CVE-2024-42086

In the Linux kernel, the following vulnerability has been resolved: iio: chemical: bme680: Fix overflows in compensate() functions There are cases in the compensate functions of the driver that there could be overflows of variables due to bit shifting ops. These implications were initially discussed here [1] and they were mentioned in log message of Commit 1b3bd8592780 ("iio: chemical: Add support for Bosch BME680 sensor"). [1]: https://lore.kernel.org/linux-iio/20180728114028.3c1bbe81@archlinux/
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc5:*:*:*:*:*:*

History

26 Sep 2025, 14:45

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/3add41bbda92938e9a528d74659dfc552796be4e - () https://git.kernel.org/stable/c/3add41bbda92938e9a528d74659dfc552796be4e - Patch
References () https://git.kernel.org/stable/c/6fa31bbe2ea8665ee970258eb8320cbf231dbe9e - () https://git.kernel.org/stable/c/6fa31bbe2ea8665ee970258eb8320cbf231dbe9e - Patch
References () https://git.kernel.org/stable/c/7a13d1357658d3a3c1cd7b3b9543c805a6e5e6e9 - () https://git.kernel.org/stable/c/7a13d1357658d3a3c1cd7b3b9543c805a6e5e6e9 - Patch
References () https://git.kernel.org/stable/c/b0af334616ed425024bf220adda0f004806b5feb - () https://git.kernel.org/stable/c/b0af334616ed425024bf220adda0f004806b5feb - Patch
References () https://git.kernel.org/stable/c/b5967393d50e3c6e632efda3ea3fdde14c1bfd0e - () https://git.kernel.org/stable/c/b5967393d50e3c6e632efda3ea3fdde14c1bfd0e - Patch
References () https://git.kernel.org/stable/c/ba1bb3e2a38a7fef1c1818dd4f2d9abbfdde553a - () https://git.kernel.org/stable/c/ba1bb3e2a38a7fef1c1818dd4f2d9abbfdde553a - Patch
References () https://git.kernel.org/stable/c/c326551e99f5416986074ce78bef94f6a404b517 - () https://git.kernel.org/stable/c/c326551e99f5416986074ce78bef94f6a404b517 - Patch
References () https://git.kernel.org/stable/c/fdd478c3ae98c3f13628e110dce9b6cfb0d9b3c8 - () https://git.kernel.org/stable/c/fdd478c3ae98c3f13628e110dce9b6cfb0d9b3c8 - Patch
CPE cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:*
First Time Linux
Linux linux Kernel
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
CWE CWE-787

Information

Published : 2024-07-29 17:15

Updated : 2025-09-26 14:45


NVD link : CVE-2024-42086

Mitre link : CVE-2024-42086

CVE.ORG link : CVE-2024-42086


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-787

Out-of-bounds Write