In the Linux kernel, the following vulnerability has been resolved: net:
ll_temac: platform_get_resource replaced by wrong function The function
platform_get_resource was replaced with
devm_platform_ioremap_resource_byname and is called using 0 as name. This
eventually ends up in platform_get_resource_byname in the call stack, where
it causes a null pointer in strcmp. if (type == resource_type® &&
!strcmp(r->name, name)) It should have been replaced with
devm_platform_ioremap_resource.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 23.10 | noarch | linux | < any | UNKNOWN |
ubuntu | 24.04 | noarch | linux | < 6.8.0-35.35 | UNKNOWN |
ubuntu | 14.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 16.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 18.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-aws | < any | UNKNOWN |
git.kernel.org/linus/3a38a829c8bc27d78552c28e582eb1d885d07d11 (6.9-rc2)
git.kernel.org/stable/c/3a38a829c8bc27d78552c28e582eb1d885d07d11
git.kernel.org/stable/c/46efbdbc95a30951c2579caf97b6df2ee2b3bef3
git.kernel.org/stable/c/476eed5f1c22034774902a980aa48dc4662cb39a
git.kernel.org/stable/c/553d294db94b5f139378022df480a9fb6c3ae39e
git.kernel.org/stable/c/6d9395ba7f85bdb7af0b93272e537484ecbeff48
git.kernel.org/stable/c/7e9edb569fd9f688d887e36db8170f6e22bafbc8
git.kernel.org/stable/c/92c0c29f667870f17c0b764544bdf22ce0e886a1
launchpad.net/bugs/cve/CVE-2024-35796
nvd.nist.gov/vuln/detail/CVE-2024-35796
security-tracker.debian.org/tracker/CVE-2024-35796
ubuntu.com/security/notices/USN-6816-1
ubuntu.com/security/notices/USN-6817-1
ubuntu.com/security/notices/USN-6817-2
ubuntu.com/security/notices/USN-6817-3
www.cve.org/CVERecord?id=CVE-2024-35796