{"vulnerability": "CVE-2024-58080", "sightings": [{"uuid": "f294a356-775a-4489-8a12-adf224ecf9b0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-58080", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/14789", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-58080\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\nclk: qcom: dispcc-sm6350: Add missing parent_map for a clock\n\nIf a clk_rcg2 has a parent, it should also have parent_map defined,\notherwise we'll get a NULL pointer dereference when calling clk_set_rate\nlike the following:\n\n  [    3.388105] Call trace:\n  [    3.390664]  qcom_find_src_index+0x3c/0x70 (P)\n  [    3.395301]  qcom_find_src_index+0x1c/0x70 (L)\n  [    3.399934]  _freq_tbl_determine_rate+0x48/0x100\n  [    3.404753]  clk_rcg2_determine_rate+0x1c/0x28\n  [    3.409387]  clk_core_determine_round_nolock+0x58/0xe4\n  [    3.421414]  clk_core_round_rate_nolock+0x48/0xfc\n  [    3.432974]  clk_core_round_rate_nolock+0xd0/0xfc\n  [    3.444483]  clk_core_set_rate_nolock+0x8c/0x300\n  [    3.455886]  clk_set_rate+0x38/0x14c\n\nAdd the parent_map property for the clock where it's missing and also\nun-inline the parent_data as well to keep the matching parent_map and\nparent_data together.\n\ud83d\udccf Published: 2025-03-06T16:13:43.414Z\n\ud83d\udccf Modified: 2025-05-04T10:09:31.843Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/3daca9050857220726732ad9d4a8512069386f46\n2. https://git.kernel.org/stable/c/3ad28517385e2821e8e43388d6a0b3e1ba0bc3ab\n3. https://git.kernel.org/stable/c/2dba8d5d423fa5f6f3a687aa6e0da5808f69091b\n4. https://git.kernel.org/stable/c/a1f15808adfd77268eac7fefce5378ad9fedbfba\n5. https://git.kernel.org/stable/c/d4cdb196f182d2fbe336c968228be00d8c3fed05", "creation_timestamp": "2025-05-04T11:19:09.000000Z"}, {"uuid": "cc8f67ff-7b2b-4a96-b914-1cef157cc07a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-58080", "type": "seen", "source": "https://t.me/cvedetector/19726", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-58080 - Qualcomm QCOM Dispcc-sm6350 Clock Null Pointer Dereference Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-58080 \nPublished : March 6, 2025, 5:15 p.m. | 1\u00a0hour ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \nclk: qcom: dispcc-sm6350: Add missing parent_map for a clock  \n  \nIf a clk_rcg2 has a parent, it should also have parent_map defined,  \notherwise we'll get a NULL pointer dereference when calling clk_set_rate  \nlike the following:  \n  \n  [    3.388105] Call trace:  \n  [    3.390664]  qcom_find_src_index+0x3c/0x70 (P)  \n  [    3.395301]  qcom_find_src_index+0x1c/0x70 (L)  \n  [    3.399934]  _freq_tbl_determine_rate+0x48/0x100  \n  [    3.404753]  clk_rcg2_determine_rate+0x1c/0x28  \n  [    3.409387]  clk_core_determine_round_nolock+0x58/0xe4  \n  [    3.421414]  clk_core_round_rate_nolock+0x48/0xfc  \n  [    3.432974]  clk_core_round_rate_nolock+0xd0/0xfc  \n  [    3.444483]  clk_core_set_rate_nolock+0x8c/0x300  \n  [    3.455886]  clk_set_rate+0x38/0x14c  \n  \nAdd the parent_map property for the clock where it's missing and also  \nun-inline the parent_data as well to keep the matching parent_map and  \nparent_data together. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-06T19:41:47.000000Z"}, {"uuid": "06053d0c-d29b-48ac-b126-279ff4e8e8f1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-58080", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ljqbkherlp22", "content": "", "creation_timestamp": "2025-03-06T19:54:49.832741Z"}]}