CVE-2024-57998

high

Description

In the Linux kernel, the following vulnerability has been resolved: OPP: add index check to assert to avoid buffer overflow in _read_freq() Pass the freq index to the assert function to make sure we do not read a freq out of the opp->rates[] table when called from the indexed variants: dev_pm_opp_find_freq_exact_indexed() or dev_pm_opp_find_freq_ceil/floor_indexed(). Add a secondary parameter to the assert function, unused for assert_single_clk() then add assert_clk_index() which will check for the clock index when called from the _indexed() find functions.

References

https://git.kernel.org/stable/c/eb6ffa0192ba83ece1a318b956265519c5c7dcec

https://git.kernel.org/stable/c/da2a6acc73933b7812c94794726e438cde39e037

https://git.kernel.org/stable/c/d659bc68ed489022ea33342cfbda2911a81e7a0d

https://git.kernel.org/stable/c/7d68c20638e50d5eb4576492a7958328ae445248

https://git.kernel.org/stable/c/774dd6f0f0a61c9c3848e025d7d9eeed1a7ca4cd

Details

Source: Mitre, NVD

Published: 2025-02-27

Updated: 2025-02-27

Risk Information

CVSS v2

Base Score: 7.2

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

Severity: High

CVSS v3

Base Score: 7.8

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Severity: High