{"uuid": "59d7da03-a6d1-4348-8b79-3a042276bf0a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39482", "type": "seen", "source": "https://t.me/cvedetector/84", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-39482 - In the Linux kernel, the following vulnerability h\", \n  \"Content\": \"CVE ID : CVE-2024-39482 \nPublished : July 5, 2024, 7:15 a.m. | 17\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved: \n \nbcache: fix variable length array abuse in btree_iter \n \nbtree_iter is used in two ways: either allocated on the stack with a \nfixed size MAX_BSETS, or from a mempool with a dynamic size based on the \nspecific cache set. Previously, the struct had a fixed-length array of \nsize MAX_BSETS which was indexed out-of-bounds for the dynamically-sized \niterators, which causes UBSAN to complain. \n \nThis patch uses the same approach as in bcachefs's sort_iter and splits \nthe iterator into a btree_iter with a flexible array member and a \nbtree_iter_stack which embeds a btree_iter as well as a fixed-length \ndata array. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-05T09:34:10.000000Z"}