CVE-2024-35836
Severity CVSS v4.0:
Pending analysis
Type:
CWE-416
Use After Free
Publication date:
17/05/2024
Last modified:
19/09/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
dpll: fix pin dump crash for rebound module<br />
<br />
When a kernel module is unbound but the pin resources were not entirely<br />
freed (other kernel module instance of the same PCI device have had kept<br />
the reference to that pin), and kernel module is again bound, the pin<br />
properties would not be updated (the properties are only assigned when<br />
memory for the pin is allocated), prop pointer still points to the<br />
kernel module memory of the kernel module which was deallocated on the<br />
unbind.<br />
<br />
If the pin dump is invoked in this state, the result is a kernel crash.<br />
Prevent the crash by storing persistent pin properties in dpll subsystem,<br />
copy the content from the kernel module when pin is allocated, instead of<br />
using memory of the kernel module.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.7.3 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



