In the Linux kernel, the following vulnerability has been resolved: pwm: Fix double shift bug These enums are passed to set/test_bit(). The set/test_bit() functions take a bit number instead of a shifted value. Passing a shifted value is a double shift bug like doing BIT(BIT(1)). The double shift bug doesn’t cause a problem here because we are only checking 0 and 1 but if the value was 5 or above then it can lead to a buffer overflow.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 12 | all | linux | < 6.1.64-1 | linux_6.1.64-1_all.deb |
Debian | 11 | all | linux | < 5.10.205-1 | linux_5.10.205-1_all.deb |
Debian | 10 | all | linux | < 4.19.304-1 | linux_4.19.304-1_all.deb |
Debian | 999 | all | linux | < 6.6.8-1 | linux_6.6.8-1_all.deb |
Debian | 13 | all | linux | < 6.6.8-1 | linux_6.6.8-1_all.deb |