CVE-2023-52683

Source
https://cve.org/CVERecord?id=CVE-2023-52683
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-52683.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-52683
Downstream
Related
Published
2024-05-17T14:24:46.014Z
Modified
2026-03-14T12:23:13.942801Z
Summary
ACPI: LPIT: Avoid u32 multiplication overflow
Details

In the Linux kernel, the following vulnerability has been resolved:

ACPI: LPIT: Avoid u32 multiplication overflow

In lpitupdateresidency() there is a possibility of overflow in multiplication, if tsckhz is large enough (> UINTMAX/1000).

Change multiplication to mulu32u32().

Found by Linux Verification Center (linuxtesting.org) with SVACE.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/52xxx/CVE-2023-52683.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
eeb2d80d502af28e5660ff4bbe00f90ceb82c2db
Fixed
647d1d50c31e60ef9ccb9756a8fdf863329f7aee
Fixed
6c38e791bde07d6ca2a0a619ff9b6837e0d5f9ad
Fixed
f39c3d578c7d09a18ceaf56750fc7f20b02ada63
Fixed
c1814a4ffd016ce5392c6767d22ef3aa2f0d4bd1
Fixed
72222dfd76a79d9666ab3117fcdd44ca8cd0c4de
Fixed
d1ac288b2742aa4af746c5613bac71760fadd1c4
Fixed
b7aab9d906e2e252a7783f872406033ec49b6dae
Fixed
56d2eeda87995245300836ee4dbd13b002311782

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-52683.json"