CVE-2024-58069

Source
https://cve.org/CVERecord?id=CVE-2024-58069
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-58069.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-58069
Downstream
Related
Published
2025-03-06T15:54:09.480Z
Modified
2026-03-20T12:41:06.691218Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
rtc: pcf85063: fix potential OOB write in PCF85063 NVMEM read
Details

In the Linux kernel, the following vulnerability has been resolved:

rtc: pcf85063: fix potential OOB write in PCF85063 NVMEM read

The nvmem interface supports variable buffer sizes, while the regmap interface operates with fixed-size storage. If an nvmem client uses a buffer size less than 4 bytes, regmap_read will write out of bounds as it expects the buffer to point at an unsigned int.

Fix this by using an intermediary unsigned int to hold the value.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/58xxx/CVE-2024-58069.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
fadfd092ee9138825d8c2a4f95719d2e2e3202b9
Fixed
21cd59fcb9952eb7505da2bdfc1eb9c619df3ff4
Fixed
6f2a8ca9a0a38589f52a7f0fb9425b9ba987ae7c
Fixed
e5536677da803ed54a29a446515c28dce7d3d574
Fixed
c72b7a474d3f445bf0c5bcf8ffed332c78eb28a1
Fixed
9adefa7b9559d0f21034a5d5ec1b55840c9348b9
Fixed
e5e06455760f2995b16a176033909347929d1128
Fixed
517aedb365f2c94e2d7e0b908ac7127df76203a1
Fixed
3ab8c5ed4f84fa20cd16794fe8dc31f633fbc70c

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-58069.json"