๐Ÿ” CVE Alert

CVE-2024-58069

HIGH 7.8

rtc: pcf85063: fix potential OOB write in PCF85063 NVMEM read

CVSS Score
7.8
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: rtc: pcf85063: fix potential OOB write in PCF85063 NVMEM read The nvmem interface supports variable buffer sizes, while the regmap interface operates with fixed-size storage. If an nvmem client uses a buffer size less than 4 bytes, regmap_read will write out of bounds as it expects the buffer to point at an unsigned int. Fix this by using an intermediary unsigned int to hold the value.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Mar 6, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new high vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
fadfd092ee9138825d8c2a4f95719d2e2e3202b9 < 21cd59fcb9952eb7505da2bdfc1eb9c619df3ff4 fadfd092ee9138825d8c2a4f95719d2e2e3202b9 < 6f2a8ca9a0a38589f52a7f0fb9425b9ba987ae7c fadfd092ee9138825d8c2a4f95719d2e2e3202b9 < e5536677da803ed54a29a446515c28dce7d3d574 fadfd092ee9138825d8c2a4f95719d2e2e3202b9 < c72b7a474d3f445bf0c5bcf8ffed332c78eb28a1 fadfd092ee9138825d8c2a4f95719d2e2e3202b9 < 9adefa7b9559d0f21034a5d5ec1b55840c9348b9 fadfd092ee9138825d8c2a4f95719d2e2e3202b9 < e5e06455760f2995b16a176033909347929d1128 fadfd092ee9138825d8c2a4f95719d2e2e3202b9 < 517aedb365f2c94e2d7e0b908ac7127df76203a1 fadfd092ee9138825d8c2a4f95719d2e2e3202b9 < 3ab8c5ed4f84fa20cd16794fe8dc31f633fbc70c
Linux / Linux
5.2

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/21cd59fcb9952eb7505da2bdfc1eb9c619df3ff4 git.kernel.org: https://git.kernel.org/stable/c/6f2a8ca9a0a38589f52a7f0fb9425b9ba987ae7c git.kernel.org: https://git.kernel.org/stable/c/e5536677da803ed54a29a446515c28dce7d3d574 git.kernel.org: https://git.kernel.org/stable/c/c72b7a474d3f445bf0c5bcf8ffed332c78eb28a1 git.kernel.org: https://git.kernel.org/stable/c/9adefa7b9559d0f21034a5d5ec1b55840c9348b9 git.kernel.org: https://git.kernel.org/stable/c/e5e06455760f2995b16a176033909347929d1128 git.kernel.org: https://git.kernel.org/stable/c/517aedb365f2c94e2d7e0b908ac7127df76203a1 git.kernel.org: https://git.kernel.org/stable/c/3ab8c5ed4f84fa20cd16794fe8dc31f633fbc70c lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/03/msg00028.html