In the Linux kernel, the following vulnerability has been resolved:
soc: qcom: geni-se: fix array underflow in geniseclktblget()
This loop is supposed to break if the frequency returned from clkroundrate() is the same as on the previous iteration. However, that check doesn't make sense on the first iteration through the loop. It leads to reading before the start of these->clkperftbl[] array.
[
{
"id": "CVE-2024-53158-03861a38",
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b0a9c6ccaf88c4701787f61ecd2ec0eb014a0677",
"target": {
"file": "drivers/soc/qcom/qcom-geni-se.c",
"function": "geni_se_clk_tbl_get"
},
"deprecated": false,
"digest": {
"length": 668.0,
"function_hash": "123766289286555254698499863980283373101"
},
"signature_version": "v1"
},
{
"id": "CVE-2024-53158-0b3a9d9d",
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@7a3465b79ef0539aa10b310ac3cc35e0ae25b79e",
"target": {
"file": "drivers/soc/qcom/qcom-geni-se.c",
"function": "geni_se_clk_tbl_get"
},
"deprecated": false,
"digest": {
"length": 668.0,
"function_hash": "123766289286555254698499863980283373101"
},
"signature_version": "v1"
},
{
"id": "CVE-2024-53158-1de3d691",
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@c24e019ca12d9ec814af04b30a64dd7173fb20fe",
"target": {
"file": "drivers/soc/qcom/qcom-geni-se.c"
},
"deprecated": false,
"digest": {
"line_hashes": [
"315015964405603893997203049805139303876",
"167291460416619171514692900321814807644",
"73977164738924669343981046690022091877",
"80500626463473740239352028983118118915"
],
"threshold": 0.9
},
"signature_version": "v1"
},
{
"id": "CVE-2024-53158-2c845d16",
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@37cdd4f0c266560b7b924c42361eeae3dc5f0c3e",
"target": {
"file": "drivers/soc/qcom/qcom-geni-se.c"
},
"deprecated": false,
"digest": {
"line_hashes": [
"315015964405603893997203049805139303876",
"167291460416619171514692900321814807644",
"73977164738924669343981046690022091877",
"80500626463473740239352028983118118915"
],
"threshold": 0.9
},
"signature_version": "v1"
},
{
"id": "CVE-2024-53158-3eb944a3",
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@748557ca7dc94695a6e209eb68fce365da9a3bb3",
"target": {
"file": "drivers/soc/qcom/qcom-geni-se.c"
},
"deprecated": false,
"digest": {
"line_hashes": [
"315015964405603893997203049805139303876",
"167291460416619171514692900321814807644",
"73977164738924669343981046690022091877",
"80500626463473740239352028983118118915"
],
"threshold": 0.9
},
"signature_version": "v1"
},
{
"id": "CVE-2024-53158-4b44de6a",
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b0a9c6ccaf88c4701787f61ecd2ec0eb014a0677",
"target": {
"file": "drivers/soc/qcom/qcom-geni-se.c"
},
"deprecated": false,
"digest": {
"line_hashes": [
"315015964405603893997203049805139303876",
"167291460416619171514692900321814807644",
"73977164738924669343981046690022091877",
"80500626463473740239352028983118118915"
],
"threshold": 0.9
},
"signature_version": "v1"
},
{
"id": "CVE-2024-53158-5ed3c90f",
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@351bb7f9ecb9d1f09bd7767491a2b8d07f4f1ea4",
"target": {
"file": "drivers/soc/qcom/qcom-geni-se.c",
"function": "geni_se_clk_tbl_get"
},
"deprecated": false,
"digest": {
"length": 668.0,
"function_hash": "123766289286555254698499863980283373101"
},
"signature_version": "v1"
},
{
"id": "CVE-2024-53158-6508f10e",
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@56eda41dcce0ec4d3418b4f85037bdea181486cc",
"target": {
"file": "drivers/soc/qcom/qcom-geni-se.c",
"function": "geni_se_clk_tbl_get"
},
"deprecated": false,
"digest": {
"length": 668.0,
"function_hash": "123766289286555254698499863980283373101"
},
"signature_version": "v1"
},
{
"id": "CVE-2024-53158-8836360c",
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f4b7bf5a50f1fa25560f0b66a13563465542861b",
"target": {
"file": "drivers/soc/qcom/qcom-geni-se.c"
},
"deprecated": false,
"digest": {
"line_hashes": [
"315015964405603893997203049805139303876",
"167291460416619171514692900321814807644",
"73977164738924669343981046690022091877",
"80500626463473740239352028983118118915"
],
"threshold": 0.9
},
"signature_version": "v1"
},
{
"id": "CVE-2024-53158-96fd1377",
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@7a3465b79ef0539aa10b310ac3cc35e0ae25b79e",
"target": {
"file": "drivers/soc/qcom/qcom-geni-se.c"
},
"deprecated": false,
"digest": {
"line_hashes": [
"315015964405603893997203049805139303876",
"167291460416619171514692900321814807644",
"73977164738924669343981046690022091877",
"80500626463473740239352028983118118915"
],
"threshold": 0.9
},
"signature_version": "v1"
},
{
"id": "CVE-2024-53158-b14ce947",
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@351bb7f9ecb9d1f09bd7767491a2b8d07f4f1ea4",
"target": {
"file": "drivers/soc/qcom/qcom-geni-se.c"
},
"deprecated": false,
"digest": {
"line_hashes": [
"315015964405603893997203049805139303876",
"167291460416619171514692900321814807644",
"73977164738924669343981046690022091877",
"80500626463473740239352028983118118915"
],
"threshold": 0.9
},
"signature_version": "v1"
},
{
"id": "CVE-2024-53158-b8daaa53",
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@78261cb08f06c93d362cab5c5034bf5899bc7552",
"target": {
"file": "drivers/soc/qcom/qcom-geni-se.c",
"function": "geni_se_clk_tbl_get"
},
"deprecated": false,
"digest": {
"length": 668.0,
"function_hash": "123766289286555254698499863980283373101"
},
"signature_version": "v1"
},
{
"id": "CVE-2024-53158-bdd64222",
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@56eda41dcce0ec4d3418b4f85037bdea181486cc",
"target": {
"file": "drivers/soc/qcom/qcom-geni-se.c"
},
"deprecated": false,
"digest": {
"line_hashes": [
"315015964405603893997203049805139303876",
"167291460416619171514692900321814807644",
"73977164738924669343981046690022091877",
"80500626463473740239352028983118118915"
],
"threshold": 0.9
},
"signature_version": "v1"
},
{
"id": "CVE-2024-53158-c10f54c3",
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@78261cb08f06c93d362cab5c5034bf5899bc7552",
"target": {
"file": "drivers/soc/qcom/qcom-geni-se.c"
},
"deprecated": false,
"digest": {
"line_hashes": [
"315015964405603893997203049805139303876",
"167291460416619171514692900321814807644",
"73977164738924669343981046690022091877",
"80500626463473740239352028983118118915"
],
"threshold": 0.9
},
"signature_version": "v1"
},
{
"id": "CVE-2024-53158-c8a50afb",
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@c24e019ca12d9ec814af04b30a64dd7173fb20fe",
"target": {
"file": "drivers/soc/qcom/qcom-geni-se.c",
"function": "geni_se_clk_tbl_get"
},
"deprecated": false,
"digest": {
"length": 668.0,
"function_hash": "123766289286555254698499863980283373101"
},
"signature_version": "v1"
},
{
"id": "CVE-2024-53158-dec22638",
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@748557ca7dc94695a6e209eb68fce365da9a3bb3",
"target": {
"file": "drivers/soc/qcom/qcom-geni-se.c",
"function": "geni_se_clk_tbl_get"
},
"deprecated": false,
"digest": {
"length": 668.0,
"function_hash": "123766289286555254698499863980283373101"
},
"signature_version": "v1"
},
{
"id": "CVE-2024-53158-f152aafa",
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@37cdd4f0c266560b7b924c42361eeae3dc5f0c3e",
"target": {
"file": "drivers/soc/qcom/qcom-geni-se.c",
"function": "geni_se_clk_tbl_get"
},
"deprecated": false,
"digest": {
"length": 668.0,
"function_hash": "123766289286555254698499863980283373101"
},
"signature_version": "v1"
},
{
"id": "CVE-2024-53158-fe5b3136",
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f4b7bf5a50f1fa25560f0b66a13563465542861b",
"target": {
"file": "drivers/soc/qcom/qcom-geni-se.c",
"function": "geni_se_clk_tbl_get"
},
"deprecated": false,
"digest": {
"length": 668.0,
"function_hash": "123766289286555254698499863980283373101"
},
"signature_version": "v1"
}
]