In the Linux kernel, the following vulnerability has been resolved:
hte: tegra-194: Fix off by one in tegrahtemaptoline_id()
The "map_sz" is the number of elements in the "m" array so the > comparison needs to be changed to >= to prevent an out of bounds read.
{
"cna_assigner": "Linux",
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/54xxx/CVE-2023-54222.json"
}