ghsa-x4qv-v3fh-v8rj
Vulnerability from github
Published
2024-05-20 12:30
Modified
2024-06-26 00:31
Details
In the Linux kernel, the following vulnerability has been resolved:
bounds: Use the right number of bits for power-of-two CONFIG_NR_CPUS
bits_per() rounds up to the next power of two when passed a power of two. This causes crashes on some machines and configurations.
{ "affected": [], "aliases": [ "CVE-2024-35983" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2024-05-20T10:15:12Z", "severity": null }, "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nbounds: Use the right number of bits for power-of-two CONFIG_NR_CPUS\n\nbits_per() rounds up to the next power of two when passed a power of\ntwo. This causes crashes on some machines and configurations.", "id": "GHSA-x4qv-v3fh-v8rj", "modified": "2024-06-26T00:31:43Z", "published": "2024-05-20T12:30:29Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-35983" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/15aa09d6d84629eb5296de30ac0aa19a33512f16" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/5af385f5f4cddf908f663974847a4083b2ff2c79" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/66297b2ceda841f809637731d287bda3a93b49d8" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/93ba36238db6a74a82feb3dc476e25ea424ad630" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/9b7c5004d7c5ae062134052a85290869a015814c" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/d34a516f2635090d36a306f84573e8de3d7374ce" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/ebfe41889b762f1933c6762f6624b9724a25bee0" }, { "type": "WEB", "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html" } ], "schema_version": "1.4.0", "severity": [] }
Loading...