-
CVE-2023-52683
- EPSS 0.07%
- Published 17.05.2024 15:15:19
- Last modified 21.11.2024 08:40:21
- Source 416baaa9-dc9f-4396-8d5f-8c081f
- Teams watchlist Login
- Open Login
In the Linux kernel, the following vulnerability has been resolved: ACPI: LPIT: Avoid u32 multiplication overflow In lpit_update_residency() there is a possibility of overflow in multiplication, if tsc_khz is large enough (> UINT_MAX/1000). Change multiplication to mul_u32_u32(). Found by Linux Verification Center (linuxtesting.org) with SVACE.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
≫
Product
Linux
Default Statusunaffected
Version <
647d1d50c31e60ef9ccb9756a8fdf863329f7aee
Version
eeb2d80d502af28e5660ff4bbe00f90ceb82c2db
Status
affected
Version <
6c38e791bde07d6ca2a0a619ff9b6837e0d5f9ad
Version
eeb2d80d502af28e5660ff4bbe00f90ceb82c2db
Status
affected
Version <
f39c3d578c7d09a18ceaf56750fc7f20b02ada63
Version
eeb2d80d502af28e5660ff4bbe00f90ceb82c2db
Status
affected
Version <
c1814a4ffd016ce5392c6767d22ef3aa2f0d4bd1
Version
eeb2d80d502af28e5660ff4bbe00f90ceb82c2db
Status
affected
Version <
72222dfd76a79d9666ab3117fcdd44ca8cd0c4de
Version
eeb2d80d502af28e5660ff4bbe00f90ceb82c2db
Status
affected
Version <
d1ac288b2742aa4af746c5613bac71760fadd1c4
Version
eeb2d80d502af28e5660ff4bbe00f90ceb82c2db
Status
affected
Version <
b7aab9d906e2e252a7783f872406033ec49b6dae
Version
eeb2d80d502af28e5660ff4bbe00f90ceb82c2db
Status
affected
Version <
56d2eeda87995245300836ee4dbd13b002311782
Version
eeb2d80d502af28e5660ff4bbe00f90ceb82c2db
Status
affected
VendorLinux
≫
Product
Linux
Default Statusaffected
Version
4.15
Status
affected
Version <
4.15
Version
0
Status
unaffected
Version <=
4.19.*
Version
4.19.306
Status
unaffected
Version <=
5.4.*
Version
5.4.268
Status
unaffected
Version <=
5.10.*
Version
5.10.209
Status
unaffected
Version <=
5.15.*
Version
5.15.148
Status
unaffected
Version <=
6.1.*
Version
6.1.75
Status
unaffected
Version <=
6.6.*
Version
6.6.14
Status
unaffected
Version <=
6.7.*
Version
6.7.2
Status
unaffected
Version <=
*
Version
6.8
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.07% | 0.229 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|