In the Linux kernel, the following vulnerability has been resolved: soc: qcom: geni-se: fix array underflow in geni_se_clk_tbl_get() This loop is supposed to break if the frequency returned from clk_round_rate() is the same as on the previous iteration. However, that check doesn't make sense on the first iteration through the loop. It leads to reading before the start of these->clk_perf_tbl[] array.
History

Wed, 25 Dec 2024 13:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-124
References
Metrics threat_severity

None

cvssV3_1

{'score': 4.4, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H'}

threat_severity

Low


Tue, 24 Dec 2024 11:45:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: soc: qcom: geni-se: fix array underflow in geni_se_clk_tbl_get() This loop is supposed to break if the frequency returned from clk_round_rate() is the same as on the previous iteration. However, that check doesn't make sense on the first iteration through the loop. It leads to reading before the start of these->clk_perf_tbl[] array.
Title soc: qcom: geni-se: fix array underflow in geni_se_clk_tbl_get()
References

cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published: 2024-12-24T11:28:57.160Z

Updated: 2024-12-24T11:28:57.160Z

Reserved: 2024-11-19T17:17:25.001Z

Link: CVE-2024-53158

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2024-12-24T12:15:24.097

Modified: 2024-12-24T12:15:24.097

Link: CVE-2024-53158

cve-icon Redhat

Severity : Low

Publid Date: 2024-12-24T00:00:00Z

Links: CVE-2024-53158 - Bugzilla