In the Linux kernel, the following vulnerability has been...
Unreviewed
Published
Dec 24, 2024
to the GitHub Advisory Database
•
Updated Dec 24, 2024
Description
Published by the National Vulnerability Database
Dec 24, 2024
Published to the GitHub Advisory Database
Dec 24, 2024
Last updated
Dec 24, 2024
In the Linux kernel, the following vulnerability has been resolved:
EDAC/bluefield: Fix potential integer overflow
The 64-bit argument for the "get DIMM info" SMC call consists of mem_ctrl_idx
left-shifted 16 bits and OR-ed with DIMM index. With mem_ctrl_idx defined as
32-bits wide the left-shift operation truncates the upper 16 bits of
information during the calculation of the SMC argument.
The mem_ctrl_idx stack variable must be defined as 64-bits wide to prevent any
potential integer overflow, i.e. loss of data from upper 16 bits.
References