In the Linux kernel, the following vulnerability has been resolved:
rtc: pcf85063: fix potential OOB write in PCF85063 NVMEM read
The nvmem interface supports variable buffer sizes, while the regmap
interface operates with fixed-size storage. If an nvmem client uses a
buffer size less than 4 bytes, regmap_read will write out of bounds
as it expects the buffer to point at an unsigned int.
Fix this by using an intermediary unsigned int to hold the value.
References
Configurations
Configuration 1 (hide)
|
History
25 Mar 2025, 14:48
Type | Values Removed | Values Added |
---|---|---|
First Time |
Linux linux Kernel
Linux |
|
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
CWE | CWE-787 | |
References | () https://git.kernel.org/stable/c/21cd59fcb9952eb7505da2bdfc1eb9c619df3ff4 - Patch | |
References | () https://git.kernel.org/stable/c/3ab8c5ed4f84fa20cd16794fe8dc31f633fbc70c - Patch | |
References | () https://git.kernel.org/stable/c/517aedb365f2c94e2d7e0b908ac7127df76203a1 - Patch | |
References | () https://git.kernel.org/stable/c/6f2a8ca9a0a38589f52a7f0fb9425b9ba987ae7c - Patch | |
References | () https://git.kernel.org/stable/c/9adefa7b9559d0f21034a5d5ec1b55840c9348b9 - Patch | |
References | () https://git.kernel.org/stable/c/c72b7a474d3f445bf0c5bcf8ffed332c78eb28a1 - Patch | |
References | () https://git.kernel.org/stable/c/e5536677da803ed54a29a446515c28dce7d3d574 - Patch | |
References | () https://git.kernel.org/stable/c/e5e06455760f2995b16a176033909347929d1128 - Patch |
13 Mar 2025, 13:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Summary |
|
06 Mar 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-03-06 16:15
Updated : 2025-03-25 14:48
NVD link : CVE-2024-58069
Mitre link : CVE-2024-58069
CVE.ORG link : CVE-2024-58069
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-787
Out-of-bounds Write