In the Linux kernel, the following vulnerability has been resolved:
clk: qcom: gcc-ipq6018: fix terminating of frequency table arrays
The frequency table arrays are supposed to be terminated with an empty element. Add such entry to the end of the arrays where it is missing in order to avoid possible out-of-bound access when the table is traversed by functions like qcomfindfreq() or qcomfindfreq_floor().
Only compile tested.
[
{
"digest": {
"line_hashes": [
"173350279598946428204515997204820955640",
"228535876104487515515533898874379975018",
"168929917741534571853138639926843576982",
"46973185730240101112920146722008917988",
"325285107989370521999462462908674704990",
"140546732222812585206262759408169471560",
"80593505410595621463003374792045219151",
"205666408308421438887767511853543743187"
],
"threshold": 0.9
},
"id": "CVE-2024-26970-36a5d523",
"target": {
"file": "drivers/clk/qcom/gcc-ipq6018.c"
},
"signature_type": "Line",
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@852db52b45ea96dac2720f108e7c7331cd3738bb",
"deprecated": false
},
{
"digest": {
"line_hashes": [
"173350279598946428204515997204820955640",
"228535876104487515515533898874379975018",
"168929917741534571853138639926843576982",
"46973185730240101112920146722008917988",
"325285107989370521999462462908674704990",
"140546732222812585206262759408169471560",
"80593505410595621463003374792045219151",
"205666408308421438887767511853543743187"
],
"threshold": 0.9
},
"id": "CVE-2024-26970-57a4f891",
"target": {
"file": "drivers/clk/qcom/gcc-ipq6018.c"
},
"signature_type": "Line",
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@cdbc6e2d8108bc47895e5a901cfcaf799b00ca8d",
"deprecated": false
},
{
"digest": {
"line_hashes": [
"173350279598946428204515997204820955640",
"228535876104487515515533898874379975018",
"168929917741534571853138639926843576982",
"46973185730240101112920146722008917988",
"325285107989370521999462462908674704990",
"140546732222812585206262759408169471560",
"80593505410595621463003374792045219151",
"205666408308421438887767511853543743187"
],
"threshold": 0.9
},
"id": "CVE-2024-26970-86b0b1a2",
"target": {
"file": "drivers/clk/qcom/gcc-ipq6018.c"
},
"signature_type": "Line",
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b4527ee3de365a742215773d20f07db3e2c06f3b",
"deprecated": false
},
{
"digest": {
"line_hashes": [
"173350279598946428204515997204820955640",
"228535876104487515515533898874379975018",
"168929917741534571853138639926843576982",
"46973185730240101112920146722008917988",
"325285107989370521999462462908674704990",
"140546732222812585206262759408169471560",
"80593505410595621463003374792045219151",
"205666408308421438887767511853543743187"
],
"threshold": 0.9
},
"id": "CVE-2024-26970-883f85ed",
"target": {
"file": "drivers/clk/qcom/gcc-ipq6018.c"
},
"signature_type": "Line",
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@db4066e3ab6b3d918ae2b92734a89c04fe82cc1d",
"deprecated": false
},
{
"digest": {
"line_hashes": [
"173350279598946428204515997204820955640",
"228535876104487515515533898874379975018",
"168929917741534571853138639926843576982",
"46973185730240101112920146722008917988",
"325285107989370521999462462908674704990",
"140546732222812585206262759408169471560",
"80593505410595621463003374792045219151",
"205666408308421438887767511853543743187"
],
"threshold": 0.9
},
"id": "CVE-2024-26970-a445f040",
"target": {
"file": "drivers/clk/qcom/gcc-ipq6018.c"
},
"signature_type": "Line",
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@dcb13b5c9ae8743f99a96f392186527c3df89198",
"deprecated": false
},
{
"digest": {
"line_hashes": [
"173350279598946428204515997204820955640",
"228535876104487515515533898874379975018",
"168929917741534571853138639926843576982",
"46973185730240101112920146722008917988",
"325285107989370521999462462908674704990",
"140546732222812585206262759408169471560",
"80593505410595621463003374792045219151",
"205666408308421438887767511853543743187"
],
"threshold": 0.9
},
"id": "CVE-2024-26970-e367befa",
"target": {
"file": "drivers/clk/qcom/gcc-ipq6018.c"
},
"signature_type": "Line",
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@421b135aceace99789c982f6a77ce9476564fb52",
"deprecated": false
},
{
"digest": {
"line_hashes": [
"173350279598946428204515997204820955640",
"228535876104487515515533898874379975018",
"168929917741534571853138639926843576982",
"46973185730240101112920146722008917988",
"325285107989370521999462462908674704990",
"140546732222812585206262759408169471560",
"80593505410595621463003374792045219151",
"205666408308421438887767511853543743187"
],
"threshold": 0.9
},
"id": "CVE-2024-26970-ec15c7f2",
"target": {
"file": "drivers/clk/qcom/gcc-ipq6018.c"
},
"signature_type": "Line",
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@ae60e3342296f766f88911d39199f77b05f657a6",
"deprecated": false
}
]