In the Linux kernel, the following vulnerability has been resolved:
clk: qcom: gcc-ipq8074: fix terminating of frequency table arrays
The frequency table arrays are supposed to be terminated with an
empty element. Add such entry to the end of the arrays where it
is missing in order to avoid possible out-of-bound access when
the table is traversed by functions like qcom_find_freq() or
qcom_find_freq_floor().
Only compile tested.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
23 Dec 2024, 13:58
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
CWE | CWE-129 | |
First Time |
Debian debian Linux
Debian Linux Linux linux Kernel |
|
References | () https://git.kernel.org/stable/c/1040ef5ed95d6fd2628bad387d78a61633e09429 - Patch | |
References | () https://git.kernel.org/stable/c/83fe1bbd9e259ad109827ccfbfc2488e0dea8e94 - Patch | |
References | () https://git.kernel.org/stable/c/851cc19bdb02556fb13629b3e4fef6f2bdb038fe - Patch | |
References | () https://git.kernel.org/stable/c/9de184d4e557d550fb0b7b833b676bda4f269e4f - Patch | |
References | () https://git.kernel.org/stable/c/b6b31b4c67ea6bd9222e5b73b330554c57f2f90d - Patch | |
References | () https://git.kernel.org/stable/c/be9e2752d823eca1d5af67014a1844a9176ff566 - Patch | |
References | () https://git.kernel.org/stable/c/dd92b159c506804ac57adf3742d9728298bb1255 - Patch | |
References | () https://git.kernel.org/stable/c/e117c6e2d1617520f5f7d7f6f6b395f01d8b5a27 - Patch | |
References | () https://git.kernel.org/stable/c/fc3ac2fcd0a7fad63eba1b359490a4b81720d0f9 - Patch | |
References | () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - Mailing List, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html - Mailing List, Third Party Advisory | |
CPE | cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
21 Nov 2024, 09:03
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
References | () https://git.kernel.org/stable/c/1040ef5ed95d6fd2628bad387d78a61633e09429 - | |
References | () https://git.kernel.org/stable/c/83fe1bbd9e259ad109827ccfbfc2488e0dea8e94 - | |
References | () https://git.kernel.org/stable/c/851cc19bdb02556fb13629b3e4fef6f2bdb038fe - | |
References | () https://git.kernel.org/stable/c/9de184d4e557d550fb0b7b833b676bda4f269e4f - | |
References | () https://git.kernel.org/stable/c/b6b31b4c67ea6bd9222e5b73b330554c57f2f90d - | |
References | () https://git.kernel.org/stable/c/be9e2752d823eca1d5af67014a1844a9176ff566 - | |
References | () https://git.kernel.org/stable/c/dd92b159c506804ac57adf3742d9728298bb1255 - | |
References | () https://git.kernel.org/stable/c/e117c6e2d1617520f5f7d7f6f6b395f01d8b5a27 - | |
References | () https://git.kernel.org/stable/c/fc3ac2fcd0a7fad63eba1b359490a4b81720d0f9 - |
05 Nov 2024, 10:16
Type | Values Removed | Values Added |
---|---|---|
References |
|
27 Jun 2024, 13:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
25 Jun 2024, 23:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Summary |
|
01 May 2024, 06:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-05-01 06:15
Updated : 2024-12-23 13:58
NVD link : CVE-2024-26969
Mitre link : CVE-2024-26969
CVE.ORG link : CVE-2024-26969
JSON object : View
Products Affected
linux
- linux_kernel
debian
- debian_linux
CWE
CWE-129
Improper Validation of Array Index