Vulnerability Details : CVE-2024-26966
In the Linux kernel, the following vulnerability has been resolved:
clk: qcom: mmcc-apq8084: fix terminating of frequency table arrays
The frequency table arrays are supposed to be terminated with an
empty element. Add such entry to the end of the arrays where it
is missing in order to avoid possible out-of-bound access when
the table is traversed by functions like qcom_find_freq() or
qcom_find_freq_floor().
Only compile tested.
Products affected by CVE-2024-26966
- cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2024-26966
0.04%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 13 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2024-26966
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.5
|
MEDIUM | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
1.8
|
3.6
|
NIST | 2024-12-23 |
5.5
|
MEDIUM | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
N/A
|
N/A
|
RedHat-CVE-2024-26966 | 2024-05-01 |
CWE ids for CVE-2024-26966
-
The product uses untrusted input when calculating or using an array index, but the product does not validate or incorrectly validates the index to ensure the index references a valid position within the array.Assigned by: nvd@nist.gov (Primary)
References for CVE-2024-26966
-
https://git.kernel.org/stable/c/a903cfd38d8dee7e754fb89fd1bebed99e28003d
clk: qcom: mmcc-apq8084: fix terminating of frequency table arrays - kernel/git/stable/linux.git - Linux kernel stable treePatch
-
https://git.kernel.org/stable/c/b2dfb216f32627c2f6a8041f2d9d56d102ab87c0
clk: qcom: mmcc-apq8084: fix terminating of frequency table arrays - kernel/git/stable/linux.git - Linux kernel stable treePatch
-
https://git.kernel.org/stable/c/5533686e99b04994d7c4877dc0e4282adc9444a2
clk: qcom: mmcc-apq8084: fix terminating of frequency table arrays - kernel/git/stable/linux.git - Linux kernel stable treePatch
-
https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html
[SECURITY] [DLA 3840-1] linux security updateMailing List;Third Party Advisory
-
https://git.kernel.org/stable/c/7e5432401536117c316d7f3b21d46b64c1514f38
clk: qcom: mmcc-apq8084: fix terminating of frequency table arrays - kernel/git/stable/linux.git - Linux kernel stable treePatch
-
https://git.kernel.org/stable/c/5638330150db2cc30b53eed04e481062faa3ece8
clk: qcom: mmcc-apq8084: fix terminating of frequency table arrays - kernel/git/stable/linux.git - Linux kernel stable treePatch
-
https://git.kernel.org/stable/c/185de0b7cdeaad8b89ebd4c8a258ff2f21adba99
clk: qcom: mmcc-apq8084: fix terminating of frequency table arrays - kernel/git/stable/linux.git - Linux kernel stable treePatch
-
https://git.kernel.org/stable/c/a09aecb6cb482de88301c43bf00a6c8726c4d34f
clk: qcom: mmcc-apq8084: fix terminating of frequency table arrays - kernel/git/stable/linux.git - Linux kernel stable treePatch
-
https://git.kernel.org/stable/c/3aedcf3755c74dafc187eb76acb04e3e6348b1a9
clk: qcom: mmcc-apq8084: fix terminating of frequency table arrays - kernel/git/stable/linux.git - Linux kernel stable treePatch
-
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
[SECURITY] [DLA 3842-1] linux-5.10 security updateMailing List;Third Party Advisory
-
https://git.kernel.org/stable/c/9b4c4546dd61950e80ffdca1bf6925f42b665b03
clk: qcom: mmcc-apq8084: fix terminating of frequency table arrays - kernel/git/stable/linux.git - Linux kernel stable treePatch
Jump to