In the Linux kernel, the following vulnerability has been resolved: EDAC/bluefield: Fix potential integer overflow The 64-bit argument for the "get DIMM info" SMC call consists of mem_ctrl_idx left-shifted 16 bits and OR-ed with DIMM index. With mem_ctrl_idx defined as 32-bits wide the left-shift operation truncates the upper 16 bits of information during the calculation of the SMC argument. The mem_ctrl_idx stack variable must be defined as 64-bits wide to prevent any potential integer overflow, i.e. loss of data from upper 16 bits.
History

Wed, 25 Dec 2024 13:30:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}

threat_severity

Important


Tue, 24 Dec 2024 11:45:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: EDAC/bluefield: Fix potential integer overflow The 64-bit argument for the "get DIMM info" SMC call consists of mem_ctrl_idx left-shifted 16 bits and OR-ed with DIMM index. With mem_ctrl_idx defined as 32-bits wide the left-shift operation truncates the upper 16 bits of information during the calculation of the SMC argument. The mem_ctrl_idx stack variable must be defined as 64-bits wide to prevent any potential integer overflow, i.e. loss of data from upper 16 bits.
Title EDAC/bluefield: Fix potential integer overflow
References

cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published: 2024-12-24T11:29:01.938Z

Updated: 2024-12-24T11:29:01.938Z

Reserved: 2024-11-19T17:17:25.002Z

Link: CVE-2024-53161

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2024-12-24T12:15:24.453

Modified: 2024-12-24T12:15:24.453

Link: CVE-2024-53161

cve-icon Redhat

Severity : Important

Publid Date: 2024-12-24T00:00:00Z

Links: CVE-2024-53161 - Bugzilla