{"uuid": "f294a356-775a-4489-8a12-adf224ecf9b0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-58080", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/14789", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-58080\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\nclk: qcom: dispcc-sm6350: Add missing parent_map for a clock\n\nIf a clk_rcg2 has a parent, it should also have parent_map defined,\notherwise we'll get a NULL pointer dereference when calling clk_set_rate\nlike the following:\n\n  [    3.388105] Call trace:\n  [    3.390664]  qcom_find_src_index+0x3c/0x70 (P)\n  [    3.395301]  qcom_find_src_index+0x1c/0x70 (L)\n  [    3.399934]  _freq_tbl_determine_rate+0x48/0x100\n  [    3.404753]  clk_rcg2_determine_rate+0x1c/0x28\n  [    3.409387]  clk_core_determine_round_nolock+0x58/0xe4\n  [    3.421414]  clk_core_round_rate_nolock+0x48/0xfc\n  [    3.432974]  clk_core_round_rate_nolock+0xd0/0xfc\n  [    3.444483]  clk_core_set_rate_nolock+0x8c/0x300\n  [    3.455886]  clk_set_rate+0x38/0x14c\n\nAdd the parent_map property for the clock where it's missing and also\nun-inline the parent_data as well to keep the matching parent_map and\nparent_data together.\n\ud83d\udccf Published: 2025-03-06T16:13:43.414Z\n\ud83d\udccf Modified: 2025-05-04T10:09:31.843Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/3daca9050857220726732ad9d4a8512069386f46\n2. https://git.kernel.org/stable/c/3ad28517385e2821e8e43388d6a0b3e1ba0bc3ab\n3. https://git.kernel.org/stable/c/2dba8d5d423fa5f6f3a687aa6e0da5808f69091b\n4. https://git.kernel.org/stable/c/a1f15808adfd77268eac7fefce5378ad9fedbfba\n5. https://git.kernel.org/stable/c/d4cdb196f182d2fbe336c968228be00d8c3fed05", "creation_timestamp": "2025-05-04T11:19:09.000000Z"}