
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2024-38615 affects the Linux kernel's CPU frequency (cpufreq) subsystem. The vulnerability was discovered when it was found that the exit() callback in the cpufreq driver is optional and wasn't being properly checked before being called. The issue was reported by Lizhe and resolved through patches in the Linux kernel (Kernel Git).
The vulnerability exists in the cpufreq subsystem where the exit() callback pointer was being called without proper validation. The issue stems from two specific commits: 91a12e91dc39 ("cpufreq: Allow light-weight tear down and bring up of CPUs") and f339f3541701 ("cpufreq: Rearrange locking in cpufreqremovedev()"). The fix involves ensuring that the exit() callback is checked for validity before being called, and that the freq_table pointer is cleared regardless of whether the exit() callback is present (Kernel Git).
The vulnerability could potentially lead to system instability or crashes when CPU frequency operations are performed, particularly during CPU offline operations or driver removal. This affects systems using the Linux kernel's CPU frequency scaling functionality (NVD).
The issue has been fixed in various Linux kernel versions through patches that properly validate the exit() callback before calling it. The fix has been backported to multiple stable kernel versions. Users should update their kernel to a patched version. For Ubuntu systems, fixes are available for versions 24.04 LTS (noble), 22.04 LTS (jammy), and 20.04 LTS (focal) (Ubuntu).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."