Skip to main content

CVE-2024-26967: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2024-26967cvecve-2024-26967
Published: Wed May 01 2024 (05/01/2024, 05:19:41 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: clk: qcom: camcc-sc8280xp: fix terminating of frequency table arrays The frequency table arrays are supposed to be terminated with an empty element. Add such entry to the end of the arrays where it is missing in order to avoid possible out-of-bound access when the table is traversed by functions like qcom_find_freq() or qcom_find_freq_floor(). Only compile tested.

AI-Powered Analysis

AILast updated: 06/29/2025, 13:41:34 UTC

Technical Analysis

CVE-2024-26967 is a vulnerability identified in the Linux kernel specifically related to the Qualcomm clock driver component (clk: qcom: camcc-sc8280xp). The issue arises from improperly terminated frequency table arrays used within this driver. Frequency tables are expected to end with an empty element to signal the end of the array. However, in affected versions, this termination was missing, which can lead to out-of-bound memory access when functions such as qcom_find_freq() or qcom_find_freq_floor() traverse these arrays. Out-of-bound access can cause undefined behavior including potential memory corruption or kernel crashes. The vulnerability was identified during compile-time testing and has been fixed by adding the missing terminating entry to the frequency tables. The affected versions are specific commits of the Linux kernel source code, indicating this is a low-level kernel vulnerability in a hardware-specific driver. There are no known exploits in the wild at this time, and no CVSS score has been assigned yet. The vulnerability does not appear to require user interaction or authentication to be triggered, but it is limited to systems running the affected Qualcomm clock driver on Linux kernels containing the flawed code.

Potential Impact

For European organizations, the impact of CVE-2024-26967 depends largely on the deployment of Linux systems running on Qualcomm-based hardware that utilize the camcc-sc8280xp clock driver. This vulnerability could lead to kernel instability or crashes, potentially causing denial of service on affected devices. In environments where such devices are critical infrastructure components or embedded systems, this could disrupt operations. However, the scope is limited to specific hardware platforms, reducing the overall risk to general-purpose Linux servers or desktops. Confidentiality and integrity impacts are less likely unless the out-of-bound access can be leveraged for privilege escalation or arbitrary code execution, which is not indicated by the current information. The absence of known exploits and the requirement for a specific hardware driver further limit immediate risk. Nonetheless, organizations using Qualcomm-based embedded Linux devices, such as IoT gateways, telecom equipment, or specialized industrial systems, should consider this vulnerability seriously to avoid potential service interruptions.

Mitigation Recommendations

Organizations should promptly identify Linux systems running on Qualcomm hardware with the camcc-sc8280xp clock driver. Applying the latest Linux kernel patches that include the fix for CVE-2024-26967 is the primary mitigation step. Since the vulnerability was discovered during compile-time testing, ensuring that kernel versions are updated to those containing the terminating frequency table entry is critical. For embedded or custom Linux distributions, rebuild kernels with the patched source code. Additionally, implement monitoring for kernel crashes or unusual system behavior that could indicate exploitation attempts. Where possible, isolate affected devices within network segments to limit potential impact. Vendors and integrators should verify their hardware firmware and kernel versions and provide updates to customers. Finally, maintain an inventory of Qualcomm-based Linux devices to facilitate rapid response to similar vulnerabilities in the future.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-02-19T14:20:24.202Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9829c4522896dcbe2f6d

Added to database: 5/21/2025, 9:08:57 AM

Last enriched: 6/29/2025, 1:41:34 PM

Last updated: 8/8/2025, 2:33:02 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats