CVE-2024-53081
Severity CVSS v4.0:
Pending analysis
Type:
CWE-191
Integer Underflow (Wrap or Wraparound)
Publication date:
19/11/2024
Last modified:
03/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
media: ar0521: don&#39;t overflow when checking PLL values<br />
<br />
The PLL checks are comparing 64 bit integers with 32 bit<br />
ones, as reported by Coverity. Depending on the values of<br />
the variables, this may underflow.<br />
<br />
Fix it ensuring that both sides of the expression are u64.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.0 (including) | 6.1.117 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.61 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.11.8 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.12:rc5:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.12:rc6:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/438d3085ba5b8b5bfa5290faa594e577f6ac9aa7
- https://git.kernel.org/stable/c/5e1523076acf95b4ea68d19b6f27e6891267cc24
- https://git.kernel.org/stable/c/97ed0c0332d5525653668b31acf62ff1e6b50784
- https://git.kernel.org/stable/c/a244b82d0ae60326901f2b50c15e3118298b7ecd
- https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html



