{"id":"CVE-2024-50188","summary":"net: phy: dp83869: fix memory corruption when enabling fiber","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nnet: phy: dp83869: fix memory corruption when enabling fiber\n\nWhen configuring the fiber port, the DP83869 PHY driver incorrectly\ncalls linkmode_set_bit() with a bit mask (1 \u003c\u003c 10) rather than a bit\nnumber (10). This corrupts some other memory location -- in case of\narm64 the priv pointer in the same structure.\n\nSince the advertising flags are updated from supported at the end of the\nfunction the incorrect line isn't needed at all and can be removed.","modified":"2026-04-02T12:21:19.879524Z","published":"2024-11-08T05:38:29.127Z","related":["SUSE-SU-2024:4314-1","SUSE-SU-2024:4315-1","SUSE-SU-2024:4316-1","SUSE-SU-2024:4318-1","SUSE-SU-2024:4364-1","SUSE-SU-2024:4376-1","SUSE-SU-2024:4387-1","SUSE-SU-2025:20163-1","SUSE-SU-2025:20164-1","SUSE-SU-2025:20246-1","SUSE-SU-2025:20247-1","USN-7276-1","USN-7277-1","openSUSE-SU-2024:14500-1","openSUSE-SU-2025:14705-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/50xxx/CVE-2024-50188.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/21b5af7f0c99b3bf1fd02016e6708b613acbcaf4"},{"type":"WEB","url":"https://git.kernel.org/stable/c/9ca634676ff66e1d616259e136f96f96b2a1759a"},{"type":"WEB","url":"https://git.kernel.org/stable/c/a842e443ca8184f2dc82ab307b43a8b38defd6a5"},{"type":"WEB","url":"https://git.kernel.org/stable/c/ad0d76b8ee5db063791cc2e7a30ffc9852ac37c4"},{"type":"WEB","url":"https://git.kernel.org/stable/c/c1944b4253649fc6f2fb53e7d6302eb414d2182c"},{"type":"WEB","url":"https://git.kernel.org/stable/c/e3f2de32dae35bc7d173377dc97b5bc9fcd9fc84"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/50xxx/CVE-2024-50188.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50188"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"a29de52ba2a156873505d8b8cef44e69925b8114"},{"fixed":"21b5af7f0c99b3bf1fd02016e6708b613acbcaf4"},{"fixed":"ad0d76b8ee5db063791cc2e7a30ffc9852ac37c4"},{"fixed":"c1944b4253649fc6f2fb53e7d6302eb414d2182c"},{"fixed":"9ca634676ff66e1d616259e136f96f96b2a1759a"},{"fixed":"e3f2de32dae35bc7d173377dc97b5bc9fcd9fc84"},{"fixed":"a842e443ca8184f2dc82ab307b43a8b38defd6a5"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-50188.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}]}