๐Ÿ” CVE Alert

CVE-2024-57998

UNKNOWN 0.0

OPP: add index check to assert to avoid buffer overflow in _read_freq()

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: OPP: add index check to assert to avoid buffer overflow in _read_freq() Pass the freq index to the assert function to make sure we do not read a freq out of the opp->rates[] table when called from the indexed variants: dev_pm_opp_find_freq_exact_indexed() or dev_pm_opp_find_freq_ceil/floor_indexed(). Add a secondary parameter to the assert function, unused for assert_single_clk() then add assert_clk_index() which will check for the clock index when called from the _indexed() find functions.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Feb 27, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
92fcb46659d5dbfdad0422a503e289085990a5d0 < 774dd6f0f0a61c9c3848e025d7d9eeed1a7ca4cd 142e17c1c2b48e3fb4f024e62ab6dee18f268694 < eb6ffa0192ba83ece1a318b956265519c5c7dcec 142e17c1c2b48e3fb4f024e62ab6dee18f268694 < 7d68c20638e50d5eb4576492a7958328ae445248 142e17c1c2b48e3fb4f024e62ab6dee18f268694 < da2a6acc73933b7812c94794726e438cde39e037 142e17c1c2b48e3fb4f024e62ab6dee18f268694 < d659bc68ed489022ea33342cfbda2911a81e7a0d
Linux / Linux
6.6

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/774dd6f0f0a61c9c3848e025d7d9eeed1a7ca4cd git.kernel.org: https://git.kernel.org/stable/c/eb6ffa0192ba83ece1a318b956265519c5c7dcec git.kernel.org: https://git.kernel.org/stable/c/7d68c20638e50d5eb4576492a7958328ae445248 git.kernel.org: https://git.kernel.org/stable/c/da2a6acc73933b7812c94794726e438cde39e037 git.kernel.org: https://git.kernel.org/stable/c/d659bc68ed489022ea33342cfbda2911a81e7a0d lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/03/msg00028.html