In the Linux kernel, the following vulnerability has been resolved:
pwm: Fix out-of-bounds access in ofpwmsingle_xlate()
With args->args_count == 2 args->args[2] is not defined. Actually the flags are contained in args->args[1].
{ "vanir_signatures": [ { "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@7b85554c7c2aee91171e038e4d5442ffa130b282", "signature_type": "Function", "digest": { "function_hash": "112908124386885331012758565087836596429", "length": 544.0 }, "id": "CVE-2024-26599-38c90466", "target": { "file": "drivers/pwm/core.c", "function": "of_pwm_single_xlate" }, "deprecated": false, "signature_version": "v1" }, { "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e5f2b4b62977fb6c2efcbc5779e0c9dce18215f7", "signature_type": "Line", "digest": { "threshold": 0.9, "line_hashes": [ "298783134680890513809820064728311024645", "12683835543955372558235721682798010806", "301328108752399550828365366060768259812", "333609673088934336899221376888573118177" ] }, "id": "CVE-2024-26599-5af43b85", "target": { "file": "drivers/pwm/core.c" }, "deprecated": false, "signature_version": "v1" }, { "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@a297d07b9a1e4fb8cda25a4a2363a507d294b7c9", "signature_type": "Line", "digest": { "threshold": 0.9, "line_hashes": [ "298783134680890513809820064728311024645", "12683835543955372558235721682798010806", "301328108752399550828365366060768259812", "333609673088934336899221376888573118177" ] }, "id": "CVE-2024-26599-5ebaaa81", "target": { "file": "drivers/pwm/core.c" }, "deprecated": false, "signature_version": "v1" }, { "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@7b85554c7c2aee91171e038e4d5442ffa130b282", "signature_type": "Line", "digest": { "threshold": 0.9, "line_hashes": [ "298783134680890513809820064728311024645", "12683835543955372558235721682798010806", "301328108752399550828365366060768259812", "333609673088934336899221376888573118177" ] }, "id": "CVE-2024-26599-8df2236e", "target": { "file": "drivers/pwm/core.c" }, "deprecated": false, "signature_version": "v1" }, { "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e5f2b4b62977fb6c2efcbc5779e0c9dce18215f7", "signature_type": "Function", "digest": { "function_hash": "112908124386885331012758565087836596429", "length": 544.0 }, "id": "CVE-2024-26599-96a9c9de", "target": { "file": "drivers/pwm/core.c", "function": "of_pwm_single_xlate" }, "deprecated": false, "signature_version": "v1" }, { "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@a297d07b9a1e4fb8cda25a4a2363a507d294b7c9", "signature_type": "Function", "digest": { "function_hash": "112908124386885331012758565087836596429", "length": 544.0 }, "id": "CVE-2024-26599-c666e6b3", "target": { "file": "drivers/pwm/core.c", "function": "of_pwm_single_xlate" }, "deprecated": false, "signature_version": "v1" }, { "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@bae45b7ebb31984b63b13c3519fd724b3ce92123", "signature_type": "Line", "digest": { "threshold": 0.9, "line_hashes": [ "298783134680890513809820064728311024645", "12683835543955372558235721682798010806", "301328108752399550828365366060768259812", "333609673088934336899221376888573118177" ] }, "id": "CVE-2024-26599-cd1853e4", "target": { "file": "drivers/pwm/core.c" }, "deprecated": false, "signature_version": "v1" }, { "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@bae45b7ebb31984b63b13c3519fd724b3ce92123", "signature_type": "Function", "digest": { "function_hash": "112908124386885331012758565087836596429", "length": 544.0 }, "id": "CVE-2024-26599-dae006f4", "target": { "file": "drivers/pwm/core.c", "function": "of_pwm_single_xlate" }, "deprecated": false, "signature_version": "v1" } ] }