In the Linux kernel, the following vulnerability has been resolved:
clk: qcom: gcc-ipq8074: fix terminating of frequency table arrays
The frequency table arrays are supposed to be terminated with an
empty element. Add such entry to the end of the arrays where it
is missing in order to avoid possible out-of-bound access when
the table is traversed by functions like qcom_find_freq() or
qcom_find_freq_floor().
Only compile tested.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
23 Dec 2024, 13:58
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-129 | |
First Time |
Debian
Linux linux Kernel Debian debian Linux Linux |
|
CPE | cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
|
References | () https://git.kernel.org/stable/c/1040ef5ed95d6fd2628bad387d78a61633e09429 - Patch | |
References | () https://git.kernel.org/stable/c/83fe1bbd9e259ad109827ccfbfc2488e0dea8e94 - Patch | |
References | () https://git.kernel.org/stable/c/851cc19bdb02556fb13629b3e4fef6f2bdb038fe - Patch | |
References | () https://git.kernel.org/stable/c/9de184d4e557d550fb0b7b833b676bda4f269e4f - Patch | |
References | () https://git.kernel.org/stable/c/b6b31b4c67ea6bd9222e5b73b330554c57f2f90d - Patch | |
References | () https://git.kernel.org/stable/c/be9e2752d823eca1d5af67014a1844a9176ff566 - Patch | |
References | () https://git.kernel.org/stable/c/dd92b159c506804ac57adf3742d9728298bb1255 - Patch | |
References | () https://git.kernel.org/stable/c/e117c6e2d1617520f5f7d7f6f6b395f01d8b5a27 - Patch | |
References | () https://git.kernel.org/stable/c/fc3ac2fcd0a7fad63eba1b359490a4b81720d0f9 - Patch | |
References | () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - Mailing List, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html - Mailing List, Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
Information
Published : 2024-05-01 06:15
Updated : 2024-12-23 13:58
NVD link : CVE-2024-26969
Mitre link : CVE-2024-26969
CVE.ORG link : CVE-2024-26969
JSON object : View
Products Affected
debian
- debian_linux
linux
- linux_kernel
CWE
CWE-129
Improper Validation of Array Index