CVE-2024-58069

In the Linux kernel, the following vulnerability has been resolved: rtc: pcf85063: fix potential OOB write in PCF85063 NVMEM read The nvmem interface supports variable buffer sizes, while the regmap interface operates with fixed-size storage. If an nvmem client uses a buffer size less than 4 bytes, regmap_read will write out of bounds as it expects the buffer to point at an unsigned int. Fix this by using an intermediary unsigned int to hold the value.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

25 Mar 2025, 14:48

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/c72b7a474d3f445bf0c5bcf8ffed332c78eb28a1 - () https://git.kernel.org/stable/c/c72b7a474d3f445bf0c5bcf8ffed332c78eb28a1 - Patch
References () https://git.kernel.org/stable/c/3ab8c5ed4f84fa20cd16794fe8dc31f633fbc70c - () https://git.kernel.org/stable/c/3ab8c5ed4f84fa20cd16794fe8dc31f633fbc70c - Patch
References () https://git.kernel.org/stable/c/e5e06455760f2995b16a176033909347929d1128 - () https://git.kernel.org/stable/c/e5e06455760f2995b16a176033909347929d1128 - Patch
References () https://git.kernel.org/stable/c/21cd59fcb9952eb7505da2bdfc1eb9c619df3ff4 - () https://git.kernel.org/stable/c/21cd59fcb9952eb7505da2bdfc1eb9c619df3ff4 - Patch
References () https://git.kernel.org/stable/c/9adefa7b9559d0f21034a5d5ec1b55840c9348b9 - () https://git.kernel.org/stable/c/9adefa7b9559d0f21034a5d5ec1b55840c9348b9 - Patch
References () https://git.kernel.org/stable/c/e5536677da803ed54a29a446515c28dce7d3d574 - () https://git.kernel.org/stable/c/e5536677da803ed54a29a446515c28dce7d3d574 - Patch
References () https://git.kernel.org/stable/c/517aedb365f2c94e2d7e0b908ac7127df76203a1 - () https://git.kernel.org/stable/c/517aedb365f2c94e2d7e0b908ac7127df76203a1 - Patch
References () https://git.kernel.org/stable/c/6f2a8ca9a0a38589f52a7f0fb9425b9ba987ae7c - () https://git.kernel.org/stable/c/6f2a8ca9a0a38589f52a7f0fb9425b9ba987ae7c - Patch
CWE CWE-787
First Time Linux linux Kernel
Linux
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8

13 Mar 2025, 13:15

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/e5536677da803ed54a29a446515c28dce7d3d574 -
  • () https://git.kernel.org/stable/c/21cd59fcb9952eb7505da2bdfc1eb9c619df3ff4 -
  • () https://git.kernel.org/stable/c/6f2a8ca9a0a38589f52a7f0fb9425b9ba987ae7c -

06 Mar 2025, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-03-06 16:15

Updated : 2025-03-25 14:48


NVD link : CVE-2024-58069

Mitre link : CVE-2024-58069


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-787

Out-of-bounds Write