CVE-2024-38573

Source
https://cve.org/CVERecord?id=CVE-2024-38573
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-38573.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-38573
Downstream
Related
Published
2024-06-19T13:35:38.334Z
Modified
2026-03-23T05:08:31.891834631Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
cppc_cpufreq: Fix possible null pointer dereference
Details

In the Linux kernel, the following vulnerability has been resolved:

cppc_cpufreq: Fix possible null pointer dereference

cppccpufreqgetrate() and hisicppccpufreqgetrate() can be called from different places with various parameters. So cpufreqcpu_get() can return null as 'policy' in some circumstances. Fix this bug by adding null return check.

Found by Linux Verification Center (linuxtesting.org) with SVACE.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/38xxx/CVE-2024-38573.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
a28b2bfc099c6b9caa6ef697660408e076a32019
Fixed
9a185cc5a79ba408e1c73375706630662304f618
Fixed
769c4f355b7962895205b86ad35617873feef9a5
Fixed
f84b9b25d045e67a7eee5e73f21278c8ab06713c
Fixed
b18daa4ec727c0266de5bfc78e818d168cc4aedf
Fixed
dfec15222529d22b15e5b0d63572a9e39570cab4
Fixed
cf7de25878a1f4508c69dc9f6819c21ba177dbfe

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-38573.json"