First published: Thu Mar 06 2025(Updated: )
In the Linux kernel, the following vulnerability has been resolved: rtc: pcf85063: fix potential OOB write in PCF85063 NVMEM read The nvmem interface supports variable buffer sizes, while the regmap interface operates with fixed-size storage. If an nvmem client uses a buffer size less than 4 bytes, regmap_read will write out of bounds as it expects the buffer to point at an unsigned int. Fix this by using an intermediary unsigned int to hold the value.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | ||
Linux Kernel | >=5.2<5.4.291 | |
Linux Kernel | >=5.5<5.10.235 | |
Linux Kernel | >=5.11<5.15.179 | |
Linux Kernel | >=5.16<6.1.129 | |
Linux Kernel | >=6.2<6.6.76 | |
Linux Kernel | >=6.7<6.12.13 | |
Linux Kernel | >=6.13<6.13.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-58069 has a low severity level as it pertains to an out-of-bounds write vulnerability in the Linux kernel's PCF85063 NVMEM read.
To fix CVE-2024-58069, update your Linux kernel to a patched version where the vulnerability has been resolved.
CVE-2024-58069 affects the Linux kernel, specifically the components dealing with the PCF85063 NVMEM interface.
The potential impacts include data corruption or system instability due to the out-of-bounds write issue.
As of now, there are no public reports of CVE-2024-58069 being exploited in the wild.