{"id":"CVE-2024-57850","summary":"jffs2: Prevent rtime decompress memory corruption","details":"In the Linux kernel, the following vulnerability has been resolved:\n\njffs2: Prevent rtime decompress memory corruption\n\nThe rtime decompression routine does not fully check bounds during the\nentirety of the decompression pass and can corrupt memory outside the\ndecompression buffer if the compressed data is corrupted. This adds the\nrequired check to prevent this failure mode.","modified":"2026-03-20T12:41:02.449751Z","published":"2025-01-11T14:30:59.271Z","related":["MGASA-2025-0030","MGASA-2025-0032","SUSE-SU-2025:0289-1","SUSE-SU-2025:0428-1","SUSE-SU-2025:0499-1","SUSE-SU-2025:0556-1","SUSE-SU-2025:0557-1","SUSE-SU-2025:0577-1","SUSE-SU-2025:0577-2","SUSE-SU-2025:0603-1","SUSE-SU-2025:20165-1","SUSE-SU-2025:20166-1","SUSE-SU-2025:20248-1","SUSE-SU-2025:20249-1","USN-7379-2","USN-7380-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/57xxx/CVE-2024-57850.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/421f9e9f0fae9f8e721ffa07f22d9765fa1214d5"},{"type":"WEB","url":"https://git.kernel.org/stable/c/47c9a7f81027a78afea9d2e9a54bfd8fabb6b3d0"},{"type":"WEB","url":"https://git.kernel.org/stable/c/6808a1812a3419542223e7fe9e2de577e99e45d1"},{"type":"WEB","url":"https://git.kernel.org/stable/c/bd384b04ad1995441b18fe6c1366d02de8c5d5eb"},{"type":"WEB","url":"https://git.kernel.org/stable/c/dc39b08fcc3831b0bc46add91ba93cd2aab50716"},{"type":"WEB","url":"https://git.kernel.org/stable/c/f6fc251baefc3cdc4f41f2f5a47940d7d4a67332"},{"type":"WEB","url":"https://git.kernel.org/stable/c/fe051552f5078fa02d593847529a3884305a6ffe"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/57xxx/CVE-2024-57850.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-57850"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"1da177e4c3f41524e886b7f1b8a0c1fc7321cac2"},{"fixed":"421f9e9f0fae9f8e721ffa07f22d9765fa1214d5"},{"fixed":"f6fc251baefc3cdc4f41f2f5a47940d7d4a67332"},{"fixed":"bd384b04ad1995441b18fe6c1366d02de8c5d5eb"},{"fixed":"47c9a7f81027a78afea9d2e9a54bfd8fabb6b3d0"},{"fixed":"6808a1812a3419542223e7fe9e2de577e99e45d1"},{"fixed":"dc39b08fcc3831b0bc46add91ba93cd2aab50716"},{"fixed":"fe051552f5078fa02d593847529a3884305a6ffe"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-57850.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}