In the Linux kernel, the following vulnerability has been resolved:
soc: qcom: geni-se: fix array underflow in geni_se_clk_tbl_get()
This loop is supposed to break if the frequency returned from
clk_round_rate() is the same as on the previous iteration. However,
that check doesn't make sense on the first iteration through the loop.
It leads to reading before the start of these->clk_perf_tbl[] array.
Metrics
Affected Vendors & Products
References
History
Wed, 25 Dec 2024 13:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-124 | |
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|
Tue, 24 Dec 2024 11:45:00 +0000
MITRE
Status: PUBLISHED
Assigner: Linux
Published: 2024-12-24T11:28:57.160Z
Updated: 2024-12-24T11:28:57.160Z
Reserved: 2024-11-19T17:17:25.001Z
Link: CVE-2024-53158
Vulnrichment
No data.
NVD
Status : Received
Published: 2024-12-24T12:15:24.097
Modified: 2024-12-24T12:15:24.097
Link: CVE-2024-53158
Redhat