CVE-2024-46777

Source
https://cve.org/CVERecord?id=CVE-2024-46777
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-46777.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-46777
Downstream
Related
Published
2024-09-18T07:12:34.315Z
Modified
2026-03-11T07:47:26.803134Z
Summary
udf: Avoid excessive partition lengths
Details

In the Linux kernel, the following vulnerability has been resolved:

udf: Avoid excessive partition lengths

Avoid mounting filesystems where the partition would overflow the 32-bits used for block number. Also refuse to mount filesystems where the partition length is so large we cannot safely index bits in a block bitmap.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/46xxx/CVE-2024-46777.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Fixed
c0c23130d38e8bc28e9ef581443de9b1fc749966
Fixed
1497a4484cdb2cf6c37960d788fb6ba67567bdb7
Fixed
551966371e17912564bc387fbeb2ac13077c3db1
Fixed
2ddf831451357c6da4b64645eb797c93c1c054d1
Fixed
0173999123082280cf904bd640015951f194a294
Fixed
a56330761950cb83de1dfb348479f20c56c95f90
Fixed
925fd8ee80d5348a5e965548e5484d164d19221d
Fixed
ebbe26fd54a9621994bc16b14f2ba8f84c089693

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-46777.json"