๐Ÿ” CVE Alert

CVE-2024-53161

MEDIUM 5.5

EDAC/bluefield: Fix potential integer overflow

CVSS Score
5.5
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: EDAC/bluefield: Fix potential integer overflow The 64-bit argument for the "get DIMM info" SMC call consists of mem_ctrl_idx left-shifted 16 bits and OR-ed with DIMM index. With mem_ctrl_idx defined as 32-bits wide the left-shift operation truncates the upper 16 bits of information during the calculation of the SMC argument. The mem_ctrl_idx stack variable must be defined as 64-bits wide to prevent any potential integer overflow, i.e. loss of data from upper 16 bits.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Dec 24, 2024
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new medium vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
82413e562ea6eadfb6de946dcc6f74af31d64e7f < 8cc31cfa36ff37aff399b72faa2ded58110112ae 82413e562ea6eadfb6de946dcc6f74af31d64e7f < e0269ea7a628fdeddd65b92fe29c09655dbb80b9 82413e562ea6eadfb6de946dcc6f74af31d64e7f < 4ad7033de109d0fec99086f352f58a3412e378b8 82413e562ea6eadfb6de946dcc6f74af31d64e7f < 578ca89b04680145d41011e7cec8806fefbb59e7 82413e562ea6eadfb6de946dcc6f74af31d64e7f < ac6ebb9edcdb7077e841862c402697c4c48a7c0a 82413e562ea6eadfb6de946dcc6f74af31d64e7f < fdb90006184aa84c7b4e09144ed0936d4e1891a7 82413e562ea6eadfb6de946dcc6f74af31d64e7f < 000930193fe5eb79ce5563ee2e9ddb0c6e4e1bb5 82413e562ea6eadfb6de946dcc6f74af31d64e7f < 1fe774a93b46bb029b8f6fa9d1f25affa53f06c6
Linux / Linux
5.4

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/8cc31cfa36ff37aff399b72faa2ded58110112ae git.kernel.org: https://git.kernel.org/stable/c/e0269ea7a628fdeddd65b92fe29c09655dbb80b9 git.kernel.org: https://git.kernel.org/stable/c/4ad7033de109d0fec99086f352f58a3412e378b8 git.kernel.org: https://git.kernel.org/stable/c/578ca89b04680145d41011e7cec8806fefbb59e7 git.kernel.org: https://git.kernel.org/stable/c/ac6ebb9edcdb7077e841862c402697c4c48a7c0a git.kernel.org: https://git.kernel.org/stable/c/fdb90006184aa84c7b4e09144ed0936d4e1891a7 git.kernel.org: https://git.kernel.org/stable/c/000930193fe5eb79ce5563ee2e9ddb0c6e4e1bb5 git.kernel.org: https://git.kernel.org/stable/c/1fe774a93b46bb029b8f6fa9d1f25affa53f06c6 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html