CVE-2026-43175 (GCVE-0-2026-43175)

Vulnerability from cvelistv5 – Published: 2026-05-06 11:27 – Updated: 2026-05-06 11:27
VLAI?
Title
clk: rs9: Reserve 8 struct clk_hw slots for for 9FGV0841
Summary
In the Linux kernel, the following vulnerability has been resolved: clk: rs9: Reserve 8 struct clk_hw slots for for 9FGV0841 The 9FGV0841 has 8 outputs and registers 8 struct clk_hw, make sure there are 8 slots for those newly registered clk_hw pointers, else there is going to be out of bounds write when pointers 4..7 are set into struct rs9_driver_data .clk_dif[4..7] field. Since there are other structure members past this struct clk_hw pointer array, writing to .clk_dif[4..7] fields corrupts both the struct rs9_driver_data content and data around it, sometimes without crashing the kernel. However, the kernel does surely crash when the driver is unbound or during suspend. Fix this, increase the struct clk_hw pointer array size to the maximum output count of 9FGV0841, which is the biggest chip that is supported by this driver.
Severity ?
No CVSS data available.
Assigner
Impacted products
Vendor Product Version
Linux Linux Affected: f0e5e1800204b82af6d3e8ef03012ab4afc22358 , < 2f926875dffe2226ea26d129e16d9092cccd03aa (git)
Affected: f0e5e1800204b82af6d3e8ef03012ab4afc22358 , < da86ca15d7389ee0b5df08e8f70c39354e6b8a4b (git)
Affected: f0e5e1800204b82af6d3e8ef03012ab4afc22358 , < 82a34f344999d8029bcebf131028fa519140c7cc (git)
Affected: f0e5e1800204b82af6d3e8ef03012ab4afc22358 , < 5ec820fc28d0b8a0f3890d476b1976f20e8343cc (git)
Create a notification for this product.
    Linux Linux Affected: 6.8
Unaffected: 0 , < 6.8 (semver)
Unaffected: 6.12.75 , ≤ 6.12.* (semver)
Unaffected: 6.18.16 , ≤ 6.18.* (semver)
Unaffected: 6.19.6 , ≤ 6.19.* (semver)
Unaffected: 7.0 , ≤ * (original_commit_for_fix)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "drivers/clk/clk-renesas-pcie.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "2f926875dffe2226ea26d129e16d9092cccd03aa",
              "status": "affected",
              "version": "f0e5e1800204b82af6d3e8ef03012ab4afc22358",
              "versionType": "git"
            },
            {
              "lessThan": "da86ca15d7389ee0b5df08e8f70c39354e6b8a4b",
              "status": "affected",
              "version": "f0e5e1800204b82af6d3e8ef03012ab4afc22358",
              "versionType": "git"
            },
            {
              "lessThan": "82a34f344999d8029bcebf131028fa519140c7cc",
              "status": "affected",
              "version": "f0e5e1800204b82af6d3e8ef03012ab4afc22358",
              "versionType": "git"
            },
            {
              "lessThan": "5ec820fc28d0b8a0f3890d476b1976f20e8343cc",
              "status": "affected",
              "version": "f0e5e1800204b82af6d3e8ef03012ab4afc22358",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "drivers/clk/clk-renesas-pcie.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "6.8"
            },
            {
              "lessThan": "6.8",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.12.*",
              "status": "unaffected",
              "version": "6.12.75",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.18.*",
              "status": "unaffected",
              "version": "6.18.16",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.19.*",
              "status": "unaffected",
              "version": "6.19.6",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "7.0",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.12.75",
                  "versionStartIncluding": "6.8",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.18.16",
                  "versionStartIncluding": "6.8",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.19.6",
                  "versionStartIncluding": "6.8",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "7.0",
                  "versionStartIncluding": "6.8",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nclk: rs9: Reserve 8 struct clk_hw slots for for 9FGV0841\n\nThe 9FGV0841 has 8 outputs and registers 8 struct clk_hw, make sure\nthere are 8 slots for those newly registered clk_hw pointers, else\nthere is going to be out of bounds write when pointers 4..7 are set\ninto struct rs9_driver_data .clk_dif[4..7] field.\n\nSince there are other structure members past this struct clk_hw\npointer array, writing to .clk_dif[4..7] fields corrupts both\nthe struct rs9_driver_data content and data around it, sometimes\nwithout crashing the kernel. However, the kernel does surely\ncrash when the driver is unbound or during suspend.\n\nFix this, increase the struct clk_hw pointer array size to the\nmaximum output count of 9FGV0841, which is the biggest chip that\nis supported by this driver."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-05-06T11:27:49.496Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/2f926875dffe2226ea26d129e16d9092cccd03aa"
        },
        {
          "url": "https://git.kernel.org/stable/c/da86ca15d7389ee0b5df08e8f70c39354e6b8a4b"
        },
        {
          "url": "https://git.kernel.org/stable/c/82a34f344999d8029bcebf131028fa519140c7cc"
        },
        {
          "url": "https://git.kernel.org/stable/c/5ec820fc28d0b8a0f3890d476b1976f20e8343cc"
        }
      ],
      "title": "clk: rs9: Reserve 8 struct clk_hw slots for for 9FGV0841",
      "x_generator": {
        "engine": "bippy-1.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2026-43175",
    "datePublished": "2026-05-06T11:27:49.496Z",
    "dateReserved": "2026-05-01T14:12:55.991Z",
    "dateUpdated": "2026-05-06T11:27:49.496Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2",
  "vulnerability-lookup:meta": {
    "epss": {
      "cve": "CVE-2026-43175",
      "date": "2026-05-10",
      "epss": "0.00018",
      "percentile": "0.04739"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2026-43175\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2026-05-06T12:16:35.967\",\"lastModified\":\"2026-05-06T13:07:51.607\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nclk: rs9: Reserve 8 struct clk_hw slots for for 9FGV0841\\n\\nThe 9FGV0841 has 8 outputs and registers 8 struct clk_hw, make sure\\nthere are 8 slots for those newly registered clk_hw pointers, else\\nthere is going to be out of bounds write when pointers 4..7 are set\\ninto struct rs9_driver_data .clk_dif[4..7] field.\\n\\nSince there are other structure members past this struct clk_hw\\npointer array, writing to .clk_dif[4..7] fields corrupts both\\nthe struct rs9_driver_data content and data around it, sometimes\\nwithout crashing the kernel. However, the kernel does surely\\ncrash when the driver is unbound or during suspend.\\n\\nFix this, increase the struct clk_hw pointer array size to the\\nmaximum output count of 9FGV0841, which is the biggest chip that\\nis supported by this driver.\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/2f926875dffe2226ea26d129e16d9092cccd03aa\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/5ec820fc28d0b8a0f3890d476b1976f20e8343cc\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/82a34f344999d8029bcebf131028fa519140c7cc\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/da86ca15d7389ee0b5df08e8f70c39354e6b8a4b\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.

Sightings

Author Source Type Date Other

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…