Bug 2348525 (CVE-2024-57983) - CVE-2024-57983 kernel: mailbox: th1520: Fix memory corruption due to incorrect array size
Summary: CVE-2024-57983 kernel: mailbox: th1520: Fix memory corruption due to incorrec...
Keywords:
Status: NEW
Alias: CVE-2024-57983
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2025-02-27 03:01 UTC by OSIDB Bzimport
Modified: 2025-02-27 15:08 UTC (History)
4 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2025-02-27 03:01:54 UTC
In the Linux kernel, the following vulnerability has been resolved:

mailbox: th1520: Fix memory corruption due to incorrect array size

The functions th1520_mbox_suspend_noirq and th1520_mbox_resume_noirq are
intended to save and restore the interrupt mask registers in the MBOX
ICU0. However, the array used to store these registers was incorrectly
sized, leading to memory corruption when accessing all four registers.

This commit corrects the array size to accommodate all four interrupt
mask registers, preventing memory corruption during suspend and resume
operations.


Note You need to log in before you can comment on or make changes to this bug.