First published: Mon Oct 21 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: block: fix integer overflow in BLKSECDISCARD I independently rediscovered commit 22d24a544b0d49bbcbd61c8c0eaf77d3c9297155 block: fix overflow in blk_ioctl_discard() but for secure erase. Same problem: uint64_t r[2] = {512, 18446744073709551104ULL}; ioctl(fd, BLKSECDISCARD, r); will enter near infinite loop inside blkdev_issue_secure_erase(): a.out: attempt to access beyond end of device loop0: rw=5, sector=3399043073, nr_sectors = 1024 limit=2048 bio_check_eod: 3286214 callbacks suppressed
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | <6.10.14 | |
Linux Kernel | >=6.11<6.11.3 | |
debian/linux | <=5.10.223-1<=5.10.226-1<=6.1.123-1 | 6.1.128-1 6.12.12-1 6.12.15-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-49994 has been assigned a severity rating that indicates a potential risk to the Linux kernel if not addressed.
To fix CVE-2024-49994, update to the latest version of the Linux kernel as specified in the affected software list.
CVE-2024-49994 affects Linux kernel versions prior to 6.10.14 and between 6.11.0 to 6.11.3.
Yes, patches are available in the latest kernel releases; ensure you are running updated versions to mitigate the vulnerability.
Exploiting CVE-2024-49994 could potentially allow an attacker to execute arbitrary code or cause a denial of service.