Количество 12
Количество 12
CVE-2023-52756
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
CVE-2023-52756
[REJECTED CVE] A double shift vulnerability was identified in the Linux kernel's pwm subsystem. The issue involves passing a shifted value instead of a bit number to set/test_bit() functions, resulting in a double shift (e.g., BIT(BIT(1))). While this doesn't cause problems for values 0 or 1, values of 5 or higher could lead to a buffer overflow, potentially allowing attackers to cause a denial of service.
CVE-2023-52756
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
GHSA-fpr7-5xj6-wq2c
In the Linux kernel, the following vulnerability has been resolved: pwm: Fix double shift bug These enums are passed to set/test_bit(). The set/test_bit() functions take a bit number instead of a shifted value. Passing a shifted value is a double shift bug like doing BIT(BIT(1)). The double shift bug doesn't cause a problem here because we are only checking 0 and 1 but if the value was 5 or above then it can lead to a buffer overflow.
RLSA-2024:5101
Important: kernel security update
ELSA-2024-5101
ELSA-2024-5101: kernel security update (IMPORTANT)
SUSE-SU-2024:2189-1
Security update for the Linux Kernel
SUSE-SU-2024:3195-1
Security update for the Linux Kernel
ELSA-2024-9315
ELSA-2024-9315: kernel security update (MODERATE)
SUSE-SU-2024:2019-1
Security update for the Linux Kernel
SUSE-SU-2024:2190-1
Security update for the Linux Kernel
SUSE-SU-2024:2008-1
Security update for the Linux Kernel
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2023-52756 Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | больше 1 года назад | |||
CVE-2023-52756 [REJECTED CVE] A double shift vulnerability was identified in the Linux kernel's pwm subsystem. The issue involves passing a shifted value instead of a bit number to set/test_bit() functions, resulting in a double shift (e.g., BIT(BIT(1))). While this doesn't cause problems for values 0 or 1, values of 5 or higher could lead to a buffer overflow, potentially allowing attackers to cause a denial of service. | CVSS3: 4.4 | больше 1 года назад | ||
CVE-2023-52756 Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | больше 1 года назад | |||
GHSA-fpr7-5xj6-wq2c In the Linux kernel, the following vulnerability has been resolved: pwm: Fix double shift bug These enums are passed to set/test_bit(). The set/test_bit() functions take a bit number instead of a shifted value. Passing a shifted value is a double shift bug like doing BIT(BIT(1)). The double shift bug doesn't cause a problem here because we are only checking 0 and 1 but if the value was 5 or above then it can lead to a buffer overflow. | больше 1 года назад | |||
RLSA-2024:5101 Important: kernel security update | около 1 года назад | |||
ELSA-2024-5101 ELSA-2024-5101: kernel security update (IMPORTANT) | больше 1 года назад | |||
SUSE-SU-2024:2189-1 Security update for the Linux Kernel | больше 1 года назад | |||
SUSE-SU-2024:3195-1 Security update for the Linux Kernel | около 1 года назад | |||
ELSA-2024-9315 ELSA-2024-9315: kernel security update (MODERATE) | около 1 года назад | |||
SUSE-SU-2024:2019-1 Security update for the Linux Kernel | больше 1 года назад | |||
SUSE-SU-2024:2190-1 Security update for the Linux Kernel | больше 1 года назад | |||
SUSE-SU-2024:2008-1 Security update for the Linux Kernel | больше 1 года назад |
Уязвимостей на страницу