In the Linux kernel, the following vulnerability has been resolved:
clk: qcom: mmcc-msm8974: fix terminating of frequency table arrays
The frequency table arrays are supposed to be terminated with an empty element. Add such entry to the end of the arrays where it is missing in order to avoid possible out-of-bound access when the table is traversed by functions like qcomfindfreq() or qcomfindfreq_floor().
Only compile tested.
[
{
"id": "CVE-2024-26965-0219d365",
"target": {
"file": "drivers/clk/qcom/mmcc-msm8974.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"254000027220594831746260969826952676661",
"112501728918315208190918258573461797178",
"283990120261283161181973518715299021767",
"282667388555781353427430661435811796589",
"298600884930301969209039645168152398317",
"75643901312819781996901134302005280884",
"256058400709372891631109050058762527636",
"338473817364938356992545878062348849753"
]
},
"deprecated": false,
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@86bf75d9158f511db7530bc82a84b19a5134d089",
"signature_version": "v1"
},
{
"id": "CVE-2024-26965-3c9d5574",
"target": {
"file": "drivers/clk/qcom/mmcc-msm8974.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"254000027220594831746260969826952676661",
"112501728918315208190918258573461797178",
"283990120261283161181973518715299021767",
"282667388555781353427430661435811796589",
"298600884930301969209039645168152398317",
"75643901312819781996901134302005280884",
"256058400709372891631109050058762527636",
"338473817364938356992545878062348849753"
]
},
"deprecated": false,
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@ca2cf98d46748373e830a13d85d215d64a2d9bf2",
"signature_version": "v1"
},
{
"id": "CVE-2024-26965-43b0f4d9",
"target": {
"file": "drivers/clk/qcom/mmcc-msm8974.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"254000027220594831746260969826952676661",
"112501728918315208190918258573461797178",
"283990120261283161181973518715299021767",
"282667388555781353427430661435811796589",
"298600884930301969209039645168152398317",
"75643901312819781996901134302005280884",
"256058400709372891631109050058762527636",
"338473817364938356992545878062348849753"
]
},
"deprecated": false,
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@ae99e199037c580b7350bfa3596f447a53bcf01f",
"signature_version": "v1"
},
{
"id": "CVE-2024-26965-4e9d4f27",
"target": {
"file": "drivers/clk/qcom/mmcc-msm8974.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"254000027220594831746260969826952676661",
"112501728918315208190918258573461797178",
"283990120261283161181973518715299021767",
"282667388555781353427430661435811796589",
"298600884930301969209039645168152398317",
"75643901312819781996901134302005280884",
"256058400709372891631109050058762527636",
"338473817364938356992545878062348849753"
]
},
"deprecated": false,
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@7e9926fef71e514b4a8ea9d11d5a84d52b181362",
"signature_version": "v1"
},
{
"id": "CVE-2024-26965-80282217",
"target": {
"file": "drivers/clk/qcom/mmcc-msm8974.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"254000027220594831746260969826952676661",
"112501728918315208190918258573461797178",
"283990120261283161181973518715299021767",
"282667388555781353427430661435811796589",
"298600884930301969209039645168152398317",
"75643901312819781996901134302005280884",
"256058400709372891631109050058762527636",
"338473817364938356992545878062348849753"
]
},
"deprecated": false,
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@8f562f3b25177c2055b20fd8cf000496f6fa9194",
"signature_version": "v1"
}
]