CVE-2024-57998
OPP: add index check to assert to avoid buffer overflow in _read_freq()
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
In the Linux kernel, the following vulnerability has been resolved: OPP: add index check to assert to avoid buffer overflow in _read_freq() Pass the freq index to the assert function to make sure we do not read a freq out of the opp->rates[] table when called from the indexed variants: dev_pm_opp_find_freq_exact_indexed() or dev_pm_opp_find_freq_ceil/floor_indexed(). Add a secondary parameter to the assert function, unused for assert_single_clk() then add assert_clk_index() which will check for the clock index when called from the _indexed() find functions.
| Vendor | linux |
| Product | linux |
| Ecosystems | |
| Industries | Technology |
| Published | Feb 27, 2025 |
| Last Updated | May 11, 2026 |
Stay Ahead of the Next One
Get instant alerts for linux linux
Be the first to know when new unknown vulnerabilities affecting linux linux are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
Linux / Linux
92fcb46659d5dbfdad0422a503e289085990a5d0 < 774dd6f0f0a61c9c3848e025d7d9eeed1a7ca4cd 142e17c1c2b48e3fb4f024e62ab6dee18f268694 < eb6ffa0192ba83ece1a318b956265519c5c7dcec 142e17c1c2b48e3fb4f024e62ab6dee18f268694 < 7d68c20638e50d5eb4576492a7958328ae445248 142e17c1c2b48e3fb4f024e62ab6dee18f268694 < da2a6acc73933b7812c94794726e438cde39e037 142e17c1c2b48e3fb4f024e62ab6dee18f268694 < d659bc68ed489022ea33342cfbda2911a81e7a0d
Linux / Linux
6.6
References
git.kernel.org: https://git.kernel.org/stable/c/774dd6f0f0a61c9c3848e025d7d9eeed1a7ca4cd git.kernel.org: https://git.kernel.org/stable/c/eb6ffa0192ba83ece1a318b956265519c5c7dcec git.kernel.org: https://git.kernel.org/stable/c/7d68c20638e50d5eb4576492a7958328ae445248 git.kernel.org: https://git.kernel.org/stable/c/da2a6acc73933b7812c94794726e438cde39e037 git.kernel.org: https://git.kernel.org/stable/c/d659bc68ed489022ea33342cfbda2911a81e7a0d lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/03/msg00028.html