U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

CVE-2024-38615 Detail

Description

In the Linux kernel, the following vulnerability has been resolved: cpufreq: exit() callback is optional The exit() callback is optional and shouldn't be called without checking a valid pointer first. Also, we must clear freq_table pointer even if the exit() callback isn't present.


Metrics

NVD enrichment efforts reference publicly available information to associate vector strings. CVSS information contributed by other sources is also displayed.
CVSS 4.0 Severity and Vector Strings:

NIST CVSS score
NIST: NVD
N/A
NVD assessment not yet provided.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

Hyperlink Resource
https://git.kernel.org/stable/c/2d730b465e377396d2a09a53524b96b111f7ccb6
https://git.kernel.org/stable/c/2d730b465e377396d2a09a53524b96b111f7ccb6
https://git.kernel.org/stable/c/35db5e76d5e9f752476df5fa0b9018a2398b0378
https://git.kernel.org/stable/c/35db5e76d5e9f752476df5fa0b9018a2398b0378
https://git.kernel.org/stable/c/3e99f060cfd2e36504d62c9132b453ade5027e1c
https://git.kernel.org/stable/c/3e99f060cfd2e36504d62c9132b453ade5027e1c
https://git.kernel.org/stable/c/8bc9546805e572ad101681437a49939f28777273
https://git.kernel.org/stable/c/8bc9546805e572ad101681437a49939f28777273
https://git.kernel.org/stable/c/a8204d1b6ff762d2171d365c2c8560285d0a233d
https://git.kernel.org/stable/c/a8204d1b6ff762d2171d365c2c8560285d0a233d
https://git.kernel.org/stable/c/ae37ebca325097d773d7bb6ec069123b30772872
https://git.kernel.org/stable/c/ae37ebca325097d773d7bb6ec069123b30772872
https://git.kernel.org/stable/c/b8f85833c05730d631576008daaa34096bc7f3ce
https://git.kernel.org/stable/c/b8f85833c05730d631576008daaa34096bc7f3ce
https://git.kernel.org/stable/c/dfc56ff5ec9904c008e9376d90a6d7e2d2bec4d3
https://git.kernel.org/stable/c/dfc56ff5ec9904c008e9376d90a6d7e2d2bec4d3

Weakness Enumeration

CWE-ID CWE Name Source

Change History

2 change records found show changes

Quick Info

CVE Dictionary Entry:
CVE-2024-38615
NVD Published Date:
06/19/2024
NVD Last Modified:
11/21/2024
Source:
kernel.org