{"vulnerability": "CVE-2024-53157", "sightings": [{"uuid": "58533959-08a5-4080-abec-2fd0c91c7a4f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53157", "type": "seen", "source": "https://t.me/cvedetector/13598", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-53157 - \"Arsenal Black Ops: Kernel Crash in firmware: arm_scpi: Due to Zero OPP Count\"\", \n  \"Content\": \"CVE ID : CVE-2024-53157 \nPublished : Dec. 24, 2024, 12:15 p.m. | 45\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \nfirmware: arm_scpi: Check the DVFS OPP count returned by the firmware  \n  \nFix a kernel crash with the below call trace when the SCPI firmware  \nreturns OPP count of zero.  \n  \ndvfs_info.opp_count may be zero on some platforms during the reboot  \ntest, and the kernel will crash after dereferencing the pointer to  \nkcalloc(info-&gt;count, sizeof(*opp), GFP_KERNEL).  \n  \n  |  Unable to handle kernel NULL pointer dereference at virtual address 0000000000000028  \n  |  Mem abort info:  \n  |    ESR = 0x96000004  \n  |    Exception class = DABT (current EL), IL = 32 bits  \n  |    SET = 0, FnV = 0  \n  |    EA = 0, S1PTW = 0  \n  |  Data abort info:  \n  |    ISV = 0, ISS = 0x00000004  \n  |    CM = 0, WnR = 0  \n  |  user pgtable: 4k pages, 48-bit VAs, pgdp = 00000000faefa08c  \n  |  [0000000000000028] pgd=0000000000000000  \n  |  Internal error: Oops: 96000004 [#1] SMP  \n  |  scpi-hwmon: probe of PHYT000D:00 failed with error -110  \n  |  Process systemd-udevd (pid: 1701, stack limit = 0x00000000aaede86c)  \n  |  CPU: 2 PID: 1701 Comm: systemd-udevd Not tainted 4.19.90+ #1  \n  |  Hardware name: PHYTIUM LTD Phytium FT2000/4/Phytium FT2000/4, BIOS  \n  |  pstate: 60000005 (nZCv daif -PAN -UAO)  \n  |  pc : scpi_dvfs_recalc_rate+0x40/0x58 [clk_scpi]  \n  |  lr : clk_register+0x438/0x720  \n  |  Call trace:  \n  |   scpi_dvfs_recalc_rate+0x40/0x58 [clk_scpi]  \n  |   devm_clk_hw_register+0x50/0xa0  \n  |   scpi_clk_ops_init.isra.2+0xa0/0x138 [clk_scpi]  \n  |   scpi_clocks_probe+0x528/0x70c [clk_scpi]  \n  |   platform_drv_probe+0x58/0xa8  \n  |   really_probe+0x260/0x3d0  \n  |   driver_probe_device+0x12c/0x148  \n  |   device_driver_attach+0x74/0x98  \n  |   __driver_attach+0xb4/0xe8  \n  |   bus_for_each_dev+0x88/0xe0  \n  |   driver_attach+0x30/0x40  \n  |   bus_add_driver+0x178/0x2b0  \n  |   driver_register+0x64/0x118  \n  |   __platform_driver_register+0x54/0x60  \n  |   scpi_clocks_driver_init+0x24/0x1000 [clk_scpi]  \n  |   do_one_initcall+0x54/0x220  \n  |   do_init_module+0x54/0x1c8  \n  |   load_module+0x14a4/0x1668  \n  |   __se_sys_finit_module+0xf8/0x110  \n  |   __arm64_sys_finit_module+0x24/0x30  \n  |   el0_svc_common+0x78/0x170  \n  |   el0_svc_handler+0x38/0x78  \n  |   el0_svc+0x8/0x340  \n  |  Code: 937d7c00 a94153f3 a8c27bfd f9400421 (b8606820)  \n  |  ---[ end trace 06feb22469d89fa8 ]---  \n  |  Kernel panic - not syncing: Fatal exception  \n  |  SMP: stopping secondary CPUs  \n  |  Kernel Offset: disabled  \n  |  CPU features: 0x10,a0002008  \n  |  Memory Limit: none \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"24 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-24T14:24:31.000000Z"}, {"uuid": "e1136312-62d0-436c-892c-b6a6b9d8c9e8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53157", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3le2gdv5yd722", "content": "", "creation_timestamp": "2024-12-24T12:16:04.748206Z"}, {"uuid": "ab7a9100-7377-403d-a084-49ae31f66c22", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53157", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113707763696910532", "content": "", "creation_timestamp": "2024-12-24T12:19:41.595353Z"}, {"uuid": "4b64e58a-1126-4b96-963e-b9657a29cd04", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53157", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-226-07", "content": "", "creation_timestamp": "2025-08-14T10:00:00.000000Z"}]}