In the Linux kernel, the following vulnerability has been resolved:
OPP: add index check to assert to avoid buffer overflow in _read_freq()
Pass the freq index to the assert function to make sure
we do not read a freq out of the opp->rates[] table when called
from the indexed variants:
dev_pm_opp_find_freq_exact_indexed() or
dev_pm_opp_find_freq_ceil/floor_indexed().
Add a secondary parameter to the assert function, unused
for assert_single_clk() then add assert_clk_index() which
will check for the clock index when called from the _indexed()
find functions.
References
Configurations
Configuration 1 (hide)
|
History
23 Oct 2025, 17:52
Type | Values Removed | Values Added |
---|---|---|
First Time |
Linux
Linux linux Kernel |
|
References | () https://git.kernel.org/stable/c/774dd6f0f0a61c9c3848e025d7d9eeed1a7ca4cd - Patch | |
References | () https://git.kernel.org/stable/c/7d68c20638e50d5eb4576492a7958328ae445248 - Patch | |
References | () https://git.kernel.org/stable/c/d659bc68ed489022ea33342cfbda2911a81e7a0d - Patch | |
References | () https://git.kernel.org/stable/c/da2a6acc73933b7812c94794726e438cde39e037 - Patch | |
References | () https://git.kernel.org/stable/c/eb6ffa0192ba83ece1a318b956265519c5c7dcec - Patch | |
CWE | CWE-125 | |
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
Summary |
|
27 Feb 2025, 02:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-02-27 02:15
Updated : 2025-10-23 17:52
NVD link : CVE-2024-57998
Mitre link : CVE-2024-57998
CVE.ORG link : CVE-2024-57998
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-125
Out-of-bounds Read