{"id":"CVE-2024-26702","summary":"iio: magnetometer: rm3100: add boundary check for the value read from RM3100_REG_TMRC","details":"In the Linux kernel, the following vulnerability has been resolved:\n\niio: magnetometer: rm3100: add boundary check for the value read from RM3100_REG_TMRC\n\nRecently, we encounter kernel crash in function rm3100_common_probe\ncaused by out of bound access of array rm3100_samp_rates (because of\nunderlying hardware failures). Add boundary check to prevent out of\nbound access.","modified":"2026-04-02T10:05:32.926206Z","published":"2024-04-03T14:55:01.025Z","related":["SUSE-SU-2024:1644-1","SUSE-SU-2024:1659-1","SUSE-SU-2024:1663-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/26xxx/CVE-2024-26702.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/176256ff8abff29335ecff905a09fb49e8dcf513"},{"type":"WEB","url":"https://git.kernel.org/stable/c/1d8c67e94e9e977603473a543d4f322cf2c4aa01"},{"type":"WEB","url":"https://git.kernel.org/stable/c/36a49290d7e6d554020057a409747a092b1d3b56"},{"type":"WEB","url":"https://git.kernel.org/stable/c/57d05dbbcd0b3dc0c252103b43012eef5d6430d1"},{"type":"WEB","url":"https://git.kernel.org/stable/c/7200170e88e3ec54d9e9c63f07514c3cead11481"},{"type":"WEB","url":"https://git.kernel.org/stable/c/792595bab4925aa06532a14dd256db523eb4fa5e"},{"type":"WEB","url":"https://git.kernel.org/stable/c/8d5838a473e8e6d812257c69745f5920e4924a60"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/26xxx/CVE-2024-26702.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-26702"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"121354b2eceb2669ebdffa76b105ad6c03413966"},{"fixed":"7200170e88e3ec54d9e9c63f07514c3cead11481"},{"fixed":"36a49290d7e6d554020057a409747a092b1d3b56"},{"fixed":"8d5838a473e8e6d812257c69745f5920e4924a60"},{"fixed":"176256ff8abff29335ecff905a09fb49e8dcf513"},{"fixed":"1d8c67e94e9e977603473a543d4f322cf2c4aa01"},{"fixed":"57d05dbbcd0b3dc0c252103b43012eef5d6430d1"},{"fixed":"792595bab4925aa06532a14dd256db523eb4fa5e"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-26702.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}]}