Skip to main content

CVE-2024-26968: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2024-26968cvecve-2024-26968
Published: Wed May 01 2024 (05/01/2024, 05:19:45 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: clk: qcom: gcc-ipq9574: fix terminating of frequency table arrays The frequency table arrays are supposed to be terminated with an empty element. Add such entry to the end of the arrays where it is missing in order to avoid possible out-of-bound access when the table is traversed by functions like qcom_find_freq() or qcom_find_freq_floor(). Only compile tested.

AI-Powered Analysis

AILast updated: 06/29/2025, 13:41:47 UTC

Technical Analysis

CVE-2024-26968 is a vulnerability identified in the Linux kernel specifically related to the Qualcomm clock driver for the IPQ9574 chipset (gcc-ipq9574). The issue stems from improperly terminated frequency table arrays used by the driver. Frequency tables are arrays that list supported clock frequencies for hardware components, and they are expected to be terminated by an empty element to signal the end of the array. In this vulnerability, some frequency table arrays were missing this terminating empty element. As a result, functions such as qcom_find_freq() or qcom_find_freq_floor(), which traverse these arrays to find appropriate frequency values, may read beyond the intended bounds of the array. This out-of-bound access can lead to undefined behavior including potential memory corruption, crashes, or other stability issues. The vulnerability was identified during compile-time testing and fixed by adding the missing terminating entries to the frequency tables. There is no evidence of exploitation in the wild at this time, and no CVSS score has been assigned. The vulnerability affects Linux kernel versions containing the faulty Qualcomm clock driver implementation for the IPQ9574 platform. Since this is a kernel-level issue, it could impact any Linux-based system running on hardware using this chipset or similar Qualcomm clock drivers with the same flaw. However, the vulnerability requires the kernel to execute the affected code paths, which typically occurs during hardware frequency scaling operations. No authentication or user interaction is required to trigger the flaw if an attacker can execute code or commands that cause the kernel to traverse these frequency tables. The fix involves ensuring proper termination of frequency tables to prevent out-of-bound reads, thereby improving kernel stability and security.

Potential Impact

For European organizations, the impact of CVE-2024-26968 depends largely on the deployment of Linux systems running on Qualcomm IPQ9574-based hardware or similar platforms using the affected clock driver. This chipset is commonly found in networking devices such as routers, gateways, and embedded systems. If exploited, the vulnerability could lead to kernel crashes or memory corruption, potentially causing denial of service or enabling further kernel-level exploits. This could disrupt critical network infrastructure or embedded devices used in industrial control, telecommunications, or enterprise environments. While no active exploits are known, the vulnerability poses a risk to the integrity and availability of affected systems. Organizations relying on Linux-based network equipment or embedded devices with Qualcomm chipsets should be aware of this risk. The confidentiality impact is limited unless the out-of-bound access can be leveraged for privilege escalation or code execution, which is not currently documented. However, the potential for system instability or denial of service could affect operational continuity, especially in sectors like telecommunications, manufacturing, or public services where such hardware is prevalent.

Mitigation Recommendations

European organizations should take the following specific mitigation steps: 1) Identify Linux systems and embedded devices using Qualcomm IPQ9574 or similar chipsets with the affected clock driver. This includes network routers, gateways, and IoT devices. 2) Apply the latest Linux kernel updates or patches that include the fix for CVE-2024-26968. Since the fix involves kernel code changes, updating to a patched kernel version is essential. 3) For embedded devices or appliances where kernel updates are not straightforward, consult vendors for firmware updates or mitigations. 4) Monitor system logs and kernel messages for any anomalies related to clock frequency scaling or kernel crashes that could indicate attempts to trigger this vulnerability. 5) Implement network segmentation and restrict access to management interfaces of affected devices to reduce the risk of remote exploitation. 6) Employ intrusion detection systems capable of detecting abnormal kernel behavior or crashes. 7) Maintain an inventory of hardware and software versions to quickly identify vulnerable systems and prioritize patching. These steps go beyond generic advice by focusing on hardware identification, vendor coordination, and operational monitoring specific to this kernel-level vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-02-19T14:20:24.202Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9829c4522896dcbe2f71

Added to database: 5/21/2025, 9:08:57 AM

Last enriched: 6/29/2025, 1:41:47 PM

Last updated: 7/26/2025, 1:31:30 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats