CVE-2026-43175
Awaiting Analysis Awaiting Analysis - Queue
Buffer Overflow in Linux Kernel clk-rs9 Driver

Publication date: 2026-05-06

Last updated on: 2026-05-06

Assigner: kernel.org

Description
In the Linux kernel, the following vulnerability has been resolved: clk: rs9: Reserve 8 struct clk_hw slots for for 9FGV0841 The 9FGV0841 has 8 outputs and registers 8 struct clk_hw, make sure there are 8 slots for those newly registered clk_hw pointers, else there is going to be out of bounds write when pointers 4..7 are set into struct rs9_driver_data .clk_dif[4..7] field. Since there are other structure members past this struct clk_hw pointer array, writing to .clk_dif[4..7] fields corrupts both the struct rs9_driver_data content and data around it, sometimes without crashing the kernel. However, the kernel does surely crash when the driver is unbound or during suspend. Fix this, increase the struct clk_hw pointer array size to the maximum output count of 9FGV0841, which is the biggest chip that is supported by this driver.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-06
Last Modified
2026-05-06
Generated
2026-05-07
AI Q&A
2026-05-06
EPSS Evaluated
N/A
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
linux linux_kernel *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-UNKNOWN
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in the Linux kernel related to the handling of clock hardware structures for the 9FGV0841 chip. The chip has 8 outputs and requires 8 slots for struct clk_hw pointers. However, the driver originally did not reserve enough slots, leading to an out-of-bounds write when pointers 4 through 7 are set in the clk_dif array of the rs9_driver_data structure.

Because there are other structure members after the clk_hw pointer array, writing beyond the allocated slots corrupts the rs9_driver_data structure and adjacent memory. This corruption may not always crash the kernel immediately but will cause a kernel crash when the driver is unbound or the system suspends.

The fix involved increasing the size of the clk_hw pointer array to match the maximum output count of the 9FGV0841 chip, preventing out-of-bounds writes.


How can this vulnerability impact me? :

This vulnerability can lead to memory corruption within the Linux kernel, specifically corrupting the rs9_driver_data structure and surrounding data.

Such corruption can cause the kernel to crash, particularly when the affected driver is unbound or when the system enters suspend mode.

Kernel crashes can result in system instability, unexpected reboots, potential data loss, and downtime, impacting system reliability and availability.


What immediate steps should I take to mitigate this vulnerability?

The vulnerability is resolved by increasing the struct clk_hw pointer array size to the maximum output count of 9FGV0841 in the Linux kernel driver. To mitigate this vulnerability, you should update your Linux kernel to a version that includes this fix.

Avoid using affected drivers or hardware until the kernel is updated, as the vulnerability can cause kernel crashes during driver unbinding or suspend operations.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart