CWE
119 120
Advisory Published
Updated

CVE-2024-53192: clk: clk-loongson2: Fix potential buffer overflow in flexible-array member access

First published: Fri Dec 27 2024(Updated: )

In the Linux kernel, the following vulnerability has been resolved: clk: clk-loongson2: Fix potential buffer overflow in flexible-array member access Flexible-array member `hws` in `struct clk_hw_onecell_data` is annotated with the `counted_by()` attribute. This means that when memory is allocated for this array, the _counter_, which in this case is member `num` in the flexible structure, should be set to the maximum number of elements the flexible array can contain, or fewer. In this case, the total number of elements for the flexible array is determined by variable `clks_num` when allocating heap space via `devm_kzalloc()`, as shown below: 289 struct loongson2_clk_provider *clp; ... 296 for (p = data; p->name; p++) 297 clks_num++; 298 299 clp = devm_kzalloc(dev, struct_size(clp, clk_data.hws, clks_num), 300 GFP_KERNEL); So, `clp->clk_data.num` should be set to `clks_num` or less, and not exceed `clks_num`, as is currently the case. Otherwise, if data is written into `clp->clk_data.hws[clks_num]`, the instrumentation provided by the compiler won't detect the overflow, leading to a memory corruption bug at runtime. Fix this issue by setting `clp->clk_data.num` to `clks_num`.

Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

Affected SoftwareAffected VersionHow to fix
Red Hat Kernel-devel
Linux Kernel>=6.10<6.11.11
Linux Kernel>=6.12<6.12.2
debian/linux
5.10.223-1
5.10.234-1
6.1.129-1
6.1.135-1
6.12.25-1

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2024-53192?

    The severity of CVE-2024-53192 has not been explicitly rated but it involves a potential buffer overflow that could lead to security vulnerabilities.

  • How do I fix CVE-2024-53192?

    To fix CVE-2024-53192, update your Linux kernel to the latest patched version provided by the maintainers.

  • What software is affected by CVE-2024-53192?

    CVE-2024-53192 affects the Linux kernel, particularly versions that include the clk-loongson2 module.

  • Can CVE-2024-53192 lead to a denial of service?

    Yes, CVE-2024-53192 can potentially lead to a denial of service due to buffer overflow issues.

  • Who reported CVE-2024-53192?

    CVE-2024-53192 was reported as part of the ongoing vulnerability assessment and patch management process within the Linux community.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203