CVE-2024-35878
Severity CVSS v4.0:
Pending analysis
Type:
CWE-476
NULL Pointer Dereference
Publication date:
19/05/2024
Last modified:
07/04/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
of: module: prevent NULL pointer dereference in vsnprintf()<br />
<br />
In of_modalias(), we can get passed the str and len parameters which would<br />
cause a kernel oops in vsnprintf() since it only allows passing a NULL ptr<br />
when the length is also 0. Also, we need to filter out the negative values<br />
of the len parameter as these will result in a really huge buffer since<br />
snprintf() takes size_t parameter while ours is ssize_t...<br />
<br />
Found by Linux Verification Center (linuxtesting.org) with the Svace static<br />
analysis tool.
Impact
Base Score 3.x
5.30
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.6.26 (excluding) | |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.8.5 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/544561dc56f7e69a053c25e11e6170f48bb97898
- https://git.kernel.org/stable/c/a1aa5390cc912934fee76ce80af5f940452fa987
- https://git.kernel.org/stable/c/e4a449368a2ce6d57a775d0ead27fc07f5a86e5b
- https://git.kernel.org/stable/c/544561dc56f7e69a053c25e11e6170f48bb97898
- https://git.kernel.org/stable/c/a1aa5390cc912934fee76ce80af5f940452fa987
- https://git.kernel.org/stable/c/e4a449368a2ce6d57a775d0ead27fc07f5a86e5b



