{"vulnerability": "CVE-2024-53158", "sightings": [{"uuid": "2d302edc-bb51-45ac-b28b-200c5c704e6e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53158", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3le2gdxjkiv2f", "content": "", "creation_timestamp": "2024-12-24T12:16:07.251832Z"}, {"uuid": "158f5847-a7ab-43df-8b7b-52576f514200", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53158", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113707763711410316", "content": "", "creation_timestamp": "2024-12-24T12:19:41.816816Z"}, {"uuid": "45cba55a-2ad8-4f2b-8fbc-0ebcd310b6ed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53158", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-226-07", "content": "", "creation_timestamp": "2025-08-14T10:00:00.000000Z"}, {"uuid": "6617f03d-6a27-44eb-ba82-677fba95f163", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53158", "type": "seen", "source": "https://t.me/cvedetector/13586", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-53158 - Qualcomm Snapdragon SOC: Out-of-Bounds Read Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-53158 \nPublished : Dec. 24, 2024, 12:15 p.m. | 45\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \nsoc: qcom: geni-se: fix array underflow in geni_se_clk_tbl_get()  \n  \nThis loop is supposed to break if the frequency returned from  \nclk_round_rate() is the same as on the previous iteration.  However,  \nthat check doesn't make sense on the first iteration through the loop.  \nIt leads to reading before the start of these-&gt;clk_perf_tbl[] array. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"24 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-24T14:24:16.000000Z"}]}