In the Linux kernel, the following vulnerability has been resolved:
media: ar0521: don't overflow when checking PLL values
The PLL checks are comparing 64 bit integers with 32 bit ones, as reported by Coverity. Depending on the values of the variables, this may underflow.
Fix it ensuring that both sides of the expression are u64.
[
{
"deprecated": false,
"signature_version": "v1",
"digest": {
"function_hash": "174026371663603359573591289842871230472",
"length": 713.0
},
"id": "CVE-2024-53081-178391d3",
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@97ed0c0332d5525653668b31acf62ff1e6b50784",
"target": {
"file": "drivers/media/i2c/ar0521.c",
"function": "calc_pll"
}
},
{
"deprecated": false,
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"189165900186207449988366415915264504811",
"242666398179215825380511719116830148587",
"231523729640452868277681297445264412155",
"96136640408268512975870765671589101774",
"153590029286531272555824769757332050260",
"273380687977363539661925450163841770481",
"321828547570580420594137779126834485548"
]
},
"id": "CVE-2024-53081-34ad6070",
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@a244b82d0ae60326901f2b50c15e3118298b7ecd",
"target": {
"file": "drivers/media/i2c/ar0521.c"
}
},
{
"deprecated": false,
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"189165900186207449988366415915264504811",
"242666398179215825380511719116830148587",
"231523729640452868277681297445264412155",
"96136640408268512975870765671589101774",
"153590029286531272555824769757332050260",
"273380687977363539661925450163841770481",
"321828547570580420594137779126834485548"
]
},
"id": "CVE-2024-53081-4c0a37e8",
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@97ed0c0332d5525653668b31acf62ff1e6b50784",
"target": {
"file": "drivers/media/i2c/ar0521.c"
}
},
{
"deprecated": false,
"signature_version": "v1",
"digest": {
"function_hash": "174026371663603359573591289842871230472",
"length": 713.0
},
"id": "CVE-2024-53081-b977fbf7",
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@a244b82d0ae60326901f2b50c15e3118298b7ecd",
"target": {
"file": "drivers/media/i2c/ar0521.c",
"function": "calc_pll"
}
},
{
"deprecated": false,
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"189165900186207449988366415915264504811",
"242666398179215825380511719116830148587",
"231523729640452868277681297445264412155",
"96136640408268512975870765671589101774",
"153590029286531272555824769757332050260",
"273380687977363539661925450163841770481",
"321828547570580420594137779126834485548"
]
},
"id": "CVE-2024-53081-bc009685",
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@5e1523076acf95b4ea68d19b6f27e6891267cc24",
"target": {
"file": "drivers/media/i2c/ar0521.c"
}
},
{
"deprecated": false,
"signature_version": "v1",
"digest": {
"function_hash": "69214199085331158470005669122453750281",
"length": 727.0
},
"id": "CVE-2024-53081-f0323dca",
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@5e1523076acf95b4ea68d19b6f27e6891267cc24",
"target": {
"file": "drivers/media/i2c/ar0521.c",
"function": "calc_pll"
}
}
]