CVE-2024-27407Classic Buffer Overflow in Linux

Severity
8.4HIGHNVD
EPSS
0.0%
top 96.61%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMay 17
Latest updateOct 8

Description

In the Linux kernel, the following vulnerability has been resolved: fs/ntfs3: Fixed overflow check in mi_enum_attr()

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 2.5 | Impact: 5.9

Affected Packages7 packages

NVDlinux/linux_kernel5.156.1.120+3
Debianlinux/linux_kernel< 6.1.123-1+2
Ubuntulinux/linux_kernel< 5.15.0-153.163+5
CVEListV5linux/linux4534a70b7056fd4b9a1c6db5a4ce3c98546b291ee99faa97359654b6e4e769246c72cf50a57e05b2+4
debiandebian/linux< linux 6.1.123-1 (bookworm)

Patches

🔴Vulnerability Details

9
OSV
Kernel Live Patch Security Notice2025-10-08
OSV
linux-oracle-5.15 vulnerabilities2025-09-25
OSV
linux-azure, linux-azure-5.15, linux-azure-fips vulnerabilities2025-09-18
OSV
linux-gke, linux-ibm-5.15, linux-kvm vulnerabilities2025-09-02
OSV
linux-realtime, linux-intel-iot-realtime vulnerabilities2025-08-28

📋Vendor Advisories

10
Ubuntu
Kernel Live Patch Security Notice2025-10-08
Ubuntu
Linux kernel (Oracle) vulnerabilities2025-09-25
Ubuntu
Linux kernel (Azure) vulnerabilities2025-09-18
Ubuntu
Linux kernel vulnerabilities2025-09-02
Ubuntu
Linux kernel (Real-time) vulnerabilities2025-08-28

💬Community

1
Bugzilla
CVE-2024-27407 kernel: fs/ntfs3: Fixed overflow check in mi_enum_attr()2024-05-17