CVE-2024-57983

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-57983
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-57983.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-57983
Downstream
Published
2025-02-27T02:07:08.774Z
Modified
2025-12-02T00:08:55.569524Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
mailbox: th1520: Fix memory corruption due to incorrect array size
Details

In the Linux kernel, the following vulnerability has been resolved:

mailbox: th1520: Fix memory corruption due to incorrect array size

The functions th1520mboxsuspendnoirq and th1520mboxresumenoirq are intended to save and restore the interrupt mask registers in the MBOX ICU0. However, the array used to store these registers was incorrectly sized, leading to memory corruption when accessing all four registers.

This commit corrects the array size to accommodate all four interrupt mask registers, preventing memory corruption during suspend and resume operations.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/57xxx/CVE-2024-57983.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
5d4d263e1c6b6b18acb4d67fd3b9af71b7404924
Fixed
2cd12c7fba59f30369e8647a2b726c7280903304
Fixed
db049866943a38bf46a34fa120d526663339d7a5

Affected versions

v6.*

v6.12
v6.13
v6.13-rc1
v6.13-rc2
v6.13-rc3
v6.13-rc4
v6.13-rc5
v6.13-rc6
v6.13-rc7
v6.13.1

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
6.13.0
Fixed
6.13.2