First published: Tue Dec 24 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: EDAC/bluefield: Fix potential integer overflow The 64-bit argument for the "get DIMM info" SMC call consists of mem_ctrl_idx left-shifted 16 bits and OR-ed with DIMM index. With mem_ctrl_idx defined as 32-bits wide the left-shift operation truncates the upper 16 bits of information during the calculation of the SMC argument. The mem_ctrl_idx stack variable must be defined as 64-bits wide to prevent any potential integer overflow, i.e. loss of data from upper 16 bits.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | >=5.4<5.4.287 | |
Linux Kernel | >=5.5<5.10.231 | |
Linux Kernel | >=5.11<5.15.174 | |
Linux Kernel | >=5.16<6.1.120 | |
Linux Kernel | >=6.2<6.6.64 | |
Linux Kernel | >=6.7<6.11.11 | |
Linux Kernel | >=6.12<6.12.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-53161 has been classified as a high severity vulnerability due to its potential for integer overflow in the Linux kernel.
To fix CVE-2024-53161, update the Linux kernel to a version that includes the fix for this vulnerability.
CVE-2024-53161 affects Linux kernel versions from 5.4 to 6.12.2, excluding patched versions.
CVE-2024-53161 could potentially allow unauthorized access or manipulation of memory through the affected integer overflow.
There is no official workaround for CVE-2024-53161; updating the kernel is the recommended solution.