CVE-2024-58069

high

Description

In the Linux kernel, the following vulnerability has been resolved: rtc: pcf85063: fix potential OOB write in PCF85063 NVMEM read The nvmem interface supports variable buffer sizes, while the regmap interface operates with fixed-size storage. If an nvmem client uses a buffer size less than 4 bytes, regmap_read will write out of bounds as it expects the buffer to point at an unsigned int. Fix this by using an intermediary unsigned int to hold the value.

References

https://git.kernel.org/stable/c/e5e06455760f2995b16a176033909347929d1128

https://git.kernel.org/stable/c/c72b7a474d3f445bf0c5bcf8ffed332c78eb28a1

https://git.kernel.org/stable/c/9adefa7b9559d0f21034a5d5ec1b55840c9348b9

https://git.kernel.org/stable/c/517aedb365f2c94e2d7e0b908ac7127df76203a1

https://git.kernel.org/stable/c/3ab8c5ed4f84fa20cd16794fe8dc31f633fbc70c

Details

Source: Mitre, NVD

Published: 2025-03-06

Updated: 2025-03-06

Risk Information

CVSS v2

Base Score: 7.2

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

Severity: High

CVSS v3

Base Score: 7.8

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Severity: High