In the Linux kernel, the following vulnerability has been resolved:
clk: qcom: gcc-ipq6018: fix terminating of frequency table arrays
The frequency table arrays are supposed to be terminated with an
empty element. Add such entry to the end of the arrays where it
is missing in order to avoid possible out-of-bound access when
the table is traversed by functions like qcom_find_freq() or
qcom_find_freq_floor().
Only compile tested.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
20 Mar 2025, 21:28
Type | Values Removed | Values Added |
---|---|---|
References | () https://git.kernel.org/stable/c/421b135aceace99789c982f6a77ce9476564fb52 - Patch | |
References | () https://git.kernel.org/stable/c/852db52b45ea96dac2720f108e7c7331cd3738bb - Patch | |
References | () https://git.kernel.org/stable/c/ae60e3342296f766f88911d39199f77b05f657a6 - Patch | |
References | () https://git.kernel.org/stable/c/b4527ee3de365a742215773d20f07db3e2c06f3b - Patch | |
References | () https://git.kernel.org/stable/c/cdbc6e2d8108bc47895e5a901cfcaf799b00ca8d - Patch | |
References | () https://git.kernel.org/stable/c/db4066e3ab6b3d918ae2b92734a89c04fe82cc1d - Patch | |
References | () https://git.kernel.org/stable/c/dcb13b5c9ae8743f99a96f392186527c3df89198 - Patch | |
References | () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - Mailing List, Third Party Advisory | |
First Time |
Linux
Linux linux Kernel Debian debian Linux Debian |
|
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* |
21 Nov 2024, 09:03
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
References | () https://git.kernel.org/stable/c/421b135aceace99789c982f6a77ce9476564fb52 - | |
References | () https://git.kernel.org/stable/c/852db52b45ea96dac2720f108e7c7331cd3738bb - | |
References | () https://git.kernel.org/stable/c/ae60e3342296f766f88911d39199f77b05f657a6 - | |
References | () https://git.kernel.org/stable/c/b4527ee3de365a742215773d20f07db3e2c06f3b - | |
References | () https://git.kernel.org/stable/c/cdbc6e2d8108bc47895e5a901cfcaf799b00ca8d - | |
References | () https://git.kernel.org/stable/c/db4066e3ab6b3d918ae2b92734a89c04fe82cc1d - | |
References | () https://git.kernel.org/stable/c/dcb13b5c9ae8743f99a96f392186527c3df89198 - |
05 Nov 2024, 10:16
Type | Values Removed | Values Added |
---|---|---|
References |
|
03 Jul 2024, 01:50
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-125 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
25 Jun 2024, 22:15
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
References |
|
01 May 2024, 06:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-05-01 06:15
Updated : 2025-03-20 21:28
NVD link : CVE-2024-26970
Mitre link : CVE-2024-26970
CVE.ORG link : CVE-2024-26970
JSON object : View
Products Affected
debian
- debian_linux
linux
- linux_kernel
CWE
CWE-125
Out-of-bounds Read