Linux kernel cppc_cpufreq: null ptr derefs in cpufreq_cpu_get
CVE-2024-38573 Published on June 19, 2024
cppc_cpufreq: Fix possible null pointer dereference
In the Linux kernel, the following vulnerability has been resolved:
cppc_cpufreq: Fix possible null pointer dereference
cppc_cpufreq_get_rate() and hisi_cppc_cpufreq_get_rate() can be called from
different places with various parameters. So cpufreq_cpu_get() can return
null as 'policy' in some circumstances.
Fix this bug by adding null return check.
Found by Linux Verification Center (linuxtesting.org) with SVACE.
Vulnerability Analysis
CVE-2024-38573 can be exploited with network access, and does not require authorization privileges or user interaction. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to have no impact on confidentiality and integrity, and a high impact on availability.
Weakness Type
NULL Pointer Dereference
A NULL pointer dereference occurs when the application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit. NULL pointer dereference issues can occur through a number of flaws, including race conditions, and simple programming omissions.
Products Associated with CVE-2024-38573
You can be notified by email with stack.watch whenever vulnerabilities like CVE-2024-38573 are published in these products:
Affected Versions
Linux:- Version a28b2bfc099c6b9caa6ef697660408e076a32019 and below 9a185cc5a79ba408e1c73375706630662304f618 is affected.
- Version a28b2bfc099c6b9caa6ef697660408e076a32019 and below 769c4f355b7962895205b86ad35617873feef9a5 is affected.
- Version a28b2bfc099c6b9caa6ef697660408e076a32019 and below f84b9b25d045e67a7eee5e73f21278c8ab06713c is affected.
- Version a28b2bfc099c6b9caa6ef697660408e076a32019 and below b18daa4ec727c0266de5bfc78e818d168cc4aedf is affected.
- Version a28b2bfc099c6b9caa6ef697660408e076a32019 and below dfec15222529d22b15e5b0d63572a9e39570cab4 is affected.
- Version a28b2bfc099c6b9caa6ef697660408e076a32019 and below cf7de25878a1f4508c69dc9f6819c21ba177dbfe is affected.
- Version 5.11 is affected.
- Before 5.11 is unaffected.
- Version 5.15.161, <= 5.15.* is unaffected.
- Version 6.1.93, <= 6.1.* is unaffected.
- Version 6.6.33, <= 6.6.* is unaffected.
- Version 6.8.12, <= 6.8.* is unaffected.
- Version 6.9.3, <= 6.9.* is unaffected.
- Version 6.10, <= * is unaffected.
- Version a28b2bfc099c and below 9a185cc5a79b is affected.
- Version a28b2bfc099c and below 769c4f355b79 is affected.
- Version a28b2bfc099c and below f84b9b25d045 is affected.
- Version a28b2bfc099c and below b18daa4ec727 is affected.
- Version a28b2bfc099c and below dfec15222529 is affected.
- Version a28b2bfc099c and below cf7de25878a1 is affected.
- Version 5.11 is affected.
- Before 5.11 is unaffected.
- Version 5.15.161, <= 5.16 is unaffected.
- Version 6.1.93, <= 6.2 is unaffected.
- Version 6.6.33, <= 6.7 is unaffected.
- Version 6.8.12, <= 6.9 is unaffected.
- Version 6.9.3, <= 6.10 is unaffected.
- Version 6.10-rc1 is unaffected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.