept. 18, 2024, 8:15 a.m. | 35\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \nnilfs2: protect references to superblock parameters exposed in sysfs  \n  \nThe superblock buffers of nilfs2 can not only be overwritten at runtime  \nfor modifications/repairs, but they are also regularly swapped, replaced  \nduring resizing, and even abandoned when degrading to one side due to  \nbacking device issues.  So, accessing them requires mutual exclusion using  \nthe reader/writer semaphore \"nilfs-&gt;ns_sem\".  \n  \nSome sysfs attribute show methods read this superblock buffer without the  \nnecessary mutual exclusion, which can cause problems with pointer  \ndereferencing and memory access, so fix it. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-18T10:52:45.000000Z"}, {"uuid": "ac5b9b41-edf7-4c59-b436-c0fcef418e46", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-46780", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-226-07", "content": "", "creation_timestamp": "2025-08-14T10:00:00.000000Z"}]}