CVE-2024-58069

In the Linux kernel, the following vulnerability has been resolved: rtc: pcf85063: fix potential OOB write in PCF85063 NVMEM read The nvmem interface supports variable buffer sizes, while the regmap interface operates with fixed-size storage. If an nvmem client uses a buffer size less than 4 bytes, regmap_read will write out of bounds as it expects the buffer to point at an unsigned int. Fix this by using an intermediary unsigned int to hold the value.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

25 Mar 2025, 14:48

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/21cd59fcb9952eb7505da2bdfc1eb9c619df3ff4 - () https://git.kernel.org/stable/c/21cd59fcb9952eb7505da2bdfc1eb9c619df3ff4 - Patch
References () https://git.kernel.org/stable/c/3ab8c5ed4f84fa20cd16794fe8dc31f633fbc70c - () https://git.kernel.org/stable/c/3ab8c5ed4f84fa20cd16794fe8dc31f633fbc70c - Patch
References () https://git.kernel.org/stable/c/517aedb365f2c94e2d7e0b908ac7127df76203a1 - () https://git.kernel.org/stable/c/517aedb365f2c94e2d7e0b908ac7127df76203a1 - Patch
References () https://git.kernel.org/stable/c/6f2a8ca9a0a38589f52a7f0fb9425b9ba987ae7c - () https://git.kernel.org/stable/c/6f2a8ca9a0a38589f52a7f0fb9425b9ba987ae7c - Patch
References () https://git.kernel.org/stable/c/9adefa7b9559d0f21034a5d5ec1b55840c9348b9 - () https://git.kernel.org/stable/c/9adefa7b9559d0f21034a5d5ec1b55840c9348b9 - Patch
References () https://git.kernel.org/stable/c/c72b7a474d3f445bf0c5bcf8ffed332c78eb28a1 - () https://git.kernel.org/stable/c/c72b7a474d3f445bf0c5bcf8ffed332c78eb28a1 - Patch
References () https://git.kernel.org/stable/c/e5536677da803ed54a29a446515c28dce7d3d574 - () https://git.kernel.org/stable/c/e5536677da803ed54a29a446515c28dce7d3d574 - Patch
References () https://git.kernel.org/stable/c/e5e06455760f2995b16a176033909347929d1128 - () https://git.kernel.org/stable/c/e5e06455760f2995b16a176033909347929d1128 - Patch
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
First Time Linux
Linux linux Kernel
CWE CWE-787

13 Mar 2025, 13:15

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: rtc: pcf85063: se corrige una posible escritura OOB en la lectura NVMEM PCF85063 La interfaz nvmem admite tamaños de búfer variables, mientras que la interfaz regmap opera con almacenamiento de tamaño fijo. Si un cliente nvmem usa un tamaño de búfer menor a 4 bytes, regmap_read escribirá fuera de los límites ya que espera que el búfer apunte a una int sin signo. Corrija esto usando una int sin signo intermedia para contener el valor.
References
  • () https://git.kernel.org/stable/c/21cd59fcb9952eb7505da2bdfc1eb9c619df3ff4 -
  • () https://git.kernel.org/stable/c/6f2a8ca9a0a38589f52a7f0fb9425b9ba987ae7c -
  • () https://git.kernel.org/stable/c/e5536677da803ed54a29a446515c28dce7d3d574 -

06 Mar 2025, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-03-06 16:15

Updated : 2025-03-25 14:48


NVD link : CVE-2024-58069

Mitre link : CVE-2024-58069

CVE.ORG link : CVE-2024-58069


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-787

Out-of-bounds Write