-
CVE-2023-52683
- EPSS 0.07%
- Veröffentlicht 17.05.2024 15:15:19
- Zuletzt bearbeitet 21.11.2024 08:40:21
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- Teams Watchlist Login
- Unerledigt Login
In the Linux kernel, the following vulnerability has been resolved: ACPI: LPIT: Avoid u32 multiplication overflow In lpit_update_residency() there is a possibility of overflow in multiplication, if tsc_khz is large enough (> UINT_MAX/1000). Change multiplication to mul_u32_u32(). Found by Linux Verification Center (linuxtesting.org) with SVACE.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
647d1d50c31e60ef9ccb9756a8fdf863329f7aee
Version
eeb2d80d502af28e5660ff4bbe00f90ceb82c2db
Status
affected
Version <
6c38e791bde07d6ca2a0a619ff9b6837e0d5f9ad
Version
eeb2d80d502af28e5660ff4bbe00f90ceb82c2db
Status
affected
Version <
f39c3d578c7d09a18ceaf56750fc7f20b02ada63
Version
eeb2d80d502af28e5660ff4bbe00f90ceb82c2db
Status
affected
Version <
c1814a4ffd016ce5392c6767d22ef3aa2f0d4bd1
Version
eeb2d80d502af28e5660ff4bbe00f90ceb82c2db
Status
affected
Version <
72222dfd76a79d9666ab3117fcdd44ca8cd0c4de
Version
eeb2d80d502af28e5660ff4bbe00f90ceb82c2db
Status
affected
Version <
d1ac288b2742aa4af746c5613bac71760fadd1c4
Version
eeb2d80d502af28e5660ff4bbe00f90ceb82c2db
Status
affected
Version <
b7aab9d906e2e252a7783f872406033ec49b6dae
Version
eeb2d80d502af28e5660ff4bbe00f90ceb82c2db
Status
affected
Version <
56d2eeda87995245300836ee4dbd13b002311782
Version
eeb2d80d502af28e5660ff4bbe00f90ceb82c2db
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
4.15
Status
affected
Version <
4.15
Version
0
Status
unaffected
Version <=
4.19.*
Version
4.19.306
Status
unaffected
Version <=
5.4.*
Version
5.4.268
Status
unaffected
Version <=
5.10.*
Version
5.10.209
Status
unaffected
Version <=
5.15.*
Version
5.15.148
Status
unaffected
Version <=
6.1.*
Version
6.1.75
Status
unaffected
Version <=
6.6.*
Version
6.6.14
Status
unaffected
Version <=
6.7.*
Version
6.7.2
Status
unaffected
Version <=
*
Version
6.8
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.07% | 0.229 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|