CVE-2024-26969: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: clk: qcom: gcc-ipq8074: fix terminating of frequency table arrays The frequency table arrays are supposed to be terminated with an empty element. Add such entry to the end of the arrays where it is missing in order to avoid possible out-of-bound access when the table is traversed by functions like qcom_find_freq() or qcom_find_freq_floor(). Only compile tested.
AI Analysis
Technical Summary
CVE-2024-26969 is a vulnerability identified in the Linux kernel, specifically within the Qualcomm (qcom) clock controller driver for the IPQ8074 chipset (gcc-ipq8074). The issue arises from improperly terminated frequency table arrays used by the driver. These arrays are expected to end with an empty element to signal the end of the table. However, in affected versions, this terminating entry was missing, which can lead to out-of-bounds memory access when functions such as qcom_find_freq() or qcom_find_freq_floor() traverse the frequency tables. Out-of-bounds access can cause undefined behavior including potential memory corruption or kernel crashes. The vulnerability was discovered during compilation testing and has been addressed by adding the missing terminating entry to the frequency tables, preventing out-of-bound reads. There are no known exploits in the wild at this time, and the vulnerability does not have an assigned CVSS score. The affected versions are identified by a specific Linux kernel commit hash, indicating this is a low-level kernel code issue affecting certain Qualcomm-based Linux kernel builds.
Potential Impact
For European organizations, the impact of CVE-2024-26969 depends largely on the deployment of Linux systems running on Qualcomm IPQ8074-based hardware, which is commonly found in embedded devices such as routers, gateways, and IoT devices. If exploited, the out-of-bounds access could lead to kernel instability or crashes, potentially causing denial of service conditions on affected devices. While direct remote exploitation is unlikely without additional vulnerabilities, attackers with local access or the ability to execute code on the device could leverage this flaw to disrupt device operation or potentially escalate privileges if memory corruption is exploitable. This could impact network infrastructure reliability, especially in organizations relying on embedded Linux devices for critical network functions. Given the kernel-level nature, any compromise could affect confidentiality, integrity, and availability of systems. However, the absence of known exploits and the requirement for specific hardware limits the immediate widespread risk.
Mitigation Recommendations
European organizations should prioritize updating Linux kernel versions to include the patch that adds the missing terminating entry in the frequency table arrays for the qcom gcc-ipq8074 driver. Specifically, kernel builds should be verified to include the fix corresponding to the commit that resolves CVE-2024-26969. For embedded devices using Qualcomm IPQ8074 chipsets, firmware updates from device vendors should be applied promptly. Network administrators should audit their infrastructure to identify devices running affected kernel versions and Qualcomm hardware. Additionally, implementing strict access controls to limit local access to devices and monitoring for unusual kernel crashes or device instability can help detect potential exploitation attempts. Since this vulnerability involves kernel memory handling, enabling kernel hardening features such as Kernel Address Space Layout Randomization (KASLR) and Kernel Page Table Isolation (KPTI) where supported may reduce exploitation risk. Finally, organizations should maintain an inventory of embedded Linux devices and ensure timely patch management processes for firmware and kernel updates.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Finland
CVE-2024-26969: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: clk: qcom: gcc-ipq8074: fix terminating of frequency table arrays The frequency table arrays are supposed to be terminated with an empty element. Add such entry to the end of the arrays where it is missing in order to avoid possible out-of-bound access when the table is traversed by functions like qcom_find_freq() or qcom_find_freq_floor(). Only compile tested.
AI-Powered Analysis
Technical Analysis
CVE-2024-26969 is a vulnerability identified in the Linux kernel, specifically within the Qualcomm (qcom) clock controller driver for the IPQ8074 chipset (gcc-ipq8074). The issue arises from improperly terminated frequency table arrays used by the driver. These arrays are expected to end with an empty element to signal the end of the table. However, in affected versions, this terminating entry was missing, which can lead to out-of-bounds memory access when functions such as qcom_find_freq() or qcom_find_freq_floor() traverse the frequency tables. Out-of-bounds access can cause undefined behavior including potential memory corruption or kernel crashes. The vulnerability was discovered during compilation testing and has been addressed by adding the missing terminating entry to the frequency tables, preventing out-of-bound reads. There are no known exploits in the wild at this time, and the vulnerability does not have an assigned CVSS score. The affected versions are identified by a specific Linux kernel commit hash, indicating this is a low-level kernel code issue affecting certain Qualcomm-based Linux kernel builds.
Potential Impact
For European organizations, the impact of CVE-2024-26969 depends largely on the deployment of Linux systems running on Qualcomm IPQ8074-based hardware, which is commonly found in embedded devices such as routers, gateways, and IoT devices. If exploited, the out-of-bounds access could lead to kernel instability or crashes, potentially causing denial of service conditions on affected devices. While direct remote exploitation is unlikely without additional vulnerabilities, attackers with local access or the ability to execute code on the device could leverage this flaw to disrupt device operation or potentially escalate privileges if memory corruption is exploitable. This could impact network infrastructure reliability, especially in organizations relying on embedded Linux devices for critical network functions. Given the kernel-level nature, any compromise could affect confidentiality, integrity, and availability of systems. However, the absence of known exploits and the requirement for specific hardware limits the immediate widespread risk.
Mitigation Recommendations
European organizations should prioritize updating Linux kernel versions to include the patch that adds the missing terminating entry in the frequency table arrays for the qcom gcc-ipq8074 driver. Specifically, kernel builds should be verified to include the fix corresponding to the commit that resolves CVE-2024-26969. For embedded devices using Qualcomm IPQ8074 chipsets, firmware updates from device vendors should be applied promptly. Network administrators should audit their infrastructure to identify devices running affected kernel versions and Qualcomm hardware. Additionally, implementing strict access controls to limit local access to devices and monitoring for unusual kernel crashes or device instability can help detect potential exploitation attempts. Since this vulnerability involves kernel memory handling, enabling kernel hardening features such as Kernel Address Space Layout Randomization (KASLR) and Kernel Page Table Isolation (KPTI) where supported may reduce exploitation risk. Finally, organizations should maintain an inventory of embedded Linux devices and ensure timely patch management processes for firmware and kernel updates.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-02-19T14:20:24.202Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9829c4522896dcbe2f75
Added to database: 5/21/2025, 9:08:57 AM
Last enriched: 6/29/2025, 1:41:56 PM
Last updated: 8/11/2025, 9:51:06 PM
Views: 15
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.