CVE-2024-35983

In the Linux kernel, the following vulnerability has been resolved: bounds: Use the right number of bits for power-of-two CONFIG_NR_CPUS bits_per() rounds up to the next power of two when passed a power of two. This causes crashes on some machines and configurations.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

16 Jan 2025, 17:22

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
First Time Linux
Linux linux Kernel
References () https://git.kernel.org/stable/c/15aa09d6d84629eb5296de30ac0aa19a33512f16 - () https://git.kernel.org/stable/c/15aa09d6d84629eb5296de30ac0aa19a33512f16 - Patch
References () https://git.kernel.org/stable/c/5af385f5f4cddf908f663974847a4083b2ff2c79 - () https://git.kernel.org/stable/c/5af385f5f4cddf908f663974847a4083b2ff2c79 - Patch
References () https://git.kernel.org/stable/c/66297b2ceda841f809637731d287bda3a93b49d8 - () https://git.kernel.org/stable/c/66297b2ceda841f809637731d287bda3a93b49d8 - Patch
References () https://git.kernel.org/stable/c/93ba36238db6a74a82feb3dc476e25ea424ad630 - () https://git.kernel.org/stable/c/93ba36238db6a74a82feb3dc476e25ea424ad630 - Patch
References () https://git.kernel.org/stable/c/9b7c5004d7c5ae062134052a85290869a015814c - () https://git.kernel.org/stable/c/9b7c5004d7c5ae062134052a85290869a015814c - Patch
References () https://git.kernel.org/stable/c/d34a516f2635090d36a306f84573e8de3d7374ce - () https://git.kernel.org/stable/c/d34a516f2635090d36a306f84573e8de3d7374ce - Patch
References () https://git.kernel.org/stable/c/ebfe41889b762f1933c6762f6624b9724a25bee0 - () https://git.kernel.org/stable/c/ebfe41889b762f1933c6762f6624b9724a25bee0 - Patch
References () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - Patch
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CWE NVD-CWE-noinfo

21 Nov 2024, 09:21

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html -
References () https://git.kernel.org/stable/c/15aa09d6d84629eb5296de30ac0aa19a33512f16 - () https://git.kernel.org/stable/c/15aa09d6d84629eb5296de30ac0aa19a33512f16 -
References () https://git.kernel.org/stable/c/5af385f5f4cddf908f663974847a4083b2ff2c79 - () https://git.kernel.org/stable/c/5af385f5f4cddf908f663974847a4083b2ff2c79 -
References () https://git.kernel.org/stable/c/66297b2ceda841f809637731d287bda3a93b49d8 - () https://git.kernel.org/stable/c/66297b2ceda841f809637731d287bda3a93b49d8 -
References () https://git.kernel.org/stable/c/93ba36238db6a74a82feb3dc476e25ea424ad630 - () https://git.kernel.org/stable/c/93ba36238db6a74a82feb3dc476e25ea424ad630 -
References () https://git.kernel.org/stable/c/9b7c5004d7c5ae062134052a85290869a015814c - () https://git.kernel.org/stable/c/9b7c5004d7c5ae062134052a85290869a015814c -
References () https://git.kernel.org/stable/c/d34a516f2635090d36a306f84573e8de3d7374ce - () https://git.kernel.org/stable/c/d34a516f2635090d36a306f84573e8de3d7374ce -
References () https://git.kernel.org/stable/c/ebfe41889b762f1933c6762f6624b9724a25bee0 - () https://git.kernel.org/stable/c/ebfe41889b762f1933c6762f6624b9724a25bee0 -

05 Nov 2024, 10:17

Type Values Removed Values Added
References
  • {'url': 'https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html', 'source': '416baaa9-dc9f-4396-8d5f-8c081fb06d67'}

25 Jun 2024, 23:15

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: límites: utilice el número correcto de bits para potencia de dos CONFIG_NR_CPUS bits_per() redondea a la siguiente potencia de dos cuando se pasa una potencia de dos. Esto provoca fallos en algunas máquinas y configuraciones.
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html -

20 May 2024, 13:00

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-20 10:15

Updated : 2025-01-16 17:22


NVD link : CVE-2024-35983

Mitre link : CVE-2024-35983

CVE.ORG link : CVE-2024-35983


JSON object : View

Products Affected

linux

  • linux_kernel