{"id":"CVE-2024-49860","summary":"ACPI: sysfs: validate return type of _STR method","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nACPI: sysfs: validate return type of _STR method\n\nOnly buffer objects are valid return values of _STR.\n\nIf something else is returned description_show() will access invalid\nmemory.","modified":"2026-04-16T04:34:21.436362249Z","published":"2024-10-21T12:27:18.640Z","related":["SUSE-SU-2024:3983-1","SUSE-SU-2024:3984-1","SUSE-SU-2024:3985-1","SUSE-SU-2024:3986-1","SUSE-SU-2024:4038-1","SUSE-SU-2024:4081-1","SUSE-SU-2024:4082-1","SUSE-SU-2024:4100-1","SUSE-SU-2024:4103-1","SUSE-SU-2024:4131-1","SUSE-SU-2024:4140-1","SUSE-SU-2024:4318-1","SUSE-SU-2024:4364-1","SUSE-SU-2024:4387-1","SUSE-SU-2025:0034-1","SUSE-SU-2025:03315-1","SUSE-SU-2025:03329-1","SUSE-SU-2025:03337-1","SUSE-SU-2025:03341-1","SUSE-SU-2025:03358-1","SUSE-SU-2025:03370-1","SUSE-SU-2025:03374-1","SUSE-SU-2025:03393-1","SUSE-SU-2025:03406-1","SUSE-SU-2025:20163-1","SUSE-SU-2025:20164-1","SUSE-SU-2025:20246-1","SUSE-SU-2025:20247-1","SUSE-SU-2025:20722-1","SUSE-SU-2025:20723-1","SUSE-SU-2025:20768-1","SUSE-SU-2025:20784-1","SUSE-SU-2025:4123-1","USN-7276-1","USN-7277-1","openSUSE-SU-2024:14500-1","openSUSE-SU-2025:14705-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/49xxx/CVE-2024-49860.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/0cdfb9178a3bba843c95c2117c82c15f1a64b9ce"},{"type":"WEB","url":"https://git.kernel.org/stable/c/2364b6af90c6b6d8a4783e0d3481ca80af699554"},{"type":"WEB","url":"https://git.kernel.org/stable/c/4b081991c4363e072e1748efed0bbec8a77daba5"},{"type":"WEB","url":"https://git.kernel.org/stable/c/4bb1e7d027413835b086aed35bc3f0713bc0f72b"},{"type":"WEB","url":"https://git.kernel.org/stable/c/5c8d007c14aefc3f2ddf71e4c40713733dc827be"},{"type":"WEB","url":"https://git.kernel.org/stable/c/92fd5209fc014405f63a7db79802ca4b01dc0c05"},{"type":"WEB","url":"https://git.kernel.org/stable/c/f0921ecd4ddc14646bb5511f49db4d7d3b0829f0"},{"type":"WEB","url":"https://git.kernel.org/stable/c/f51e5a88f2e7224858b261546cf6b3037dfb1323"},{"type":"WEB","url":"https://git.kernel.org/stable/c/f51f711d36e61fbb87c67b524fd200e05172668d"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/49xxx/CVE-2024-49860.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-49860"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"d1efe3c324ead77d3f6cd85093b50f6bd2e17aba"},{"fixed":"92fd5209fc014405f63a7db79802ca4b01dc0c05"},{"fixed":"2364b6af90c6b6d8a4783e0d3481ca80af699554"},{"fixed":"4b081991c4363e072e1748efed0bbec8a77daba5"},{"fixed":"0cdfb9178a3bba843c95c2117c82c15f1a64b9ce"},{"fixed":"5c8d007c14aefc3f2ddf71e4c40713733dc827be"},{"fixed":"f0921ecd4ddc14646bb5511f49db4d7d3b0829f0"},{"fixed":"f51e5a88f2e7224858b261546cf6b3037dfb1323"},{"fixed":"f51f711d36e61fbb87c67b524fd200e05172668d"},{"fixed":"4bb1e7d027413835b086aed35bc3f0713bc0f72b"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-49860.json"}}],"schema_version":"1.7.5"}