First published: Tue Nov 19 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: media: ar0521: don't overflow when checking PLL values The PLL checks are comparing 64 bit integers with 32 bit ones, as reported by Coverity. Depending on the values of the variables, this may underflow. Fix it ensuring that both sides of the expression are u64.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | >=6.0<6.1.117 | |
Linux Kernel | >=6.2<6.6.61 | |
Linux Kernel | >=6.7<6.11.8 | |
Linux Kernel | =6.12-rc1 | |
Linux Kernel | =6.12-rc2 | |
Linux Kernel | =6.12-rc3 | |
Linux Kernel | =6.12-rc4 | |
Linux Kernel | =6.12-rc5 | |
Linux Kernel | =6.12-rc6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-53081 is categorized as a medium severity vulnerability affecting the Linux kernel.
To resolve CVE-2024-53081, update the Linux kernel to the latest version where the vulnerability has been patched.
CVE-2024-53081 affects Linux kernel versions from 6.0 to 6.1.117 and from 6.2 to 6.6.61, including several release candidates.
CVE-2024-53081 involves an underflow issue in PLL checks due to comparing 64-bit integers with 32-bit integers.
There are no specific workarounds for CVE-2024-53081; upgrading the kernel is the recommended approach.