Skip to main content

CVE-2024-34030: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2024-34030cvecve-2024-34030
Published: Mon Jun 24 2024 (06/24/2024, 13:56:50 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: PCI: of_property: Return error for int_map allocation failure Return -ENOMEM from of_pci_prop_intr_map() if kcalloc() fails to prevent a NULL pointer dereference in this case. [bhelgaas: commit log]

AI-Powered Analysis

AILast updated: 06/29/2025, 15:42:06 UTC

Technical Analysis

CVE-2024-34030 is a medium-severity vulnerability identified in the Linux kernel, specifically within the PCI subsystem's device tree property handling code. The flaw arises in the function of_pci_prop_intr_map(), which is responsible for mapping interrupt properties for PCI devices based on device tree data. The vulnerability is due to improper handling of memory allocation failure: if the kernel's kcalloc() function fails to allocate memory for the interrupt mapping, the function previously did not return an error, leading to a NULL pointer dereference. This can cause a kernel crash or denial of service (DoS) by triggering a NULL pointer dereference when the code attempts to access the unallocated memory. The patch corrects this by ensuring that of_pci_prop_intr_map() returns -ENOMEM upon allocation failure, preventing the NULL pointer dereference. The vulnerability is categorized under CWE-476 (NULL Pointer Dereference). The CVSS v3.1 base score is 4.7, reflecting a medium severity with the vector AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H, indicating that the attack requires local access, high attack complexity, low privileges, no user interaction, and impacts availability only. No known exploits are reported in the wild at the time of publication. The affected Linux kernel versions are identified by specific commit hashes, indicating that this is a recent fix in the kernel source code. This vulnerability primarily impacts systems running Linux kernels that have not yet incorporated this patch, especially those using device trees and PCI devices where interrupt mapping is performed via of_pci_prop_intr_map().

Potential Impact

For European organizations, the impact of CVE-2024-34030 is primarily a potential denial of service condition on Linux systems that utilize PCI devices with device tree interrupt mapping. This could lead to system instability or crashes, affecting availability of critical services. Organizations relying on Linux servers, embedded systems, or network infrastructure devices running vulnerable kernel versions may experience unexpected downtime or service interruptions. While the vulnerability does not compromise confidentiality or integrity, availability impacts can disrupt business operations, especially in sectors with high uptime requirements such as finance, telecommunications, manufacturing, and critical infrastructure. Since exploitation requires local access and has high attack complexity, remote exploitation is unlikely, reducing the risk of widespread attacks. However, insider threats or attackers with limited local access could trigger the vulnerability to cause denial of service. European organizations with Linux-based infrastructure should be aware of this vulnerability to prevent potential disruptions, particularly in environments where kernel updates are delayed or embedded devices are in use.

Mitigation Recommendations

To mitigate CVE-2024-34030, European organizations should: 1) Apply the latest Linux kernel patches that include the fix for this vulnerability as soon as they become available. Monitor kernel mailing lists and vendor advisories for updated kernel releases. 2) For embedded or specialized devices where kernel updates are less frequent, coordinate with device vendors to obtain patched firmware or kernel versions. 3) Implement strict access controls to limit local access to trusted users only, reducing the risk of exploitation by unauthorized personnel. 4) Monitor system logs and kernel messages for signs of NULL pointer dereference crashes or unexpected reboots that could indicate attempts to trigger this vulnerability. 5) Employ kernel hardening techniques such as kernel lockdown, SELinux/AppArmor policies, and secure boot to reduce the attack surface and prevent unauthorized kernel modifications. 6) In environments where immediate patching is not feasible, consider isolating vulnerable systems or limiting PCI device usage to reduce exposure. 7) Maintain an inventory of Linux kernel versions in use across the organization to identify and prioritize systems requiring updates.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-06-24T13:53:25.529Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d982ac4522896dcbe3475

Added to database: 5/21/2025, 9:08:58 AM

Last enriched: 6/29/2025, 3:42:06 PM

Last updated: 7/30/2025, 2:48:34 PM

Views: 17

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats