In the Linux kernel, the following vulnerability has been resolved:
iio: chemical: bme680: Fix overflows in compensate() functions
There are cases in the compensate functions of the driver that
there could be overflows of variables due to bit shifting ops.
These implications were initially discussed here [1] and they
were mentioned in log message of Commit 1b3bd8592780 ("iio:
chemical: Add support for Bosch BME680 sensor").
[1]: https://lore.kernel.org/linux-iio/20180728114028.3c1bbe81@archlinux/
References
Configurations
Configuration 1 (hide)
|
History
26 Sep 2025, 14:45
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:linux:linux_kernel:6.10:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.10:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.10:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:* |
|
References | () https://git.kernel.org/stable/c/3add41bbda92938e9a528d74659dfc552796be4e - Patch | |
References | () https://git.kernel.org/stable/c/6fa31bbe2ea8665ee970258eb8320cbf231dbe9e - Patch | |
References | () https://git.kernel.org/stable/c/7a13d1357658d3a3c1cd7b3b9543c805a6e5e6e9 - Patch | |
References | () https://git.kernel.org/stable/c/b0af334616ed425024bf220adda0f004806b5feb - Patch | |
References | () https://git.kernel.org/stable/c/b5967393d50e3c6e632efda3ea3fdde14c1bfd0e - Patch | |
References | () https://git.kernel.org/stable/c/ba1bb3e2a38a7fef1c1818dd4f2d9abbfdde553a - Patch | |
References | () https://git.kernel.org/stable/c/c326551e99f5416986074ce78bef94f6a404b517 - Patch | |
References | () https://git.kernel.org/stable/c/fdd478c3ae98c3f13628e110dce9b6cfb0d9b3c8 - Patch | |
First Time |
Linux
Linux linux Kernel |
|
CWE | CWE-787 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
21 Nov 2024, 09:33
Type | Values Removed | Values Added |
---|---|---|
References | () https://git.kernel.org/stable/c/3add41bbda92938e9a528d74659dfc552796be4e - | |
References | () https://git.kernel.org/stable/c/6fa31bbe2ea8665ee970258eb8320cbf231dbe9e - | |
References | () https://git.kernel.org/stable/c/7a13d1357658d3a3c1cd7b3b9543c805a6e5e6e9 - | |
References | () https://git.kernel.org/stable/c/b0af334616ed425024bf220adda0f004806b5feb - | |
References | () https://git.kernel.org/stable/c/b5967393d50e3c6e632efda3ea3fdde14c1bfd0e - | |
References | () https://git.kernel.org/stable/c/ba1bb3e2a38a7fef1c1818dd4f2d9abbfdde553a - | |
References | () https://git.kernel.org/stable/c/c326551e99f5416986074ce78bef94f6a404b517 - | |
References | () https://git.kernel.org/stable/c/fdd478c3ae98c3f13628e110dce9b6cfb0d9b3c8 - |
30 Jul 2024, 13:33
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
29 Jul 2024, 17:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-07-29 17:15
Updated : 2025-09-26 14:45
NVD link : CVE-2024-42086
Mitre link : CVE-2024-42086
CVE.ORG link : CVE-2024-42086
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-787
Out-of-bounds Write