CVE-2024-26966: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: clk: qcom: mmcc-apq8084: fix terminating of frequency table arrays The frequency table arrays are supposed to be terminated with an empty element. Add such entry to the end of the arrays where it is missing in order to avoid possible out-of-bound access when the table is traversed by functions like qcom_find_freq() or qcom_find_freq_floor(). Only compile tested.
AI Analysis
Technical Summary
CVE-2024-26966 is a vulnerability identified in the Linux kernel specifically related to the Qualcomm clock driver for the mmcc-apq8084 platform. The issue arises from improperly terminated frequency table arrays used by the driver. These arrays are expected to end with an empty element to mark their termination. However, in affected versions, this termination was missing, which can lead to out-of-bounds memory access when functions such as qcom_find_freq() or qcom_find_freq_floor() traverse these arrays. Out-of-bounds access can cause undefined behavior including potential memory corruption, crashes (denial of service), or possibly code execution depending on the context and memory layout. The fix involves adding the missing empty termination element to the frequency table arrays to prevent traversal beyond the valid array bounds. This vulnerability affects a specific Qualcomm platform driver within the Linux kernel and is primarily a memory safety issue. There are no known exploits in the wild at the time of publication, and the vulnerability was only compile tested, indicating that runtime impact and exploitation complexity may be limited or not fully assessed yet. No CVSS score has been assigned, and no direct evidence of privilege escalation or remote exploitation is provided in the available information.
Potential Impact
For European organizations, the impact of CVE-2024-26966 depends largely on the deployment of Linux systems running the affected Qualcomm mmcc-apq8084 platform kernel driver. This platform is typically found in embedded or mobile devices using Qualcomm chipsets rather than general-purpose servers or desktops. Organizations using embedded Linux devices in critical infrastructure, industrial control systems, or telecommunications equipment that incorporate this chipset could face risks of device instability or denial of service if exploited. While the vulnerability could theoretically lead to memory corruption, the lack of known exploits and the nature of the bug suggest the primary impact is likely limited to potential device crashes or degraded availability rather than widespread compromise or data breaches. Nonetheless, any disruption in critical embedded systems could have cascading effects on operational continuity, especially in sectors like manufacturing, energy, or transportation where embedded Linux devices are common. The vulnerability does not appear to require user interaction or authentication, so any exposed vulnerable device could be at risk if attackers gain network access. However, the specialized nature of the affected platform limits the scope of impact compared to more generic Linux kernel vulnerabilities.
Mitigation Recommendations
1. Apply the official Linux kernel patch that adds the missing termination element to the frequency table arrays in the Qualcomm mmcc-apq8084 clock driver as soon as it becomes available from trusted sources or Linux distribution maintainers. 2. Identify and inventory all devices running Linux kernels with Qualcomm mmcc-apq8084 drivers within the organization, focusing on embedded and mobile devices. 3. For devices that cannot be immediately patched, implement network segmentation and access controls to limit exposure of vulnerable devices to untrusted networks or users. 4. Monitor device logs and system behavior for signs of crashes or abnormal operation that could indicate exploitation attempts. 5. Engage with device vendors or OEMs to obtain firmware or kernel updates that incorporate the fix if devices are managed by third parties. 6. Incorporate this vulnerability into vulnerability management and patching workflows to ensure timely remediation and verification. 7. Consider deploying runtime protection or memory safety tools where feasible to detect out-of-bounds memory accesses in critical embedded Linux environments.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Finland
CVE-2024-26966: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: clk: qcom: mmcc-apq8084: fix terminating of frequency table arrays The frequency table arrays are supposed to be terminated with an empty element. Add such entry to the end of the arrays where it is missing in order to avoid possible out-of-bound access when the table is traversed by functions like qcom_find_freq() or qcom_find_freq_floor(). Only compile tested.
AI-Powered Analysis
Technical Analysis
CVE-2024-26966 is a vulnerability identified in the Linux kernel specifically related to the Qualcomm clock driver for the mmcc-apq8084 platform. The issue arises from improperly terminated frequency table arrays used by the driver. These arrays are expected to end with an empty element to mark their termination. However, in affected versions, this termination was missing, which can lead to out-of-bounds memory access when functions such as qcom_find_freq() or qcom_find_freq_floor() traverse these arrays. Out-of-bounds access can cause undefined behavior including potential memory corruption, crashes (denial of service), or possibly code execution depending on the context and memory layout. The fix involves adding the missing empty termination element to the frequency table arrays to prevent traversal beyond the valid array bounds. This vulnerability affects a specific Qualcomm platform driver within the Linux kernel and is primarily a memory safety issue. There are no known exploits in the wild at the time of publication, and the vulnerability was only compile tested, indicating that runtime impact and exploitation complexity may be limited or not fully assessed yet. No CVSS score has been assigned, and no direct evidence of privilege escalation or remote exploitation is provided in the available information.
Potential Impact
For European organizations, the impact of CVE-2024-26966 depends largely on the deployment of Linux systems running the affected Qualcomm mmcc-apq8084 platform kernel driver. This platform is typically found in embedded or mobile devices using Qualcomm chipsets rather than general-purpose servers or desktops. Organizations using embedded Linux devices in critical infrastructure, industrial control systems, or telecommunications equipment that incorporate this chipset could face risks of device instability or denial of service if exploited. While the vulnerability could theoretically lead to memory corruption, the lack of known exploits and the nature of the bug suggest the primary impact is likely limited to potential device crashes or degraded availability rather than widespread compromise or data breaches. Nonetheless, any disruption in critical embedded systems could have cascading effects on operational continuity, especially in sectors like manufacturing, energy, or transportation where embedded Linux devices are common. The vulnerability does not appear to require user interaction or authentication, so any exposed vulnerable device could be at risk if attackers gain network access. However, the specialized nature of the affected platform limits the scope of impact compared to more generic Linux kernel vulnerabilities.
Mitigation Recommendations
1. Apply the official Linux kernel patch that adds the missing termination element to the frequency table arrays in the Qualcomm mmcc-apq8084 clock driver as soon as it becomes available from trusted sources or Linux distribution maintainers. 2. Identify and inventory all devices running Linux kernels with Qualcomm mmcc-apq8084 drivers within the organization, focusing on embedded and mobile devices. 3. For devices that cannot be immediately patched, implement network segmentation and access controls to limit exposure of vulnerable devices to untrusted networks or users. 4. Monitor device logs and system behavior for signs of crashes or abnormal operation that could indicate exploitation attempts. 5. Engage with device vendors or OEMs to obtain firmware or kernel updates that incorporate the fix if devices are managed by third parties. 6. Incorporate this vulnerability into vulnerability management and patching workflows to ensure timely remediation and verification. 7. Consider deploying runtime protection or memory safety tools where feasible to detect out-of-bounds memory accesses in critical embedded Linux environments.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-02-19T14:20:24.201Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9829c4522896dcbe2f67
Added to database: 5/21/2025, 9:08:57 AM
Last enriched: 6/29/2025, 1:41:26 PM
Last updated: 12/3/2025, 1:42:52 AM
Views: 28
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-55181: Excessive Iteration (CWE-834) in Facebook proxygen
MediumCVE-2025-64778: CWE-798 Use of Hard-coded Credentials in Mirion Medical EC2 Software NMIS BioDose
HighCVE-2025-64642: CWE-732 Incorrect Permission Assignment for Critical Resource in Mirion Medical EC2 Software NMIS BioDose
HighCVE-2025-64298: CWE-732 Incorrect Permission Assignment for Critical Resource in Mirion Medical EC2 Software NMIS BioDose
HighCVE-2025-62575: CWE-732 Incorrect Permission Assignment for Critical Resource in Mirion Medical EC2 Software NMIS BioDose
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.