41 lines
1.9 KiB
JSON
Raw Normal View History

{
"id": "CVE-2024-53159",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-12-24T12:15:24.217",
"lastModified": "2024-12-24T12:15:24.217",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nhwmon: (nct6775-core) Fix overflows seen when writing limit attributes\n\nDIV_ROUND_CLOSEST() after kstrtoul() results in an overflow if a large\nnumber such as 18446744073709551615 is provided by the user.\nFix it by reordering clamp_val() and DIV_ROUND_CLOSEST() operations."
},
{
"lang": "es",
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: hwmon: (nct6775-core) Se corrigieron los desbordamientos observados al escribir atributos de los l\u00edmites DIV_ROUND_CLOSEST() despu\u00e9s de kstrtoul(), lo que produce un desbordamiento si el usuario proporciona un n\u00famero grande como 18446744073709551615. Solucionarlo reordenando las operaciones abrazadera_val() y DIV_ROUND_CLOSEST()."
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/57ee12b6c514146c19b6a159013b48727a012960",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/685c10269c41d23d7a2b85d3fd6b6345390c8746",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/a4712e4485f5c388bbe0d0e8f52978241ab34a29",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/ae703f8ff083c5267af30d6c8cf096d562623b3b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/dfa8bedfffcae87976b34a45a724deb9c3a0a88e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}