AbrarKhan / Linux-4.19.72_CVE-2020-24490

Other
0 stars 0 forks source link

CVE-2023-52683 (Medium) detected in linuxlinux-4.19.30 - autoclosed #614

Closed mend-bolt-for-github[bot] closed 2 weeks ago

mend-bolt-for-github[bot] commented 1 month ago

CVE-2023-52683 - Medium Severity Vulnerability

Vulnerable Library - linuxlinux-4.19.30

Apache Software Foundation (ASF)

Library home page: https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/?wsslib=linux

Found in base branch: master

Vulnerable Source Files (2)

/drivers/acpi/acpi_lpit.c /drivers/acpi/acpi_lpit.c

Vulnerability Details

In the Linux kernel, the following vulnerability has been resolved: ACPI: LPIT: Avoid u32 multiplication overflow In lpit_update_residency() there is a possibility of overflow in multiplication, if tsc_khz is large enough (> UINT_MAX/1000). Change multiplication to mul_u32_u32(). Found by Linux Verification Center (linuxtesting.org) with SVACE.

Publish Date: 2024-05-17

URL: CVE-2023-52683

CVSS 3 Score Details (5.5)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://git.kernel.org/stable/c/647d1d50c31e60ef9ccb9756a8fdf863329f7aee

Release Date: 2024-05-17

Fix Resolution: v4.19.306,v5.4.268,v5.10.209,v5.15.148,v6.1.75,v6.6.14,v6.7.2,v6.8


Step up your Open Source Security Game with Mend here

mend-bolt-for-github[bot] commented 2 weeks ago

:heavy_check_mark: This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.