CVE-2024-38615

Source
https://cve.org/CVERecord?id=CVE-2024-38615
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-38615.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-38615
Downstream
Related
Published
2024-06-19T13:56:15.422Z
Modified
2026-03-20T12:37:10.600608Z
Summary
cpufreq: exit() callback is optional
Details

In the Linux kernel, the following vulnerability has been resolved:

cpufreq: exit() callback is optional

The exit() callback is optional and shouldn't be called without checking a valid pointer first.

Also, we must clear freq_table pointer even if the exit() callback isn't present.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/38xxx/CVE-2024-38615.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
91a12e91dc39137906d929a4ff6f9c32c59697fa
Fixed
2d730b465e377396d2a09a53524b96b111f7ccb6
Fixed
dfc56ff5ec9904c008e9376d90a6d7e2d2bec4d3
Fixed
35db5e76d5e9f752476df5fa0b9018a2398b0378
Fixed
8bc9546805e572ad101681437a49939f28777273
Fixed
3e99f060cfd2e36504d62c9132b453ade5027e1c
Fixed
ae37ebca325097d773d7bb6ec069123b30772872
Fixed
a8204d1b6ff762d2171d365c2c8560285d0a233d
Fixed
b8f85833c05730d631576008daaa34096bc7f3ce

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-38615.json"