CVE-2024-53161

In the Linux kernel, the following vulnerability has been resolved: EDAC/bluefield: Fix potential integer overflow The 64-bit argument for the "get DIMM info" SMC call consists of mem_ctrl_idx left-shifted 16 bits and OR-ed with DIMM index. With mem_ctrl_idx defined as 32-bits wide the left-shift operation truncates the upper 16 bits of information during the calculation of the SMC argument. The mem_ctrl_idx stack variable must be defined as 64-bits wide to prevent any potential integer overflow, i.e. loss of data from upper 16 bits.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

03 Feb 2025, 15:25

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Summary
  • (es) En el kernel de Linux, se resolvió la siguiente vulnerabilidad: EDAC/bluefield: corrige un posible desbordamiento de enteros. El argumento de 64 bits para la llamada SMC "obtener información DIMM" consta de mem_ctrl_idx desplazado a la izquierda 16 bits y con operación OR con índice DIMM. Con mem_ctrl_idx definido como 32 bits de ancho, la operación de desplazamiento a la izquierda trunca los 16 bits superiores de información durante el cálculo del argumento SMC. La variable de pila mem_ctrl_idx debe definirse como de 64 bits de ancho para evitar cualquier posible desbordamiento de enteros, es decir, pérdida de datos de los 16 bits superiores.
First Time Linux linux Kernel
Linux
References () https://git.kernel.org/stable/c/000930193fe5eb79ce5563ee2e9ddb0c6e4e1bb5 - () https://git.kernel.org/stable/c/000930193fe5eb79ce5563ee2e9ddb0c6e4e1bb5 - Patch
References () https://git.kernel.org/stable/c/1fe774a93b46bb029b8f6fa9d1f25affa53f06c6 - () https://git.kernel.org/stable/c/1fe774a93b46bb029b8f6fa9d1f25affa53f06c6 - Patch
References () https://git.kernel.org/stable/c/4ad7033de109d0fec99086f352f58a3412e378b8 - () https://git.kernel.org/stable/c/4ad7033de109d0fec99086f352f58a3412e378b8 - Patch
References () https://git.kernel.org/stable/c/578ca89b04680145d41011e7cec8806fefbb59e7 - () https://git.kernel.org/stable/c/578ca89b04680145d41011e7cec8806fefbb59e7 - Patch
References () https://git.kernel.org/stable/c/8cc31cfa36ff37aff399b72faa2ded58110112ae - () https://git.kernel.org/stable/c/8cc31cfa36ff37aff399b72faa2ded58110112ae - Patch
References () https://git.kernel.org/stable/c/ac6ebb9edcdb7077e841862c402697c4c48a7c0a - () https://git.kernel.org/stable/c/ac6ebb9edcdb7077e841862c402697c4c48a7c0a - Patch
References () https://git.kernel.org/stable/c/e0269ea7a628fdeddd65b92fe29c09655dbb80b9 - () https://git.kernel.org/stable/c/e0269ea7a628fdeddd65b92fe29c09655dbb80b9 - Patch
References () https://git.kernel.org/stable/c/fdb90006184aa84c7b4e09144ed0936d4e1891a7 - () https://git.kernel.org/stable/c/fdb90006184aa84c7b4e09144ed0936d4e1891a7 - Patch
CWE CWE-190
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5

24 Dec 2024, 12:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-12-24 12:15

Updated : 2025-02-03 15:25


NVD link : CVE-2024-53161

Mitre link : CVE-2024-53161

CVE.ORG link : CVE-2024-53161


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-190

Integer Overflow or Wraparound