CVE-2024-53158

Source
https://cve.org/CVERecord?id=CVE-2024-53158
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-53158.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-53158
Downstream
Related
Published
2024-12-24T11:28:57.160Z
Modified
2026-03-20T12:39:41.506605Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
soc: qcom: geni-se: fix array underflow in geni_se_clk_tbl_get()
Details

In the Linux kernel, the following vulnerability has been resolved:

soc: qcom: geni-se: fix array underflow in geniseclktblget()

This loop is supposed to break if the frequency returned from clkroundrate() is the same as on the previous iteration. However, that check doesn't make sense on the first iteration through the loop. It leads to reading before the start of these->clkperftbl[] array.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/53xxx/CVE-2024-53158.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
eddac5af06546d2e7a0730e3dc02dde3dc91098a
Fixed
37cdd4f0c266560b7b924c42361eeae3dc5f0c3e
Fixed
7a3465b79ef0539aa10b310ac3cc35e0ae25b79e
Fixed
748557ca7dc94695a6e209eb68fce365da9a3bb3
Fixed
f4b7bf5a50f1fa25560f0b66a13563465542861b
Fixed
b0a9c6ccaf88c4701787f61ecd2ec0eb014a0677
Fixed
c24e019ca12d9ec814af04b30a64dd7173fb20fe
Fixed
56eda41dcce0ec4d3418b4f85037bdea181486cc
Fixed
351bb7f9ecb9d1f09bd7767491a2b8d07f4f1ea4
Fixed
78261cb08f06c93d362cab5c5034bf5899bc7552

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-53158.json"