First published: Tue Nov 05 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: firewire: core: fix invalid port index for parent device In a commit 24b7f8e5cd65 ("firewire: core: use helper functions for self ID sequence"), the enumeration over self ID sequence was refactored with some helper functions with KUnit tests. These helper functions are guaranteed to work expectedly by the KUnit tests, however their application includes a mistake to assign invalid value to the index of port connected to parent device. This bug affects the case that any extra node devices which has three or more ports are connected to 1394 OHCI controller. In the case, the path to update the tree cache could hits WARN_ON(), and gets general protection fault due to the access to invalid address computed by the invalid value. This commit fixes the bug to assign correct port index.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | >=6.11<6.11.6 | |
Linux Kernel | =6.12-rc1 | |
Linux Kernel | =6.12-rc2 | |
Linux Kernel | =6.12-rc3 | |
Linux Kernel | =6.12-rc4 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.15-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-50113 has been classified as a high severity vulnerability due to its potential impact on the Linux kernel.
To fix CVE-2024-50113, upgrade to a patched version of the Linux kernel such as 5.10.223-1, 6.1.123-1, or 6.12.12-1.
CVE-2024-50113 affects Linux kernel versions from 6.11 to 6.12-rc4.
Yes, CVE-2024-50113 is related to a vulnerability in the Firewire support within the Linux kernel.
The potential impact of CVE-2024-50113 includes abnormal kernel behavior and possible denial of service conditions.