CVE-2024-42100

In the Linux kernel, the following vulnerability has been resolved: clk: sunxi-ng: common: Don't call hw_to_ccu_common on hw without common In order to set the rate range of a hw sunxi_ccu_probe calls hw_to_ccu_common() assuming all entries in desc->ccu_clks are contained in a ccu_common struct. This assumption is incorrect and, in consequence, causes invalid pointer de-references. Remove the faulty call. Instead, add one more loop that iterates over the ccu_clks and sets the rate range, if required.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9:rc7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc6:*:*:*:*:*:*

History

26 Sep 2025, 14:56

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
References () https://git.kernel.org/stable/c/14c78d69dbca6a28af14095f639ec4318ec07fdc - () https://git.kernel.org/stable/c/14c78d69dbca6a28af14095f639ec4318ec07fdc - Patch
References () https://git.kernel.org/stable/c/7a0e2738cb6da5a55c9908dff333600aeb263e07 - () https://git.kernel.org/stable/c/7a0e2738cb6da5a55c9908dff333600aeb263e07 - Patch
References () https://git.kernel.org/stable/c/ea977d742507e534d9fe4f4d74256f6b7f589338 - () https://git.kernel.org/stable/c/ea977d742507e534d9fe4f4d74256f6b7f589338 - Patch
CWE CWE-476
First Time Linux linux Kernel
Linux
CPE cpe:2.3:o:linux:linux_kernel:6.10:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9:rc7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc4:*:*:*:*:*:*

21 Nov 2024, 09:33

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/14c78d69dbca6a28af14095f639ec4318ec07fdc - () https://git.kernel.org/stable/c/14c78d69dbca6a28af14095f639ec4318ec07fdc -
References () https://git.kernel.org/stable/c/7a0e2738cb6da5a55c9908dff333600aeb263e07 - () https://git.kernel.org/stable/c/7a0e2738cb6da5a55c9908dff333600aeb263e07 -
References () https://git.kernel.org/stable/c/ea977d742507e534d9fe4f4d74256f6b7f589338 - () https://git.kernel.org/stable/c/ea977d742507e534d9fe4f4d74256f6b7f589338 -

30 Jul 2024, 13:32

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: clk: sunxi-ng: common: no llame a hw_to_ccu_common en hw sin common Para establecer el rango de velocidad de un hw, sunxi_ccu_probe llama a hw_to_ccu_common() asumiendo todas las entradas en desc- >ccu_clks están contenidos en una estructura ccu_common. Esta suposición es incorrecta y, en consecuencia, provoca desreferencias de punteros no válidas. Eliminar la llamada defectuosa. En su lugar, agregue un bucle más que itere sobre ccu_clks y establezca el rango de velocidad, si es necesario.

30 Jul 2024, 08:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-07-30 08:15

Updated : 2025-09-26 14:56


NVD link : CVE-2024-42100

Mitre link : CVE-2024-42100

CVE.ORG link : CVE-2024-42100


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-476

NULL Pointer Dereference