CVE-2024-53157
Severity CVSS v4.0:
Pending analysis
Type:
CWE-476
NULL Pointer Dereference
Publication date:
24/12/2024
Last modified:
03/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
firmware: arm_scpi: Check the DVFS OPP count returned by the firmware<br />
<br />
Fix a kernel crash with the below call trace when the SCPI firmware<br />
returns OPP count of zero.<br />
<br />
dvfs_info.opp_count may be zero on some platforms during the reboot<br />
test, and the kernel will crash after dereferencing the pointer to<br />
kcalloc(info->count, sizeof(*opp), GFP_KERNEL).<br />
<br />
| Unable to handle kernel NULL pointer dereference at virtual address 0000000000000028<br />
| Mem abort info:<br />
| ESR = 0x96000004<br />
| Exception class = DABT (current EL), IL = 32 bits<br />
| SET = 0, FnV = 0<br />
| EA = 0, S1PTW = 0<br />
| Data abort info:<br />
| ISV = 0, ISS = 0x00000004<br />
| CM = 0, WnR = 0<br />
| user pgtable: 4k pages, 48-bit VAs, pgdp = 00000000faefa08c<br />
| [0000000000000028] pgd=0000000000000000<br />
| Internal error: Oops: 96000004 [#1] SMP<br />
| scpi-hwmon: probe of PHYT000D:00 failed with error -110<br />
| Process systemd-udevd (pid: 1701, stack limit = 0x00000000aaede86c)<br />
| CPU: 2 PID: 1701 Comm: systemd-udevd Not tainted 4.19.90+ #1<br />
| Hardware name: PHYTIUM LTD Phytium FT2000/4/Phytium FT2000/4, BIOS<br />
| pstate: 60000005 (nZCv daif -PAN -UAO)<br />
| pc : scpi_dvfs_recalc_rate+0x40/0x58 [clk_scpi]<br />
| lr : clk_register+0x438/0x720<br />
| Call trace:<br />
| scpi_dvfs_recalc_rate+0x40/0x58 [clk_scpi]<br />
| devm_clk_hw_register+0x50/0xa0<br />
| scpi_clk_ops_init.isra.2+0xa0/0x138 [clk_scpi]<br />
| scpi_clocks_probe+0x528/0x70c [clk_scpi]<br />
| platform_drv_probe+0x58/0xa8<br />
| really_probe+0x260/0x3d0<br />
| driver_probe_device+0x12c/0x148<br />
| device_driver_attach+0x74/0x98<br />
| __driver_attach+0xb4/0xe8<br />
| bus_for_each_dev+0x88/0xe0<br />
| driver_attach+0x30/0x40<br />
| bus_add_driver+0x178/0x2b0<br />
| driver_register+0x64/0x118<br />
| __platform_driver_register+0x54/0x60<br />
| scpi_clocks_driver_init+0x24/0x1000 [clk_scpi]<br />
| do_one_initcall+0x54/0x220<br />
| do_init_module+0x54/0x1c8<br />
| load_module+0x14a4/0x1668<br />
| __se_sys_finit_module+0xf8/0x110<br />
| __arm64_sys_finit_module+0x24/0x30<br />
| el0_svc_common+0x78/0x170<br />
| el0_svc_handler+0x38/0x78<br />
| el0_svc+0x8/0x340<br />
| Code: 937d7c00 a94153f3 a8c27bfd f9400421 (b8606820)<br />
| ---[ end trace 06feb22469d89fa8 ]---<br />
| Kernel panic - not syncing: Fatal exception<br />
| SMP: stopping secondary CPUs<br />
| Kernel Offset: disabled<br />
| CPU features: 0x10,a0002008<br />
| Memory Limit: none
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.4 (including) | 4.19.325 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.20 (including) | 5.4.287 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.5 (including) | 5.10.231 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.174 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.120 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.64 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.11.11 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.12 (including) | 6.12.2 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/025067eeb945aa17c7dd483a63960125b7efb577
- https://git.kernel.org/stable/c/06258e57fee253f4046d3a6a86d7fde09f596eac
- https://git.kernel.org/stable/c/109aa654f85c5141e813b2cd1bd36d90be678407
- https://git.kernel.org/stable/c/12e2c520a0a4202575e4a45ea41f06a8e9aa3417
- https://git.kernel.org/stable/c/2a5b8de6fcb944f9af0c5fcb30bb0c039705e051
- https://git.kernel.org/stable/c/380c0e1d96f3b522f3170c18ee5e0f1a28fec5d6
- https://git.kernel.org/stable/c/8be4e51f3ecfb0915e3510b600c4cce0dc68a383
- https://git.kernel.org/stable/c/9beaff47bcea5eec7d4ead98f5043057161fd71a
- https://git.kernel.org/stable/c/dfc9c2aa7f04f7db7e7225a5e118a24bf1c3b325
- https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html
- https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html



