CVE-2024-26965

In the Linux kernel, the following vulnerability has been resolved: clk: qcom: mmcc-msm8974: fix terminating of frequency table arrays The frequency table arrays are supposed to be terminated with an empty element. Add such entry to the end of the arrays where it is missing in order to avoid possible out-of-bound access when the table is traversed by functions like qcom_find_freq() or qcom_find_freq_floor(). Only compile tested.
References
Link Resource
https://git.kernel.org/stable/c/3ff4a0f6a8f0ad4b4ee9e908bdfc3cacb7be4060 Patch
https://git.kernel.org/stable/c/537040c257ab4cd0673fbae048f3940c8ea2e589 Patch
https://git.kernel.org/stable/c/7e9926fef71e514b4a8ea9d11d5a84d52b181362 Patch
https://git.kernel.org/stable/c/86bf75d9158f511db7530bc82a84b19a5134d089 Patch
https://git.kernel.org/stable/c/8f562f3b25177c2055b20fd8cf000496f6fa9194 Patch
https://git.kernel.org/stable/c/99740c4791dc8019b0d758c5389ca6d1c0604d95 Patch
https://git.kernel.org/stable/c/ae99e199037c580b7350bfa3596f447a53bcf01f Patch
https://git.kernel.org/stable/c/ca2cf98d46748373e830a13d85d215d64a2d9bf2 Patch
https://git.kernel.org/stable/c/e2c02a85bf53ae86d79b5fccf0a75ac0b78e0c96 Patch
https://git.kernel.org/stable/c/3ff4a0f6a8f0ad4b4ee9e908bdfc3cacb7be4060 Patch
https://git.kernel.org/stable/c/537040c257ab4cd0673fbae048f3940c8ea2e589 Patch
https://git.kernel.org/stable/c/7e9926fef71e514b4a8ea9d11d5a84d52b181362 Patch
https://git.kernel.org/stable/c/86bf75d9158f511db7530bc82a84b19a5134d089 Patch
https://git.kernel.org/stable/c/8f562f3b25177c2055b20fd8cf000496f6fa9194 Patch
https://git.kernel.org/stable/c/99740c4791dc8019b0d758c5389ca6d1c0604d95 Patch
https://git.kernel.org/stable/c/ae99e199037c580b7350bfa3596f447a53bcf01f Patch
https://git.kernel.org/stable/c/ca2cf98d46748373e830a13d85d215d64a2d9bf2 Patch
https://git.kernel.org/stable/c/e2c02a85bf53ae86d79b5fccf0a75ac0b78e0c96 Patch
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html Third Party Advisory Mailing List
https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html Third Party Advisory Mailing List
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

History

23 Dec 2025, 00:54

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/3ff4a0f6a8f0ad4b4ee9e908bdfc3cacb7be4060 - () https://git.kernel.org/stable/c/3ff4a0f6a8f0ad4b4ee9e908bdfc3cacb7be4060 - Patch
References () https://git.kernel.org/stable/c/537040c257ab4cd0673fbae048f3940c8ea2e589 - () https://git.kernel.org/stable/c/537040c257ab4cd0673fbae048f3940c8ea2e589 - Patch
References () https://git.kernel.org/stable/c/7e9926fef71e514b4a8ea9d11d5a84d52b181362 - () https://git.kernel.org/stable/c/7e9926fef71e514b4a8ea9d11d5a84d52b181362 - Patch
References () https://git.kernel.org/stable/c/86bf75d9158f511db7530bc82a84b19a5134d089 - () https://git.kernel.org/stable/c/86bf75d9158f511db7530bc82a84b19a5134d089 - Patch
References () https://git.kernel.org/stable/c/8f562f3b25177c2055b20fd8cf000496f6fa9194 - () https://git.kernel.org/stable/c/8f562f3b25177c2055b20fd8cf000496f6fa9194 - Patch
References () https://git.kernel.org/stable/c/99740c4791dc8019b0d758c5389ca6d1c0604d95 - () https://git.kernel.org/stable/c/99740c4791dc8019b0d758c5389ca6d1c0604d95 - Patch
References () https://git.kernel.org/stable/c/ae99e199037c580b7350bfa3596f447a53bcf01f - () https://git.kernel.org/stable/c/ae99e199037c580b7350bfa3596f447a53bcf01f - Patch
References () https://git.kernel.org/stable/c/ca2cf98d46748373e830a13d85d215d64a2d9bf2 - () https://git.kernel.org/stable/c/ca2cf98d46748373e830a13d85d215d64a2d9bf2 - Patch
References () https://git.kernel.org/stable/c/e2c02a85bf53ae86d79b5fccf0a75ac0b78e0c96 - () https://git.kernel.org/stable/c/e2c02a85bf53ae86d79b5fccf0a75ac0b78e0c96 - Patch
References () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - Third Party Advisory, Mailing List
References () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html - () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html - Third Party Advisory, Mailing List
CPE cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CWE CWE-787
First Time Linux
Debian
Debian debian Linux
Linux linux Kernel
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8

21 Nov 2024, 09:03

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html -
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html -
References () https://git.kernel.org/stable/c/3ff4a0f6a8f0ad4b4ee9e908bdfc3cacb7be4060 - () https://git.kernel.org/stable/c/3ff4a0f6a8f0ad4b4ee9e908bdfc3cacb7be4060 -
References () https://git.kernel.org/stable/c/537040c257ab4cd0673fbae048f3940c8ea2e589 - () https://git.kernel.org/stable/c/537040c257ab4cd0673fbae048f3940c8ea2e589 -
References () https://git.kernel.org/stable/c/7e9926fef71e514b4a8ea9d11d5a84d52b181362 - () https://git.kernel.org/stable/c/7e9926fef71e514b4a8ea9d11d5a84d52b181362 -
References () https://git.kernel.org/stable/c/86bf75d9158f511db7530bc82a84b19a5134d089 - () https://git.kernel.org/stable/c/86bf75d9158f511db7530bc82a84b19a5134d089 -
References () https://git.kernel.org/stable/c/8f562f3b25177c2055b20fd8cf000496f6fa9194 - () https://git.kernel.org/stable/c/8f562f3b25177c2055b20fd8cf000496f6fa9194 -
References () https://git.kernel.org/stable/c/99740c4791dc8019b0d758c5389ca6d1c0604d95 - () https://git.kernel.org/stable/c/99740c4791dc8019b0d758c5389ca6d1c0604d95 -
References () https://git.kernel.org/stable/c/ae99e199037c580b7350bfa3596f447a53bcf01f - () https://git.kernel.org/stable/c/ae99e199037c580b7350bfa3596f447a53bcf01f -
References () https://git.kernel.org/stable/c/ca2cf98d46748373e830a13d85d215d64a2d9bf2 - () https://git.kernel.org/stable/c/ca2cf98d46748373e830a13d85d215d64a2d9bf2 -
References () https://git.kernel.org/stable/c/e2c02a85bf53ae86d79b5fccf0a75ac0b78e0c96 - () https://git.kernel.org/stable/c/e2c02a85bf53ae86d79b5fccf0a75ac0b78e0c96 -

05 Nov 2024, 10:16

Type Values Removed Values Added
References
  • {'url': 'https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html', 'source': '416baaa9-dc9f-4396-8d5f-8c081fb06d67'}
  • {'url': 'https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html', 'source': '416baaa9-dc9f-4396-8d5f-8c081fb06d67'}

27 Jun 2024, 12:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html -

25 Jun 2024, 22:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html -
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: clk: qcom: mmcc-msm8974: corrección de terminación de matrices de tablas de frecuencia Se supone que las matrices de tablas de frecuencia terminan con un elemento vacío. Agregue dicha entrada al final de las matrices donde falta para evitar un posible acceso fuera de los límites cuando la tabla es atravesada por funciones como qcom_find_freq() o qcom_find_freq_floor(). Solo compilar probado.

01 May 2024, 06:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-01 06:15

Updated : 2025-12-23 00:54


NVD link : CVE-2024-26965

Mitre link : CVE-2024-26965

CVE.ORG link : CVE-2024-26965


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel
CWE
CWE-787

Out-of-bounds Write