First published: Mon Oct 21 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: r8169: add tally counter fields added with RTL8125 RTL8125 added fields to the tally counter, what may result in the chip dma'ing these new fields to unallocated memory. Therefore make sure that the allocated memory area is big enough to hold all of the tally counter values, even if we use only parts of it.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | >=5.4<5.10.227 | |
Linux Kernel | >=5.11<5.15.168 | |
Linux Kernel | >=5.16<6.1.113 | |
Linux Kernel | >=6.2<6.6.55 | |
Linux Kernel | >=6.7<6.10.14 | |
Linux Kernel | >=6.11<6.11.3 | |
debian/linux | <=5.10.223-1<=5.10.226-1 | 6.1.123-1 6.1.128-1 6.12.12-1 6.12.15-1 |
debian/linux-6.1 | 6.1.119-1~deb11u1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-49973 has been classified with a severity level that indicates it may lead to DMA'ing to unallocated memory, which poses potential security risks.
To fix CVE-2024-49973, update to the latest affected Linux kernel version as provided by your distribution.
CVE-2024-49973 affects Linux kernel versions from 5.4 to 6.11.3, including several specific version ranges.
CVE-2024-49973 addresses a vulnerability related to the addition of tally counter fields in the RTL8125 network driver.
The recommended versions to upgrade to for CVE-2024-49973 include recent releases such as 6.1.123-1 and 6.12.12-1.