Skip to content

In the Linux kernel, the following vulnerability has been...

Unreviewed Published Dec 24, 2024 to the GitHub Advisory Database • Updated Dec 24, 2024

Package

No package listedSuggest a package

Affected versions

Unknown

Patched versions

Unknown

Description

In the Linux kernel, the following vulnerability has been resolved:

EDAC/bluefield: Fix potential integer overflow

The 64-bit argument for the "get DIMM info" SMC call consists of mem_ctrl_idx
left-shifted 16 bits and OR-ed with DIMM index. With mem_ctrl_idx defined as
32-bits wide the left-shift operation truncates the upper 16 bits of
information during the calculation of the SMC argument.

The mem_ctrl_idx stack variable must be defined as 64-bits wide to prevent any
potential integer overflow, i.e. loss of data from upper 16 bits.

References

Published by the National Vulnerability Database Dec 24, 2024
Published to the GitHub Advisory Database Dec 24, 2024
Last updated Dec 24, 2024

Severity

Unknown

EPSS score

0.044%
(15th percentile)

Weaknesses

No CWEs

CVE ID

CVE-2024-53161

GHSA ID

GHSA-mp8h-4283-jr44

Source code

No known source code

Dependabot alerts are not supported on this advisory because it does not have a package from a supported ecosystem with an affected and fixed version.

Learn more about GitHub language support

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.