CVE-2024-53158
Dec. 24, 2024, 12:15 p.m.
None
No Score
Description
In the Linux kernel, the following vulnerability has been resolved:
soc: qcom: geni-se: fix array underflow in geni_se_clk_tbl_get()
This loop is supposed to break if the frequency returned from
clk_round_rate() is the same as on the previous iteration. However,
that check doesn't make sense on the first iteration through the loop.
It leads to reading before the start of these->clk_perf_tbl[] array.
Product(s) Impacted
Product | Versions |
---|---|
Linux kernel |
|
Weaknesses
References
Tags
Date
- Published: Dec. 24, 2024, 12:15 p.m.
- Last Modified: Dec. 24, 2024, 12:15 p.m.
Status : Awaiting Analysis
CVE has been recently published to the CVE List and has been received by the NVD.
More infoSource
416baaa9-dc9f-4396-8d5f-8c081fb06d67
*Disclaimer: Some vulnerabilities do not have an associated CPE. To enhance the data, we use AI to infer CPEs based on CVE details. This is an automated process and might not always be accurate.