CVE-2024-26968

In the Linux kernel, the following vulnerability has been resolved: clk: qcom: gcc-ipq9574: fix terminating of frequency table arrays The frequency table arrays are supposed to be terminated with an empty element. Add such entry to the end of the arrays where it is missing in order to avoid possible out-of-bound access when the table is traversed by functions like qcom_find_freq() or qcom_find_freq_floor(). Only compile tested.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

23 Dec 2024, 13:54

Type Values Removed Values Added
CWE CWE-129
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
First Time Linux linux Kernel
Linux
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
References () https://git.kernel.org/stable/c/0204247cf3669b6021fb745c3b7f37ae392ab19c - () https://git.kernel.org/stable/c/0204247cf3669b6021fb745c3b7f37ae392ab19c - Patch
References () https://git.kernel.org/stable/c/1723629fea8a4e75333196866e10d395463dca72 - () https://git.kernel.org/stable/c/1723629fea8a4e75333196866e10d395463dca72 - Patch
References () https://git.kernel.org/stable/c/604f2d7c46727c5e24fc7faddc980bc1cc0b1011 - () https://git.kernel.org/stable/c/604f2d7c46727c5e24fc7faddc980bc1cc0b1011 - Patch
References () https://git.kernel.org/stable/c/bd2b6395671d823caa38d8e4d752de2448ae61e1 - () https://git.kernel.org/stable/c/bd2b6395671d823caa38d8e4d752de2448ae61e1 - Patch

21 Nov 2024, 09:03

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: clk: qcom: gcc-ipq9574: corrección de terminación de matrices de tablas de frecuencia Se supone que las matrices de tablas de frecuencia terminan con un elemento vacío. Agregue dicha entrada al final de las matrices donde falta para evitar un posible acceso fuera de los límites cuando la tabla es atravesada por funciones como qcom_find_freq() o qcom_find_freq_floor(). Solo compilar probado.
References () https://git.kernel.org/stable/c/0204247cf3669b6021fb745c3b7f37ae392ab19c - () https://git.kernel.org/stable/c/0204247cf3669b6021fb745c3b7f37ae392ab19c -
References () https://git.kernel.org/stable/c/1723629fea8a4e75333196866e10d395463dca72 - () https://git.kernel.org/stable/c/1723629fea8a4e75333196866e10d395463dca72 -
References () https://git.kernel.org/stable/c/604f2d7c46727c5e24fc7faddc980bc1cc0b1011 - () https://git.kernel.org/stable/c/604f2d7c46727c5e24fc7faddc980bc1cc0b1011 -
References () https://git.kernel.org/stable/c/bd2b6395671d823caa38d8e4d752de2448ae61e1 - () https://git.kernel.org/stable/c/bd2b6395671d823caa38d8e4d752de2448ae61e1 -

01 May 2024, 06:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-01 06:15

Updated : 2024-12-23 13:54


NVD link : CVE-2024-26968

Mitre link : CVE-2024-26968

CVE.ORG link : CVE-2024-26968


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-129

Improper Validation of Array Index