CVE-2024-53158
Published Dec 24, 2024
Last updated 2 months ago
- Description
- In the Linux kernel, the following vulnerability has been resolved: soc: qcom: geni-se: fix array underflow in geni_se_clk_tbl_get() This loop is supposed to break if the frequency returned from clk_round_rate() is the same as on the previous iteration. However, that check doesn't make sense on the first iteration through the loop. It leads to reading before the start of these->clk_perf_tbl[] array.
- Source
- 416baaa9-dc9f-4396-8d5f-8c081fb06d67
- NVD status
- Received
- Hype score
- Not currently trending
(CVE-2024-53158)[soc][qcom][geni-se]Array underflow in geni_se_clk_tbl_get() https://t.co/a8eGh24yno
@xvonfers
30 Dec 2024
439 Impressions
0 Retweets
1 Like
2 Bookmarks
0 Replies
0 Quotes
CVE-2024-53158 Linux Kernel Patch Fix Array Underflow Vulnerability in QCOM GENI-SE: In the Linux kernel, there was a vulnerability in the soc: qcom: geni-se. It involved an array underflow in geni_se_clk_tbl_get... https://t.co/rXUOXCUhSo
@VulmonFeeds
24 Dec 2024
42 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2024-53158 In the Linux kernel, the following vulnerability has been resolved: soc: qcom: geni-se: fix array underflow in geni_se_clk_tbl_get() This loop is supposed to break … https://t.co/2St4lZCUD5
@CVEnew
24 Dec 2024
453 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes