First published: Mon Oct 21 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: ACPI: sysfs: validate return type of _STR method Only buffer objects are valid return values of _STR. If something else is returned description_show() will access invalid memory.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | >=3.7<5.10.227 | |
Linux Kernel | >=5.11<5.15.168 | |
Linux Kernel | >=5.16<6.1.113 | |
Linux Kernel | >=6.2<6.6.54 | |
Linux Kernel | >=6.7<6.10.13 | |
Linux Kernel | >=6.11<6.11.2 | |
debian/linux | <=5.10.223-1<=5.10.226-1 | 6.1.123-1 6.1.128-1 6.12.12-1 6.12.15-1 |
debian/linux-6.1 | 6.1.119-1~deb11u1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-49860 has not been assigned a specific severity rating, but it involves a potential memory access violation in the Linux kernel.
To mitigate CVE-2024-49860, upgrade to a fixed version of the Linux kernel, such as 6.1.123-1, 6.1.128-1, 6.12.12-1, or 6.12.13-1.
CVE-2024-49860 affects Linux kernel versions from 3.7 up to 5.10.227, 5.11 up to 5.15.168, 5.16 up to 6.1.113, 6.2 up to 6.6.54, 6.7 up to 6.10.13, and 6.11 up to 6.11.2.
CVE-2024-49860 primarily impacts the ACPI component of the Linux kernel, specifically affecting the _STR method.
Yes, CVE-2024-49860 can potentially lead to system instability or crashes due to invalid memory accesses.