CVE-2023-54222
Description
In the Linux kernel, the following vulnerability has been resolved:
hte: tegra-194: Fix off by one in tegra_hte_map_to_line_id()
The "map_sz" is the number of elements in the "m" array so the > comparison needs to be changed to >= to prevent an out of bounds read.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Off-by-one in Linux kernel's Tegra194 HTE driver could lead to out-of-bounds read.
Vulnerability
Description
In the Linux kernel, the tegra_hte_map_to_line_id() function in the Tegra194 HTE (Hardware Timestamping Engine) driver contains an off-by-one error. The loop bound check uses ">" instead of ">=" when comparing against map_sz, which is the number of elements in the array m. This allows one index beyond the array to be accessed, resulting in an out-of-bounds read [1][2].
Exploitation
To trigger this bug, an attacker needs to be able to call the affected code path with a crafted input that leads to the loop iteration exceeding the array size. The exact prerequisites are not detailed, but local access and specific system calls may be required.
Impact
An out-of-bounds read can disclose sensitive kernel memory information or cause a system crash (denial of service). In some cases, it might be leveraged for privilege escalation if combined with other vulnerabilities, but the provided information does not confirm such use.
Mitigation
The vulnerability has been fixed in the Linux kernel stable trees. Patches are available via commits [1] and [2]. Users should update to the latest stable kernel version to mitigate the issue.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
4fed87ce073c7aedc364a7c9c2a488602e3f0e078180d6684Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
4News mentions
0No linked articles in our index yet.