U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2024-46758

Change History

CVE Modified by kernel.org 1/09/2025 11:16:11 AM

Action Type Old Value New Value
Changed Description
In the Linux kernel, the following vulnerability has been resolved:

hwmon: (lm95234) Fix underflows seen when writing limit attributes

DIV_ROUND_CLOSEST() after kstrtol() results in an underflow if a large
negative number such as -9223372036854775808 is provided by the user.
Fix it by reordering clamp_val() and DIV_ROUND_CLOSEST() operations.
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
Removed CVSS V3.1
NIST: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

								
						
Removed CWE
NIST: CWE-191

								
						
Removed CPE Configuration
3174019   Config Identifier: 0, OR
     
          *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.11 from (excluding) 5.15.167
          *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (excluding) 4.19.322
          *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 6.7 from (excluding) 6.10.10
          *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 6.2 from (excluding) 6.6.51
          *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.16 from (excluding) 6.1.110
          *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.5 from (excluding) 5.10.226
          *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 4.20 from (excluding) 5.4.284

								
						
Removed Reference
kernel.org: https://git.kernel.org/stable/c/0fc27747633aa419f9af40e7bdfa00d2ec94ea81

								
						
Removed Reference
kernel.org: https://git.kernel.org/stable/c/16f42953231be1e7be77bc24005270d9e0d9d2ee

								
						
Removed Reference
kernel.org: https://git.kernel.org/stable/c/438453dfbbdcf4be26891492644aa3ecbb42c336

								
						
Removed Reference
kernel.org: https://git.kernel.org/stable/c/46e4fd338d5bdbaf60e41cda625b24949d2af201

								
						
Removed Reference
kernel.org: https://git.kernel.org/stable/c/59c1fb9874a01c9abc49a0a32f192a7e7b4e2650

								
						
Removed Reference
kernel.org: https://git.kernel.org/stable/c/93f0f5721d0cca45dac50af1ae6f9a9826c699fd

								
						
Removed Reference
kernel.org: https://git.kernel.org/stable/c/af64e3e1537896337405f880c1e9ac1f8c0c6198

								
						
Removed Reference
kernel.org: https://git.kernel.org/stable/c/da765bebd90e1b92bdbc3c6a27a3f3cc81529ab6

								
						
Removed Reference Type
kernel.org: https://git.kernel.org/stable/c/0fc27747633aa419f9af40e7bdfa00d2ec94ea81 Types: Patch

								
						
Removed Reference Type
kernel.org: https://git.kernel.org/stable/c/16f42953231be1e7be77bc24005270d9e0d9d2ee Types: Patch

								
						
Removed Reference Type
kernel.org: https://git.kernel.org/stable/c/438453dfbbdcf4be26891492644aa3ecbb42c336 Types: Patch

								
						
Removed Reference Type
kernel.org: https://git.kernel.org/stable/c/46e4fd338d5bdbaf60e41cda625b24949d2af201 Types: Patch

								
						
Removed Reference Type
kernel.org: https://git.kernel.org/stable/c/59c1fb9874a01c9abc49a0a32f192a7e7b4e2650 Types: Patch

								
						
Removed Reference Type
kernel.org: https://git.kernel.org/stable/c/93f0f5721d0cca45dac50af1ae6f9a9826c699fd Types: Patch

								
						
Removed Reference Type
kernel.org: https://git.kernel.org/stable/c/af64e3e1537896337405f880c1e9ac1f8c0c6198 Types: Patch

								
						
Removed Reference Type
kernel.org: https://git.kernel.org/stable/c/da765bebd90e1b92bdbc3c6a27a3f3cc81529ab6 Types: Patch

								
						

CVE Rejected by kernel.org 1/09/2025 11:16:11 AM

Action Type Old Value New Value