In the Linux kernel, the following vulnerability has been resolved:
bounds: Use the right number of bits for power-of-two CONFIGNRCPUS
bits_per() rounds up to the next power of two when passed a power of two. This causes crashes on some machines and configurations.
[
{
"signature_type": "Line",
"deprecated": false,
"id": "CVE-2024-35983-35812296",
"digest": {
"line_hashes": [
"251973849007400513104269807415878017892",
"272727312894913277765568439726684267473",
"56953225536306300649145574527354730423",
"137054467377664735352531946026717716884"
],
"threshold": 0.9
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@93ba36238db6a74a82feb3dc476e25ea424ad630",
"signature_version": "v1",
"target": {
"file": "kernel/bounds.c"
}
},
{
"signature_type": "Line",
"deprecated": false,
"id": "CVE-2024-35983-409cee50",
"digest": {
"line_hashes": [
"251973849007400513104269807415878017892",
"272727312894913277765568439726684267473",
"56953225536306300649145574527354730423",
"299590956060719523211667003736117315589"
],
"threshold": 0.9
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@15aa09d6d84629eb5296de30ac0aa19a33512f16",
"signature_version": "v1",
"target": {
"file": "kernel/bounds.c"
}
},
{
"signature_type": "Line",
"deprecated": false,
"id": "CVE-2024-35983-78e6c59c",
"digest": {
"line_hashes": [
"251973849007400513104269807415878017892",
"272727312894913277765568439726684267473",
"56953225536306300649145574527354730423",
"137054467377664735352531946026717716884"
],
"threshold": 0.9
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@d34a516f2635090d36a306f84573e8de3d7374ce",
"signature_version": "v1",
"target": {
"file": "kernel/bounds.c"
}
},
{
"signature_type": "Line",
"deprecated": false,
"id": "CVE-2024-35983-872035cb",
"digest": {
"line_hashes": [
"251973849007400513104269807415878017892",
"272727312894913277765568439726684267473",
"56953225536306300649145574527354730423",
"299590956060719523211667003736117315589"
],
"threshold": 0.9
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@ebfe41889b762f1933c6762f6624b9724a25bee0",
"signature_version": "v1",
"target": {
"file": "kernel/bounds.c"
}
},
{
"signature_type": "Line",
"deprecated": false,
"id": "CVE-2024-35983-92dc33fe",
"digest": {
"line_hashes": [
"251973849007400513104269807415878017892",
"272727312894913277765568439726684267473",
"56953225536306300649145574527354730423",
"299590956060719523211667003736117315589"
],
"threshold": 0.9
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@5af385f5f4cddf908f663974847a4083b2ff2c79",
"signature_version": "v1",
"target": {
"file": "kernel/bounds.c"
}
},
{
"signature_type": "Line",
"deprecated": false,
"id": "CVE-2024-35983-9be2407a",
"digest": {
"line_hashes": [
"251973849007400513104269807415878017892",
"272727312894913277765568439726684267473",
"56953225536306300649145574527354730423",
"137054467377664735352531946026717716884"
],
"threshold": 0.9
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@66297b2ceda841f809637731d287bda3a93b49d8",
"signature_version": "v1",
"target": {
"file": "kernel/bounds.c"
}
},
{
"signature_type": "Line",
"deprecated": false,
"id": "CVE-2024-35983-fd2d29e3",
"digest": {
"line_hashes": [
"251973849007400513104269807415878017892",
"272727312894913277765568439726684267473",
"56953225536306300649145574527354730423",
"299590956060719523211667003736117315589"
],
"threshold": 0.9
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@9b7c5004d7c5ae062134052a85290869a015814c",
"signature_version": "v1",
"target": {
"file": "kernel/bounds.c"
}
}
]