First published: Wed Dec 04 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: vdpa: solidrun: Fix UB bug with devres In psnet_open_pf_bar() and snet_open_vf_bar() a string later passed to pcim_iomap_regions() is placed on the stack. Neither pcim_iomap_regions() nor the functions it calls copy that string. Should the string later ever be used, this, consequently, causes undefined behavior since the stack frame will by then have disappeared. Fix the bug by allocating the strings on the heap through devm_kasprintf().
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | <=6.3 | |
Linux Kernel | >=6.6.0<6.6.63 | |
Linux Kernel | >=6.11.0<6.11.10 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.15-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-53126 has a medium severity rating due to potential instability caused by the unbounded bug.
To fix CVE-2024-53126, update the Linux kernel to a version above 6.3 or between 6.6.0 and 6.6.63 or between 6.11.0 and 6.11.10.
CVE-2024-53126 affects Linux kernel versions up to 6.3 and versions between 6.6.0 to 6.6.63 and 6.11.0 to 6.11.10.
The vulnerability involves the vdpa component and functions like psnet_open_pf_bar() and snet_open_vf_bar() in the Linux kernel.
CVE-2024-53126 does not directly describe remote code execution but may lead to instability in the kernel which could be exploited.