{"vulnerability": "CVE-2024-57850", "sightings": [{"uuid": "83a4ebe6-dc1b-4456-88c5-2ad0707267bc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57850", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfhyrf5y7d2m", "content": "", "creation_timestamp": "2025-01-11T15:15:33.376134Z"}, {"uuid": "e5bf0209-3d0b-4c68-aaee-f422d935412f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57850", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/1328", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-57850\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\njffs2: Prevent rtime decompress memory corruption\n\nThe rtime decompression routine does not fully check bounds during the\nentirety of the decompression pass and can corrupt memory outside the\ndecompression buffer if the compressed data is corrupted. This adds the\nrequired check to prevent this failure mode.\n\ud83d\udccf Published: 2025-01-11T14:30:59.271Z\n\ud83d\udccf Modified: 2025-01-11T14:30:59.271Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/421f9e9f0fae9f8e721ffa07f22d9765fa1214d5\n2. https://git.kernel.org/stable/c/f6fc251baefc3cdc4f41f2f5a47940d7d4a67332\n3. https://git.kernel.org/stable/c/bd384b04ad1995441b18fe6c1366d02de8c5d5eb\n4. https://git.kernel.org/stable/c/47c9a7f81027a78afea9d2e9a54bfd8fabb6b3d0\n5. https://git.kernel.org/stable/c/6808a1812a3419542223e7fe9e2de577e99e45d1\n6. https://git.kernel.org/stable/c/dc39b08fcc3831b0bc46add91ba93cd2aab50716\n7. https://git.kernel.org/stable/c/fe051552f5078fa02d593847529a3884305a6ffe", "creation_timestamp": "2025-01-11T15:05:19.000000Z"}, {"uuid": "a3a201b8-23f9-4a98-ba2b-5ea996f5dd49", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57850", "type": "seen", "source": "https://t.me/cvedetector/15092", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-57850 - Linux JFFS2 Memory Corruption (Bounds Error) Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-57850 \nPublished : Jan. 11, 2025, 3:15 p.m. | 42\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \njffs2: Prevent rtime decompress memory corruption  \n  \nThe rtime decompression routine does not fully check bounds during the  \nentirety of the decompression pass and can corrupt memory outside the  \ndecompression buffer if the compressed data is corrupted. This adds the  \nrequired check to prevent this failure mode. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-11T17:26:40.000000Z"}, {"uuid": "8ebf1de9-ad07-4128-a096-c00bd27449ac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57850", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113810229099255433", "content": "", "creation_timestamp": "2025-01-11T14:37:59.548197Z"}, {"uuid": "747b10fd-9305-414c-985a-28e1a0303d57", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57850", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/113810514473001111", "content": "", "creation_timestamp": "2025-01-11T15:50:33.945464Z"}]}