{"dataType":"CVE_RECORD","cveMetadata":{"cveId":"CVE-2024-26702","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2024-02-19T14:20:24.157Z","datePublished":"2024-04-03T14:55:01.025Z","dateUpdated":"2026-05-11T20:02:31.831Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2026-05-11T20:02:31.831Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\niio: magnetometer: rm3100: add boundary check for the value read from RM3100_REG_TMRC\n\nRecently, we encounter kernel crash in function rm3100_common_probe\ncaused by out of bound access of array rm3100_samp_rates (because of\nunderlying hardware failures). Add boundary check to prevent out of\nbound access."}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/iio/magnetometer/rm3100-core.c"],"versions":[{"version":"121354b2eceb2669ebdffa76b105ad6c03413966","lessThan":"7200170e88e3ec54d9e9c63f07514c3cead11481","status":"affected","versionType":"git"},{"version":"121354b2eceb2669ebdffa76b105ad6c03413966","lessThan":"36a49290d7e6d554020057a409747a092b1d3b56","status":"affected","versionType":"git"},{"version":"121354b2eceb2669ebdffa76b105ad6c03413966","lessThan":"8d5838a473e8e6d812257c69745f5920e4924a60","status":"affected","versionType":"git"},{"version":"121354b2eceb2669ebdffa76b105ad6c03413966","lessThan":"176256ff8abff29335ecff905a09fb49e8dcf513","status":"affected","versionType":"git"},{"version":"121354b2eceb2669ebdffa76b105ad6c03413966","lessThan":"1d8c67e94e9e977603473a543d4f322cf2c4aa01","status":"affected","versionType":"git"},{"version":"121354b2eceb2669ebdffa76b105ad6c03413966","lessThan":"57d05dbbcd0b3dc0c252103b43012eef5d6430d1","status":"affected","versionType":"git"},{"version":"121354b2eceb2669ebdffa76b105ad6c03413966","lessThan":"792595bab4925aa06532a14dd256db523eb4fa5e","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/iio/magnetometer/rm3100-core.c"],"versions":[{"version":"5.0","status":"affected"},{"version":"0","lessThan":"5.0","status":"unaffected","versionType":"semver"},{"version":"5.4.269","lessThanOrEqual":"5.4.*","status":"unaffected","versionType":"semver"},{"version":"5.10.210","lessThanOrEqual":"5.10.*","status":"unaffected","versionType":"semver"},{"version":"5.15.149","lessThanOrEqual":"5.15.*","status":"unaffected","versionType":"semver"},{"version":"6.1.79","lessThanOrEqual":"6.1.*","status":"unaffected","versionType":"semver"},{"version":"6.6.18","lessThanOrEqual":"6.6.*","status":"unaffected","versionType":"semver"},{"version":"6.7.6","lessThanOrEqual":"6.7.*","status":"unaffected","versionType":"semver"},{"version":"6.8","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.0","versionEndExcluding":"5.4.269"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.0","versionEndExcluding":"5.10.210"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.0","versionEndExcluding":"5.15.149"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.0","versionEndExcluding":"6.1.79"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.0","versionEndExcluding":"6.6.18"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.0","versionEndExcluding":"6.7.6"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.0","versionEndExcluding":"6.8"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/7200170e88e3ec54d9e9c63f07514c3cead11481"},{"url":"https://git.kernel.org/stable/c/36a49290d7e6d554020057a409747a092b1d3b56"},{"url":"https://git.kernel.org/stable/c/8d5838a473e8e6d812257c69745f5920e4924a60"},{"url":"https://git.kernel.org/stable/c/176256ff8abff29335ecff905a09fb49e8dcf513"},{"url":"https://git.kernel.org/stable/c/1d8c67e94e9e977603473a543d4f322cf2c4aa01"},{"url":"https://git.kernel.org/stable/c/57d05dbbcd0b3dc0c252103b43012eef5d6430d1"},{"url":"https://git.kernel.org/stable/c/792595bab4925aa06532a14dd256db523eb4fa5e"}],"title":"iio: magnetometer: rm3100: add boundary check for the value read from RM3100_REG_TMRC","x_generator":{"engine":"bippy-1.2.0"}},"adp":[{"problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-125","lang":"en","description":"CWE-125 Out-of-bounds Read"}]}],"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":5.5,"attackVector":"LOCAL","baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","integrityImpact":"NONE","userInteraction":"NONE","attackComplexity":"LOW","availabilityImpact":"HIGH","privilegesRequired":"LOW","confidentialityImpact":"NONE"}},{"other":{"type":"ssvc","content":{"timestamp":"2024-04-04T15:20:17.184977Z","id":"CVE-2024-26702","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-11-05T15:06:19.230Z"}},{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T00:14:12.653Z"},"title":"CVE Program Container","references":[{"url":"https://git.kernel.org/stable/c/7200170e88e3ec54d9e9c63f07514c3cead11481","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/36a49290d7e6d554020057a409747a092b1d3b56","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/8d5838a473e8e6d812257c69745f5920e4924a60","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/176256ff8abff29335ecff905a09fb49e8dcf513","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/1d8c67e94e9e977603473a543d4f322cf2c4aa01","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/57d05dbbcd0b3dc0c252103b43012eef5d6430d1","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/792595bab4925aa06532a14dd256db523eb4fa5e","tags":["x_transferred"]},{"url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html","tags":["x_transferred"]}]}]},"dataVersion":"5.2"}