{"id":"CVE-2024-53158","summary":"soc: qcom: geni-se: fix array underflow in geni_se_clk_tbl_get()","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nsoc: qcom: geni-se: fix array underflow in geni_se_clk_tbl_get()\n\nThis loop is supposed to break if the frequency returned from\nclk_round_rate() is the same as on the previous iteration.  However,\nthat check doesn't make sense on the first iteration through the loop.\nIt leads to reading before the start of these-\u003eclk_perf_tbl[] array.","modified":"2026-04-02T12:22:54.653977Z","published":"2024-12-24T11:28:57.160Z","related":["SUSE-SU-2025:0117-1","SUSE-SU-2025:0153-1","SUSE-SU-2025:0154-1","SUSE-SU-2025:0201-1","SUSE-SU-2025:0201-2","SUSE-SU-2025:0229-1","SUSE-SU-2025:0289-1","SUSE-SU-2025:20165-1","SUSE-SU-2025:20166-1","SUSE-SU-2025:20248-1","SUSE-SU-2025:20249-1","USN-7276-1","USN-7277-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/53xxx/CVE-2024-53158.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/351bb7f9ecb9d1f09bd7767491a2b8d07f4f1ea4"},{"type":"WEB","url":"https://git.kernel.org/stable/c/37cdd4f0c266560b7b924c42361eeae3dc5f0c3e"},{"type":"WEB","url":"https://git.kernel.org/stable/c/56eda41dcce0ec4d3418b4f85037bdea181486cc"},{"type":"WEB","url":"https://git.kernel.org/stable/c/748557ca7dc94695a6e209eb68fce365da9a3bb3"},{"type":"WEB","url":"https://git.kernel.org/stable/c/78261cb08f06c93d362cab5c5034bf5899bc7552"},{"type":"WEB","url":"https://git.kernel.org/stable/c/7a3465b79ef0539aa10b310ac3cc35e0ae25b79e"},{"type":"WEB","url":"https://git.kernel.org/stable/c/b0a9c6ccaf88c4701787f61ecd2ec0eb014a0677"},{"type":"WEB","url":"https://git.kernel.org/stable/c/c24e019ca12d9ec814af04b30a64dd7173fb20fe"},{"type":"WEB","url":"https://git.kernel.org/stable/c/f4b7bf5a50f1fa25560f0b66a13563465542861b"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/53xxx/CVE-2024-53158.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-53158"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"eddac5af06546d2e7a0730e3dc02dde3dc91098a"},{"fixed":"37cdd4f0c266560b7b924c42361eeae3dc5f0c3e"},{"fixed":"7a3465b79ef0539aa10b310ac3cc35e0ae25b79e"},{"fixed":"748557ca7dc94695a6e209eb68fce365da9a3bb3"},{"fixed":"f4b7bf5a50f1fa25560f0b66a13563465542861b"},{"fixed":"b0a9c6ccaf88c4701787f61ecd2ec0eb014a0677"},{"fixed":"c24e019ca12d9ec814af04b30a64dd7173fb20fe"},{"fixed":"56eda41dcce0ec4d3418b4f85037bdea181486cc"},{"fixed":"351bb7f9ecb9d1f09bd7767491a2b8d07f4f1ea4"},{"fixed":"78261cb08f06c93d362cab5c5034bf5899bc7552"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-53158.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}]}