First published: Wed May 01 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: clk: qcom: gcc-ipq6018: fix terminating of frequency table arrays The frequency table arrays are supposed to be terminated with an empty element. Add such entry to the end of the arrays where it is missing in order to avoid possible out-of-bound access when the table is traversed by functions like qcom_find_freq() or qcom_find_freq_floor(). Only compile tested.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
debian/linux | 5.10.218-1 5.10.221-1 6.1.94-1 6.1.99-1 6.9.10-1 6.9.12-1 | |
ubuntu/linux | <5.15.0-116.126 | 5.15.0-116.126 |
ubuntu/linux | <6.8.0-35.35 | 6.8.0-35.35 |
ubuntu/linux | <6.9~<6.8.3 | 6.9~ 6.8.3 |
ubuntu/linux-aws | <5.15.0-1065.71 | 5.15.0-1065.71 |
ubuntu/linux-aws | <6.8.0-1009.9 | 6.8.0-1009.9 |
ubuntu/linux-aws | <6.9~<6.8.3 | 6.9~ 6.8.3 |
ubuntu/linux-aws-5.15 | <5.15.0-1065.71~20.04.1 | 5.15.0-1065.71~20.04.1 |
ubuntu/linux-aws-5.15 | <6.9~<6.8.3 | 6.9~ 6.8.3 |
ubuntu/linux-aws-5.4 | <6.9~<6.8.3 | 6.9~ 6.8.3 |
ubuntu/linux-aws-6.5 | <6.9~<6.8.3 | 6.9~ 6.8.3 |
ubuntu/linux-aws-fips | <6.9~<6.8.3 | 6.9~ 6.8.3 |
ubuntu/linux-aws-hwe | <6.9~<6.8.3 | 6.9~ 6.8.3 |
ubuntu/linux-azure | <5.15.0-1068.77 | 5.15.0-1068.77 |
ubuntu/linux-azure | <6.8.0-1008.8 | 6.8.0-1008.8 |
ubuntu/linux-azure | <6.9~<6.8.3 | 6.9~ 6.8.3 |
ubuntu/linux-azure-4.15 | <6.9~<6.8.3 | 6.9~ 6.8.3 |
ubuntu/linux-azure-5.15 | <5.15.0-1068.77~20.04.1 | 5.15.0-1068.77~20.04.1 |
ubuntu/linux-azure-5.15 | <6.9~<6.8.3 | 6.9~ 6.8.3 |
ubuntu/linux-azure-5.4 | <6.9~<6.8.3 | 6.9~ 6.8.3 |
ubuntu/linux-azure-6.5 | <6.9~<6.8.3 | 6.9~ 6.8.3 |
ubuntu/linux-azure-fde | <5.15.0-1068.77.1 | 5.15.0-1068.77.1 |
ubuntu/linux-azure-fde | <6.9~<6.8.3 | 6.9~ 6.8.3 |
ubuntu/linux-azure-fde-5.15 | <5.15.0-1068.77~20.04.1.1 | 5.15.0-1068.77~20.04.1.1 |
ubuntu/linux-azure-fde-5.15 | <6.9~<6.8.3 | 6.9~ 6.8.3 |
ubuntu/linux-azure-fips | <6.9~<6.8.3 | 6.9~ 6.8.3 |
ubuntu/linux-bluefield | <6.9~<6.8.3 | 6.9~ 6.8.3 |
ubuntu/linux-fips | <6.9~<6.8.3 | 6.9~ 6.8.3 |
ubuntu/linux-gcp | <5.15.0-1064.72 | 5.15.0-1064.72 |
ubuntu/linux-gcp | <6.8.0-1008.9 | 6.8.0-1008.9 |
ubuntu/linux-gcp | <6.9~<6.8.3 | 6.9~ 6.8.3 |
ubuntu/linux-gcp-4.15 | <6.9~<6.8.3 | 6.9~ 6.8.3 |
ubuntu/linux-gcp-5.15 | <5.15.0-1065.73~20.04.1 | 5.15.0-1065.73~20.04.1 |
ubuntu/linux-gcp-5.15 | <6.9~<6.8.3 | 6.9~ 6.8.3 |
ubuntu/linux-gcp-5.4 | <6.9~<6.8.3 | 6.9~ 6.8.3 |
ubuntu/linux-gcp-6.5 | <6.9~<6.8.3 | 6.9~ 6.8.3 |
ubuntu/linux-gcp-fips | <6.9~<6.8.3 | 6.9~ 6.8.3 |
ubuntu/linux-gke | <5.15.0-1062.68 | 5.15.0-1062.68 |
ubuntu/linux-gke | <6.8.0-1004.7 | 6.8.0-1004.7 |
ubuntu/linux-gke | <6.9~<6.8.3 | 6.9~ 6.8.3 |
ubuntu/linux-gkeop | <5.15.0-1048.55 | 5.15.0-1048.55 |
ubuntu/linux-gkeop | <6.9~<6.8.3 | 6.9~ 6.8.3 |
ubuntu/linux-gkeop-5.15 | <5.15.0-1048.55~20.04.1 | 5.15.0-1048.55~20.04.1 |
ubuntu/linux-gkeop-5.15 | <6.9~<6.8.3 | 6.9~ 6.8.3 |
ubuntu/linux-hwe | <6.9~<6.8.3 | 6.9~ 6.8.3 |
ubuntu/linux-hwe-5.15 | <5.15.0-116.126~20.04.1 | 5.15.0-116.126~20.04.1 |
ubuntu/linux-hwe-5.15 | <6.9~<6.8.3 | 6.9~ 6.8.3 |
ubuntu/linux-hwe-5.4 | <6.9~<6.8.3 | 6.9~ 6.8.3 |
ubuntu/linux-hwe-6.5 | <6.9~<6.8.3 | 6.9~ 6.8.3 |
ubuntu/linux-ibm | <5.15.0-1058.61 | 5.15.0-1058.61 |
ubuntu/linux-ibm | <6.8.0-1006.6 | 6.8.0-1006.6 |
ubuntu/linux-ibm | <6.9~<6.8.3 | 6.9~ 6.8.3 |
ubuntu/linux-ibm-5.15 | <5.15.0-1058.61~20.04.1 | 5.15.0-1058.61~20.04.1 |
ubuntu/linux-ibm-5.15 | <6.9~<6.8.3 | 6.9~ 6.8.3 |
ubuntu/linux-ibm-5.4 | <6.9~<6.8.3 | 6.9~ 6.8.3 |
ubuntu/linux-intel | <6.9~<6.8.3 | 6.9~ 6.8.3 |
ubuntu/linux-intel-iotg | <5.15.0-1060.66 | 5.15.0-1060.66 |
ubuntu/linux-intel-iotg | <6.9~<6.8.3 | 6.9~ 6.8.3 |
ubuntu/linux-intel-iotg-5.15 | <5.15.0-1060.66~20.04.1 | 5.15.0-1060.66~20.04.1 |
ubuntu/linux-intel-iotg-5.15 | <6.9~<6.8.3 | 6.9~ 6.8.3 |
ubuntu/linux-iot | <6.9~<6.8.3 | 6.9~ 6.8.3 |
ubuntu/linux-kvm | <5.15.0-1062.67 | 5.15.0-1062.67 |
ubuntu/linux-kvm | <6.9~<6.8.3 | 6.9~ 6.8.3 |
ubuntu/linux-laptop | <6.9~<6.8.3 | 6.9~ 6.8.3 |
ubuntu/linux-lowlatency | <5.15.0-116.126 | 5.15.0-116.126 |
ubuntu/linux-lowlatency | <6.8.0-35.35.1 | 6.8.0-35.35.1 |
ubuntu/linux-lowlatency | <6.9~<6.8.3 | 6.9~ 6.8.3 |
ubuntu/linux-lowlatency-hwe-5.15 | <5.15.0-116.126~20.04.1 | 5.15.0-116.126~20.04.1 |
ubuntu/linux-lowlatency-hwe-5.15 | <6.9~<6.8.3 | 6.9~ 6.8.3 |
ubuntu/linux-lowlatency-hwe-6.5 | <6.9~<6.8.3 | 6.9~ 6.8.3 |
ubuntu/linux-lts-xenial | <6.9~<6.8.3 | 6.9~ 6.8.3 |
ubuntu/linux-nvidia | <5.15.0-1060.61 | 5.15.0-1060.61 |
ubuntu/linux-nvidia | <6.9~<6.8.3 | 6.9~ 6.8.3 |
ubuntu/linux-nvidia-6.5 | <6.9~<6.8.3 | 6.9~ 6.8.3 |
ubuntu/linux-nvidia-6.8 | <6.9~<6.8.3 | 6.9~ 6.8.3 |
ubuntu/linux-nvidia-lowlatency | <6.9~<6.8.3 | 6.9~ 6.8.3 |
ubuntu/linux-oem-6.5 | <6.9~<6.8.3 | 6.9~ 6.8.3 |
ubuntu/linux-oem-6.8 | <6.8.0-1006.6 | 6.8.0-1006.6 |
ubuntu/linux-oem-6.8 | <6.9~<6.8.3 | 6.9~ 6.8.3 |
ubuntu/linux-oracle | <5.15.0-1063.69 | 5.15.0-1063.69 |
ubuntu/linux-oracle | <6.8.0-1006.6 | 6.8.0-1006.6 |
ubuntu/linux-oracle | <6.9~<6.8.3 | 6.9~ 6.8.3 |
ubuntu/linux-oracle-5.15 | <5.15.0-1063.69~20.04.1 | 5.15.0-1063.69~20.04.1 |
ubuntu/linux-oracle-5.15 | <6.9~<6.8.3 | 6.9~ 6.8.3 |
ubuntu/linux-oracle-5.4 | <6.9~<6.8.3 | 6.9~ 6.8.3 |
ubuntu/linux-oracle-6.5 | <6.9~<6.8.3 | 6.9~ 6.8.3 |
ubuntu/linux-raspi | <5.15.0-1058.61 | 5.15.0-1058.61 |
ubuntu/linux-raspi | <6.8.0-1005.5 | 6.8.0-1005.5 |
ubuntu/linux-raspi | <6.9~<6.8.3 | 6.9~ 6.8.3 |
ubuntu/linux-raspi-5.4 | <6.9~<6.8.3 | 6.9~ 6.8.3 |
ubuntu/linux-riscv | <6.8.0-35.35.1 | 6.8.0-35.35.1 |
ubuntu/linux-riscv | <6.9~<6.8.3 | 6.9~ 6.8.3 |
ubuntu/linux-riscv-5.15 | <5.15.0-1061.65~20.04.1 | 5.15.0-1061.65~20.04.1 |
ubuntu/linux-riscv-5.15 | <6.9~<6.8.3 | 6.9~ 6.8.3 |
ubuntu/linux-riscv-6.5 | <6.9~<6.8.3 | 6.9~ 6.8.3 |
ubuntu/linux-starfive | <6.9~<6.8.3 | 6.9~ 6.8.3 |
ubuntu/linux-starfive-6.5 | <6.9~<6.8.3 | 6.9~ 6.8.3 |
ubuntu/linux-xilinx-zynqmp | <6.9~<6.8.3 | 6.9~ 6.8.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)