CVE-2024-34030: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: PCI: of_property: Return error for int_map allocation failure Return -ENOMEM from of_pci_prop_intr_map() if kcalloc() fails to prevent a NULL pointer dereference in this case. [bhelgaas: commit log]
AI Analysis
Technical Summary
CVE-2024-34030 is a medium-severity vulnerability identified in the Linux kernel, specifically within the PCI subsystem's device tree property handling code. The flaw arises in the function of_pci_prop_intr_map(), which is responsible for mapping interrupt properties for PCI devices based on device tree data. The vulnerability is due to improper handling of memory allocation failure: if the kernel's kcalloc() function fails to allocate memory for the interrupt mapping, the function previously did not return an error, leading to a NULL pointer dereference. This can cause a kernel crash or denial of service (DoS) by triggering a NULL pointer dereference when the code attempts to access the unallocated memory. The patch corrects this by ensuring that of_pci_prop_intr_map() returns -ENOMEM upon allocation failure, preventing the NULL pointer dereference. The vulnerability is categorized under CWE-476 (NULL Pointer Dereference). The CVSS v3.1 base score is 4.7, reflecting a medium severity with the vector AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H, indicating that the attack requires local access, high attack complexity, low privileges, no user interaction, and impacts availability only. No known exploits are reported in the wild at the time of publication. The affected Linux kernel versions are identified by specific commit hashes, indicating that this is a recent fix in the kernel source code. This vulnerability primarily impacts systems running Linux kernels that have not yet incorporated this patch, especially those using device trees and PCI devices where interrupt mapping is performed via of_pci_prop_intr_map().
Potential Impact
For European organizations, the impact of CVE-2024-34030 is primarily a potential denial of service condition on Linux systems that utilize PCI devices with device tree interrupt mapping. This could lead to system instability or crashes, affecting availability of critical services. Organizations relying on Linux servers, embedded systems, or network infrastructure devices running vulnerable kernel versions may experience unexpected downtime or service interruptions. While the vulnerability does not compromise confidentiality or integrity, availability impacts can disrupt business operations, especially in sectors with high uptime requirements such as finance, telecommunications, manufacturing, and critical infrastructure. Since exploitation requires local access and has high attack complexity, remote exploitation is unlikely, reducing the risk of widespread attacks. However, insider threats or attackers with limited local access could trigger the vulnerability to cause denial of service. European organizations with Linux-based infrastructure should be aware of this vulnerability to prevent potential disruptions, particularly in environments where kernel updates are delayed or embedded devices are in use.
Mitigation Recommendations
To mitigate CVE-2024-34030, European organizations should: 1) Apply the latest Linux kernel patches that include the fix for this vulnerability as soon as they become available. Monitor kernel mailing lists and vendor advisories for updated kernel releases. 2) For embedded or specialized devices where kernel updates are less frequent, coordinate with device vendors to obtain patched firmware or kernel versions. 3) Implement strict access controls to limit local access to trusted users only, reducing the risk of exploitation by unauthorized personnel. 4) Monitor system logs and kernel messages for signs of NULL pointer dereference crashes or unexpected reboots that could indicate attempts to trigger this vulnerability. 5) Employ kernel hardening techniques such as kernel lockdown, SELinux/AppArmor policies, and secure boot to reduce the attack surface and prevent unauthorized kernel modifications. 6) In environments where immediate patching is not feasible, consider isolating vulnerable systems or limiting PCI device usage to reduce exposure. 7) Maintain an inventory of Linux kernel versions in use across the organization to identify and prioritize systems requiring updates.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden, Belgium, Finland
CVE-2024-34030: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: PCI: of_property: Return error for int_map allocation failure Return -ENOMEM from of_pci_prop_intr_map() if kcalloc() fails to prevent a NULL pointer dereference in this case. [bhelgaas: commit log]
AI-Powered Analysis
Technical Analysis
CVE-2024-34030 is a medium-severity vulnerability identified in the Linux kernel, specifically within the PCI subsystem's device tree property handling code. The flaw arises in the function of_pci_prop_intr_map(), which is responsible for mapping interrupt properties for PCI devices based on device tree data. The vulnerability is due to improper handling of memory allocation failure: if the kernel's kcalloc() function fails to allocate memory for the interrupt mapping, the function previously did not return an error, leading to a NULL pointer dereference. This can cause a kernel crash or denial of service (DoS) by triggering a NULL pointer dereference when the code attempts to access the unallocated memory. The patch corrects this by ensuring that of_pci_prop_intr_map() returns -ENOMEM upon allocation failure, preventing the NULL pointer dereference. The vulnerability is categorized under CWE-476 (NULL Pointer Dereference). The CVSS v3.1 base score is 4.7, reflecting a medium severity with the vector AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H, indicating that the attack requires local access, high attack complexity, low privileges, no user interaction, and impacts availability only. No known exploits are reported in the wild at the time of publication. The affected Linux kernel versions are identified by specific commit hashes, indicating that this is a recent fix in the kernel source code. This vulnerability primarily impacts systems running Linux kernels that have not yet incorporated this patch, especially those using device trees and PCI devices where interrupt mapping is performed via of_pci_prop_intr_map().
Potential Impact
For European organizations, the impact of CVE-2024-34030 is primarily a potential denial of service condition on Linux systems that utilize PCI devices with device tree interrupt mapping. This could lead to system instability or crashes, affecting availability of critical services. Organizations relying on Linux servers, embedded systems, or network infrastructure devices running vulnerable kernel versions may experience unexpected downtime or service interruptions. While the vulnerability does not compromise confidentiality or integrity, availability impacts can disrupt business operations, especially in sectors with high uptime requirements such as finance, telecommunications, manufacturing, and critical infrastructure. Since exploitation requires local access and has high attack complexity, remote exploitation is unlikely, reducing the risk of widespread attacks. However, insider threats or attackers with limited local access could trigger the vulnerability to cause denial of service. European organizations with Linux-based infrastructure should be aware of this vulnerability to prevent potential disruptions, particularly in environments where kernel updates are delayed or embedded devices are in use.
Mitigation Recommendations
To mitigate CVE-2024-34030, European organizations should: 1) Apply the latest Linux kernel patches that include the fix for this vulnerability as soon as they become available. Monitor kernel mailing lists and vendor advisories for updated kernel releases. 2) For embedded or specialized devices where kernel updates are less frequent, coordinate with device vendors to obtain patched firmware or kernel versions. 3) Implement strict access controls to limit local access to trusted users only, reducing the risk of exploitation by unauthorized personnel. 4) Monitor system logs and kernel messages for signs of NULL pointer dereference crashes or unexpected reboots that could indicate attempts to trigger this vulnerability. 5) Employ kernel hardening techniques such as kernel lockdown, SELinux/AppArmor policies, and secure boot to reduce the attack surface and prevent unauthorized kernel modifications. 6) In environments where immediate patching is not feasible, consider isolating vulnerable systems or limiting PCI device usage to reduce exposure. 7) Maintain an inventory of Linux kernel versions in use across the organization to identify and prioritize systems requiring updates.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-06-24T13:53:25.529Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d982ac4522896dcbe3475
Added to database: 5/21/2025, 9:08:58 AM
Last enriched: 6/29/2025, 3:42:06 PM
Last updated: 7/30/2025, 2:48:34 PM
Views: 17
Related Threats
CVE-2025-9060: CWE-20 Improper Input Validation in MSoft MFlash
CriticalCVE-2025-8675: CWE-918 Server-Side Request Forgery (SSRF) in Drupal AI SEO Link Advisor
MediumCVE-2025-8362: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Drupal GoogleTag Manager
MediumCVE-2025-8361: CWE-962 Missing Authorization in Drupal Config Pages
HighCVE-2025-8092: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Drupal COOKiES Consent Management
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.