Changed |
Description |
In the Linux kernel, the following vulnerability has been resolved:
pwm: Fix double shift bug
These enums are passed to set/test_bit(). The set/test_bit() functions
take a bit number instead of a shifted value. Passing a shifted value
is a double shift bug like doing BIT(BIT(1)). The double shift bug
doesn't cause a problem here because we are only checking 0 and 1 but
if the value was 5 or above then it can lead to a buffer overflow.
|
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
|
Removed |
Reference |
kernel.org https://git.kernel.org/stable/c/1fb3a9c59e7f7d2b1d737a0d6e02e31d5b516455
|
|
Removed |
Reference |
kernel.org https://git.kernel.org/stable/c/45d0a298e05adee521f6fe605d6a88341ba07edd
|
|
Removed |
Reference |
kernel.org https://git.kernel.org/stable/c/a7ee519e8095d9c834086d0ff40da11415e1e4d7
|
|
Removed |
Reference |
kernel.org https://git.kernel.org/stable/c/a98ff250b5af87f92f17bb9725cb21de1931ee57
|
|
Removed |
Reference |
kernel.org https://git.kernel.org/stable/c/bce1f7c7e9812da57de1dda293cba87c693e9958
|
|
Removed |
Reference |
kernel.org https://git.kernel.org/stable/c/c19a8794bf4fe45cff997f07a75ea84cc9e5d89c
|
|
Removed |
Reference |
kernel.org https://git.kernel.org/stable/c/d27abbfd4888d79dd24baf50e774631046ac4732
|
|
Removed |
Reference |
kernel.org https://git.kernel.org/stable/c/e52518b9cb9fc98fc043c8fb2b8cfc619ca8a88b
|
|
Removed |
Reference |
kernel.org https://git.kernel.org/stable/c/eca19db60f99925461f49c3fd743733881395728
|
|