CVE-2024-26967: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: clk: qcom: camcc-sc8280xp: fix terminating of frequency table arrays The frequency table arrays are supposed to be terminated with an empty element. Add such entry to the end of the arrays where it is missing in order to avoid possible out-of-bound access when the table is traversed by functions like qcom_find_freq() or qcom_find_freq_floor(). Only compile tested.
AI Analysis
Technical Summary
CVE-2024-26967 is a vulnerability identified in the Linux kernel specifically related to the Qualcomm clock driver component (clk: qcom: camcc-sc8280xp). The issue arises from improperly terminated frequency table arrays used within this driver. Frequency tables are expected to end with an empty element to signal the end of the array. However, in affected versions, this termination was missing, which can lead to out-of-bound memory access when functions such as qcom_find_freq() or qcom_find_freq_floor() traverse these arrays. Out-of-bound access can cause undefined behavior including potential memory corruption or kernel crashes. The vulnerability was identified during compile-time testing and has been fixed by adding the missing terminating entry to the frequency tables. The affected versions are specific commits of the Linux kernel source code, indicating this is a low-level kernel vulnerability in a hardware-specific driver. There are no known exploits in the wild at this time, and no CVSS score has been assigned yet. The vulnerability does not appear to require user interaction or authentication to be triggered, but it is limited to systems running the affected Qualcomm clock driver on Linux kernels containing the flawed code.
Potential Impact
For European organizations, the impact of CVE-2024-26967 depends largely on the deployment of Linux systems running on Qualcomm-based hardware that utilize the camcc-sc8280xp clock driver. This vulnerability could lead to kernel instability or crashes, potentially causing denial of service on affected devices. In environments where such devices are critical infrastructure components or embedded systems, this could disrupt operations. However, the scope is limited to specific hardware platforms, reducing the overall risk to general-purpose Linux servers or desktops. Confidentiality and integrity impacts are less likely unless the out-of-bound access can be leveraged for privilege escalation or arbitrary code execution, which is not indicated by the current information. The absence of known exploits and the requirement for a specific hardware driver further limit immediate risk. Nonetheless, organizations using Qualcomm-based embedded Linux devices, such as IoT gateways, telecom equipment, or specialized industrial systems, should consider this vulnerability seriously to avoid potential service interruptions.
Mitigation Recommendations
Organizations should promptly identify Linux systems running on Qualcomm hardware with the camcc-sc8280xp clock driver. Applying the latest Linux kernel patches that include the fix for CVE-2024-26967 is the primary mitigation step. Since the vulnerability was discovered during compile-time testing, ensuring that kernel versions are updated to those containing the terminating frequency table entry is critical. For embedded or custom Linux distributions, rebuild kernels with the patched source code. Additionally, implement monitoring for kernel crashes or unusual system behavior that could indicate exploitation attempts. Where possible, isolate affected devices within network segments to limit potential impact. Vendors and integrators should verify their hardware firmware and kernel versions and provide updates to customers. Finally, maintain an inventory of Qualcomm-based Linux devices to facilitate rapid response to similar vulnerabilities in the future.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Finland
CVE-2024-26967: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: clk: qcom: camcc-sc8280xp: fix terminating of frequency table arrays The frequency table arrays are supposed to be terminated with an empty element. Add such entry to the end of the arrays where it is missing in order to avoid possible out-of-bound access when the table is traversed by functions like qcom_find_freq() or qcom_find_freq_floor(). Only compile tested.
AI-Powered Analysis
Technical Analysis
CVE-2024-26967 is a vulnerability identified in the Linux kernel specifically related to the Qualcomm clock driver component (clk: qcom: camcc-sc8280xp). The issue arises from improperly terminated frequency table arrays used within this driver. Frequency tables are expected to end with an empty element to signal the end of the array. However, in affected versions, this termination was missing, which can lead to out-of-bound memory access when functions such as qcom_find_freq() or qcom_find_freq_floor() traverse these arrays. Out-of-bound access can cause undefined behavior including potential memory corruption or kernel crashes. The vulnerability was identified during compile-time testing and has been fixed by adding the missing terminating entry to the frequency tables. The affected versions are specific commits of the Linux kernel source code, indicating this is a low-level kernel vulnerability in a hardware-specific driver. There are no known exploits in the wild at this time, and no CVSS score has been assigned yet. The vulnerability does not appear to require user interaction or authentication to be triggered, but it is limited to systems running the affected Qualcomm clock driver on Linux kernels containing the flawed code.
Potential Impact
For European organizations, the impact of CVE-2024-26967 depends largely on the deployment of Linux systems running on Qualcomm-based hardware that utilize the camcc-sc8280xp clock driver. This vulnerability could lead to kernel instability or crashes, potentially causing denial of service on affected devices. In environments where such devices are critical infrastructure components or embedded systems, this could disrupt operations. However, the scope is limited to specific hardware platforms, reducing the overall risk to general-purpose Linux servers or desktops. Confidentiality and integrity impacts are less likely unless the out-of-bound access can be leveraged for privilege escalation or arbitrary code execution, which is not indicated by the current information. The absence of known exploits and the requirement for a specific hardware driver further limit immediate risk. Nonetheless, organizations using Qualcomm-based embedded Linux devices, such as IoT gateways, telecom equipment, or specialized industrial systems, should consider this vulnerability seriously to avoid potential service interruptions.
Mitigation Recommendations
Organizations should promptly identify Linux systems running on Qualcomm hardware with the camcc-sc8280xp clock driver. Applying the latest Linux kernel patches that include the fix for CVE-2024-26967 is the primary mitigation step. Since the vulnerability was discovered during compile-time testing, ensuring that kernel versions are updated to those containing the terminating frequency table entry is critical. For embedded or custom Linux distributions, rebuild kernels with the patched source code. Additionally, implement monitoring for kernel crashes or unusual system behavior that could indicate exploitation attempts. Where possible, isolate affected devices within network segments to limit potential impact. Vendors and integrators should verify their hardware firmware and kernel versions and provide updates to customers. Finally, maintain an inventory of Qualcomm-based Linux devices to facilitate rapid response to similar vulnerabilities in the future.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-02-19T14:20:24.202Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9829c4522896dcbe2f6d
Added to database: 5/21/2025, 9:08:57 AM
Last enriched: 6/29/2025, 1:41:34 PM
Last updated: 8/8/2025, 2:33:02 PM
Views: 12
Related Threats
CVE-2025-8840: Improper Authorization in jshERP
MediumCVE-2025-8853: CWE-290 Authentication Bypass by Spoofing in 2100 Technology Official Document Management System
CriticalCVE-2025-8838: Improper Authentication in WinterChenS my-site
MediumCVE-2025-8837: Use After Free in JasPer
MediumCVE-2025-8661: Vulnerability in Broadcom Symantec PGP Encryption
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.