In the Linux kernel, the following vulnerability has been resolved: pwm:
Fix double shift bug These enums are passed to set/test_bit(). The
set/test_bit() functions take a bit number instead of a shifted value.
Passing a shifted value is a double shift bug like doing BIT(BIT(1)). The
double shift bug doesn’t cause a problem here because we are only checking
0 and 1 but if the value was 5 or above then it can lead to a buffer
overflow.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 20.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 23.10 | noarch | linux | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 23.10 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws-5.15 | < any | UNKNOWN |
ubuntu | 18.04 | noarch | linux-aws-5.4 | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-aws-6.5 | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-azure | < any | UNKNOWN |
git.kernel.org/linus/d27abbfd4888d79dd24baf50e774631046ac4732 (6.7-rc1)
git.kernel.org/stable/c/1fb3a9c59e7f7d2b1d737a0d6e02e31d5b516455
git.kernel.org/stable/c/45d0a298e05adee521f6fe605d6a88341ba07edd
git.kernel.org/stable/c/a7ee519e8095d9c834086d0ff40da11415e1e4d7
git.kernel.org/stable/c/a98ff250b5af87f92f17bb9725cb21de1931ee57
git.kernel.org/stable/c/bce1f7c7e9812da57de1dda293cba87c693e9958
git.kernel.org/stable/c/c19a8794bf4fe45cff997f07a75ea84cc9e5d89c
git.kernel.org/stable/c/d27abbfd4888d79dd24baf50e774631046ac4732
git.kernel.org/stable/c/e52518b9cb9fc98fc043c8fb2b8cfc619ca8a88b
git.kernel.org/stable/c/eca19db60f99925461f49c3fd743733881395728
launchpad.net/bugs/cve/CVE-2023-52756
nvd.nist.gov/vuln/detail/CVE-2023-52756
security-tracker.debian.org/tracker/CVE-2023-52756
www.cve.org/CVERecord?id=CVE-2023-52756