In the Linux kernel, the following vulnerability has been resolved:
clk: qcom: gcc-ipq6018: fix terminating of frequency table arrays
The frequency table arrays are supposed to be terminated with an
empty element. Add such entry to the end of the arrays where it
is missing in order to avoid possible out-of-bound access when
the table is traversed by functions like qcom_find_freq() or
qcom_find_freq_floor().
Only compile tested.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
20 Mar 2025, 21:28
Type | Values Removed | Values Added |
---|---|---|
First Time |
Debian debian Linux
Linux linux Kernel Debian Linux |
|
References | () https://git.kernel.org/stable/c/421b135aceace99789c982f6a77ce9476564fb52 - Patch | |
References | () https://git.kernel.org/stable/c/852db52b45ea96dac2720f108e7c7331cd3738bb - Patch | |
References | () https://git.kernel.org/stable/c/ae60e3342296f766f88911d39199f77b05f657a6 - Patch | |
References | () https://git.kernel.org/stable/c/b4527ee3de365a742215773d20f07db3e2c06f3b - Patch | |
References | () https://git.kernel.org/stable/c/cdbc6e2d8108bc47895e5a901cfcaf799b00ca8d - Patch | |
References | () https://git.kernel.org/stable/c/db4066e3ab6b3d918ae2b92734a89c04fe82cc1d - Patch | |
References | () https://git.kernel.org/stable/c/dcb13b5c9ae8743f99a96f392186527c3df89198 - Patch | |
References | () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - Mailing List, Third Party Advisory | |
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* |
Information
Published : 2024-05-01 06:15
Updated : 2025-03-20 21:28
NVD link : CVE-2024-26970
Mitre link : CVE-2024-26970
CVE.ORG link : CVE-2024-26970
JSON object : View
Products Affected
linux
- linux_kernel
debian
- debian_linux
CWE
CWE-125
Out-of-bounds Read