In the Linux kernel, the following vulnerability has been resolved: perf/x86/amd: fix potential integer overflow on shift of a int The left shift of int 32 bit integer constant 1 is evaluated using 32 bit arithmetic and then passed as a 64 bit function argument. In the case where i is 32 or more this can lead to an overflow. Avoid this by shifting using the BIT_ULL macro instead.
2025-03-27T17:15:39.597
2025-10-01T18:15:32.117
Modified
416baaa9-dc9f-4396-8d5f-8c081fb06d67
CVSSv3.1: 5.5 (MEDIUM)
| Type | Vendor | Product | Version/Range | Vulnerable? |
|---|---|---|---|---|
| Operating System | linux | linux_kernel | < 5.4.231 | Yes |
| Operating System | linux | linux_kernel | < 5.10.166 | Yes |
| Operating System | linux | linux_kernel | < 5.15.91 | Yes |
| Operating System | linux | linux_kernel | < 6.1.9 | Yes |
| Operating System | linux | linux_kernel | 6.2 | Yes |