In the Linux kernel, the following vulnerability has been resolved:
clk: qcom: gcc-ipq5018: fix terminating of frequency table arrays
The frequency table arrays are supposed to be terminated with an empty element. Add such entry to the end of the arrays where it is missing in order to avoid possible out-of-bound access when the table is traversed by functions like qcomfindfreq() or qcomfindfreq_floor().
[
{
"signature_type": "Line",
"deprecated": false,
"target": {
"file": "drivers/clk/qcom/gcc-ipq5018.c"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@90ad946fff70f312b8d23226afc38c13ddd88c4b",
"digest": {
"line_hashes": [
"130337725955548167269406892465968600474",
"164399965210262721600094928071759988422",
"97989981927090835065882435894461361684",
"55649101666137460211506646613450893024",
"102528253637787098626744414464023272902",
"259787772868962595848216223534330572557",
"6961913096029209517898275896374021432",
"235540092728538695742622608102047508997",
"120084722732984199270972373239216546197",
"315727840849556457078037368201410892279",
"256987630580258665601813180204299162306",
"138522532352641712878069206944705408127"
],
"threshold": 0.9
},
"id": "CVE-2024-26971-88028953"
},
{
"signature_type": "Line",
"deprecated": false,
"target": {
"file": "drivers/clk/qcom/gcc-ipq5018.c"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b0cf3d200e8a72b6d28e6e088c062b4a98cb5eaf",
"digest": {
"line_hashes": [
"130337725955548167269406892465968600474",
"164399965210262721600094928071759988422",
"97989981927090835065882435894461361684",
"55649101666137460211506646613450893024",
"102528253637787098626744414464023272902",
"259787772868962595848216223534330572557",
"6961913096029209517898275896374021432",
"235540092728538695742622608102047508997",
"120084722732984199270972373239216546197",
"315727840849556457078037368201410892279",
"256987630580258665601813180204299162306",
"138522532352641712878069206944705408127"
],
"threshold": 0.9
},
"id": "CVE-2024-26971-cff22a0a"
},
{
"signature_type": "Line",
"deprecated": false,
"target": {
"file": "drivers/clk/qcom/gcc-ipq5018.c"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@c8f4bef0667947b826848db1c45a645f751357c1",
"digest": {
"line_hashes": [
"130337725955548167269406892465968600474",
"164399965210262721600094928071759988422",
"97989981927090835065882435894461361684",
"55649101666137460211506646613450893024",
"102528253637787098626744414464023272902",
"259787772868962595848216223534330572557",
"6961913096029209517898275896374021432",
"235540092728538695742622608102047508997",
"120084722732984199270972373239216546197",
"315727840849556457078037368201410892279",
"256987630580258665601813180204299162306",
"138522532352641712878069206944705408127"
],
"threshold": 0.9
},
"id": "CVE-2024-26971-d9518e29"
},
{
"signature_type": "Line",
"deprecated": false,
"target": {
"file": "drivers/clk/qcom/gcc-ipq5018.c"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@50c3acd460551cdf9d8ac6fe0c04f2de0e8e0872",
"digest": {
"line_hashes": [
"130337725955548167269406892465968600474",
"164399965210262721600094928071759988422",
"97989981927090835065882435894461361684",
"55649101666137460211506646613450893024",
"102528253637787098626744414464023272902",
"259787772868962595848216223534330572557",
"6961913096029209517898275896374021432",
"235540092728538695742622608102047508997",
"120084722732984199270972373239216546197",
"315727840849556457078037368201410892279",
"256987630580258665601813180204299162306",
"138522532352641712878069206944705408127"
],
"threshold": 0.9
},
"id": "CVE-2024-26971-f5ac9675"
}
]