Lucene search

K
vulnrichmentLinuxVULNRICHMENT:CVE-2024-35848
HistoryMay 17, 2024 - 2:47 p.m.

CVE-2024-35848 eeprom: at24: fix memory corruption race condition

2024-05-1714:47:26
Linux
github.com
7
linux kernel
vulnerability
at24
memory corruption
nvmem device
race condition

AI Score

7

Confidence

Low

SSVC

Exploitation

none

Automatable

no

Technical Impact

partial

In the Linux kernel, the following vulnerability has been resolved:

eeprom: at24: fix memory corruption race condition

If the eeprom is not accessible, an nvmem device will be registered, the
read will fail, and the device will be torn down. If another driver
accesses the nvmem device after the teardown, it will reference
invalid memory.

Move the failure point before registering the nvmem device.

CNA Affected

[
  {
    "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
    "vendor": "Linux",
    "product": "Linux",
    "versions": [
      {
        "status": "affected",
        "version": "b20eb4c1f026",
        "lessThan": "c850f71fca09",
        "versionType": "git"
      },
      {
        "status": "affected",
        "version": "b20eb4c1f026",
        "lessThan": "26d32bec4c6d",
        "versionType": "git"
      },
      {
        "status": "affected",
        "version": "b20eb4c1f026",
        "lessThan": "c43e5028f5a3",
        "versionType": "git"
      },
      {
        "status": "affected",
        "version": "b20eb4c1f026",
        "lessThan": "2af84c46b9b8",
        "versionType": "git"
      },
      {
        "status": "affected",
        "version": "b20eb4c1f026",
        "lessThan": "6d8b56ec0c8f",
        "versionType": "git"
      },
      {
        "status": "affected",
        "version": "b20eb4c1f026",
        "lessThan": "f42c97027fb7",
        "versionType": "git"
      }
    ],
    "programFiles": [
      "drivers/misc/eeprom/at24.c"
    ],
    "defaultStatus": "unaffected"
  },
  {
    "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
    "vendor": "Linux",
    "product": "Linux",
    "versions": [
      {
        "status": "affected",
        "version": "5.3"
      },
      {
        "status": "unaffected",
        "version": "0",
        "lessThan": "5.3",
        "versionType": "custom"
      },
      {
        "status": "unaffected",
        "version": "5.10.217",
        "versionType": "custom",
        "lessThanOrEqual": "5.10.*"
      },
      {
        "status": "unaffected",
        "version": "5.15.159",
        "versionType": "custom",
        "lessThanOrEqual": "5.15.*"
      },
      {
        "status": "unaffected",
        "version": "6.1.91",
        "versionType": "custom",
        "lessThanOrEqual": "6.1.*"
      },
      {
        "status": "unaffected",
        "version": "6.6.31",
        "versionType": "custom",
        "lessThanOrEqual": "6.6.*"
      },
      {
        "status": "unaffected",
        "version": "6.8.9",
        "versionType": "custom",
        "lessThanOrEqual": "6.8.*"
      },
      {
        "status": "unaffected",
        "version": "6.9",
        "versionType": "original_commit_for_fix",
        "lessThanOrEqual": "*"
      }
    ],
    "programFiles": [
      "drivers/misc/eeprom/at24.c"
    ],
    "defaultStatus": "affected"
  }
]

AI Score

7

Confidence

Low

SSVC

Exploitation

none

Automatable

no

Technical Impact

partial