Executive Summary

Informations
Name CVE-2024-53192 First vendor Publication 2024-12-27
Vendor Cve Last vendor Modification 2025-03-24

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

In the Linux kernel, the following vulnerability has been resolved:

clk: clk-loongson2: Fix potential buffer overflow in flexible-array member access

Flexible-array member `hws` in `struct clk_hw_onecell_data` is annotated with the `counted_by()` attribute. This means that when memory is allocated for this array, the _counter_, which in this case is member `num` in the flexible structure, should be set to the maximum number of elements the flexible array can contain, or fewer.

In this case, the total number of elements for the flexible array is determined by variable `clks_num` when allocating heap space via `devm_kzalloc()`, as shown below:

289 struct loongson2_clk_provider *clp;
... 296 for (p = data; p->name; p++) 297 clks_num++; 298 299 clp = devm_kzalloc(dev, struct_size(clp, clk_data.hws, clks_num), 300 GFP_KERNEL);

So, `clp->clk_data.num` should be set to `clks_num` or less, and not exceed `clks_num`, as is currently the case. Otherwise, if data is written into `clp->clk_data.hws[clks_num]`, the instrumentation provided by the compiler won't detect the overflow, leading to a memory corruption bug at runtime.

Fix this issue by setting `clp->clk_data.num` to `clks_num`.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53192

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 8
Os 3700

Sources (Detail)

https://git.kernel.org/stable/c/02fb4f0084331ef72c28d0c70fcb15d1bea369ec
https://git.kernel.org/stable/c/1bf8877150128c3abd9d233886a05f6966fbf0c7
https://git.kernel.org/stable/c/b96fc194984d0c82de1ca2b4166b35b1298b216c
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
Date Informations
2025-06-26 02:37:55
  • Multiple Updates
2025-06-25 12:36:05
  • Multiple Updates
2025-06-24 02:42:34
  • Multiple Updates
2025-05-27 02:47:38
  • Multiple Updates
2025-03-28 17:21:12
  • Multiple Updates
2025-03-28 13:47:17
  • Multiple Updates
2025-03-28 03:21:36
  • Multiple Updates
2025-03-25 00:22:18
  • Multiple Updates
2025-02-18 21:20:36
  • Multiple Updates
2024-12-27 17:20:29
  • First insertion