In the Linux kernel, the following vulnerability has been resolved:
clk: qcom: gcc-ipq8074: fix terminating of frequency table arrays
The frequency table arrays are supposed to be terminated with an empty element. Add such entry to the end of the arrays where it is missing in order to avoid possible out-of-bound access when the table is traversed by functions like qcomfindfreq() or qcomfindfreq_floor().
Only compile tested.
[
{
"signature_type": "Line",
"deprecated": false,
"target": {
"file": "drivers/clk/qcom/gcc-ipq8074.c"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@83fe1bbd9e259ad109827ccfbfc2488e0dea8e94",
"digest": {
"line_hashes": [
"41219685615927330528958463946094327874",
"176422003364406433883148951232210495559",
"211537315952729983284001065017591268777",
"231475684146523083677902607634217859884",
"212545762781139667443940865239817111950",
"318354600976409091222766593452774887088",
"105422187647031663585264279958661139716",
"146572980987599060000232406431680555782"
],
"threshold": 0.9
},
"id": "CVE-2024-26969-028831c7"
},
{
"signature_type": "Line",
"deprecated": false,
"target": {
"file": "drivers/clk/qcom/gcc-ipq8074.c"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@1040ef5ed95d6fd2628bad387d78a61633e09429",
"digest": {
"line_hashes": [
"41219685615927330528958463946094327874",
"176422003364406433883148951232210495559",
"145578000987426892016602524089464479001",
"230680112818545322689881255197652440050",
"212545762781139667443940865239817111950",
"318354600976409091222766593452774887088",
"188114493106901224041571770320183574846",
"216392704182776362400701681404917626255"
],
"threshold": 0.9
},
"id": "CVE-2024-26969-05ce77eb"
},
{
"signature_type": "Line",
"deprecated": false,
"target": {
"file": "drivers/clk/qcom/gcc-ipq8074.c"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@9de184d4e557d550fb0b7b833b676bda4f269e4f",
"digest": {
"line_hashes": [
"41219685615927330528958463946094327874",
"176422003364406433883148951232210495559",
"211537315952729983284001065017591268777",
"231475684146523083677902607634217859884",
"212545762781139667443940865239817111950",
"318354600976409091222766593452774887088",
"105422187647031663585264279958661139716",
"146572980987599060000232406431680555782"
],
"threshold": 0.9
},
"id": "CVE-2024-26969-325cbc4a"
},
{
"signature_type": "Line",
"deprecated": false,
"target": {
"file": "drivers/clk/qcom/gcc-ipq8074.c"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@be9e2752d823eca1d5af67014a1844a9176ff566",
"digest": {
"line_hashes": [
"41219685615927330528958463946094327874",
"176422003364406433883148951232210495559",
"145578000987426892016602524089464479001",
"230680112818545322689881255197652440050",
"212545762781139667443940865239817111950",
"318354600976409091222766593452774887088",
"188114493106901224041571770320183574846",
"216392704182776362400701681404917626255"
],
"threshold": 0.9
},
"id": "CVE-2024-26969-367d0ed4"
},
{
"signature_type": "Line",
"deprecated": false,
"target": {
"file": "drivers/clk/qcom/gcc-ipq8074.c"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@dd92b159c506804ac57adf3742d9728298bb1255",
"digest": {
"line_hashes": [
"41219685615927330528958463946094327874",
"176422003364406433883148951232210495559",
"211537315952729983284001065017591268777",
"231475684146523083677902607634217859884",
"212545762781139667443940865239817111950",
"318354600976409091222766593452774887088",
"105422187647031663585264279958661139716",
"146572980987599060000232406431680555782"
],
"threshold": 0.9
},
"id": "CVE-2024-26969-ae9e1bd9"
},
{
"signature_type": "Line",
"deprecated": false,
"target": {
"file": "drivers/clk/qcom/gcc-ipq8074.c"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b6b31b4c67ea6bd9222e5b73b330554c57f2f90d",
"digest": {
"line_hashes": [
"41219685615927330528958463946094327874",
"176422003364406433883148951232210495559",
"145578000987426892016602524089464479001",
"230680112818545322689881255197652440050",
"212545762781139667443940865239817111950",
"318354600976409091222766593452774887088",
"188114493106901224041571770320183574846",
"216392704182776362400701681404917626255"
],
"threshold": 0.9
},
"id": "CVE-2024-26969-b43fda0c"
},
{
"signature_type": "Line",
"deprecated": false,
"target": {
"file": "drivers/clk/qcom/gcc-ipq8074.c"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@fc3ac2fcd0a7fad63eba1b359490a4b81720d0f9",
"digest": {
"line_hashes": [
"41219685615927330528958463946094327874",
"176422003364406433883148951232210495559",
"145578000987426892016602524089464479001",
"230680112818545322689881255197652440050",
"212545762781139667443940865239817111950",
"318354600976409091222766593452774887088",
"188114493106901224041571770320183574846",
"216392704182776362400701681404917626255"
],
"threshold": 0.9
},
"id": "CVE-2024-26969-cd7c53e8"
},
{
"signature_type": "Line",
"deprecated": false,
"target": {
"file": "drivers/clk/qcom/gcc-ipq8074.c"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e117c6e2d1617520f5f7d7f6f6b395f01d8b5a27",
"digest": {
"line_hashes": [
"41219685615927330528958463946094327874",
"176422003364406433883148951232210495559",
"211537315952729983284001065017591268777",
"231475684146523083677902607634217859884",
"212545762781139667443940865239817111950",
"318354600976409091222766593452774887088",
"105422187647031663585264279958661139716",
"146572980987599060000232406431680555782"
],
"threshold": 0.9
},
"id": "CVE-2024-26969-d49738cd"
}
]