Skip to main content

CVE-2024-35792: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2024-35792cvecve-2024-35792
Published: Fri May 17 2024 (05/17/2024, 12:24:53 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: crypto: rk3288 - Fix use after free in unprepare The unprepare call must be carried out before the finalize call as the latter can free the request.

AI-Powered Analysis

AILast updated: 06/29/2025, 15:56:12 UTC

Technical Analysis

CVE-2024-35792 is a vulnerability identified in the Linux kernel's cryptographic subsystem, specifically related to the rk3288 hardware platform. The issue arises from improper handling of request lifecycle functions within the crypto driver. The vulnerability is a use-after-free condition triggered when the 'finalize' call is executed before the 'unprepare' call. According to the fix, the 'unprepare' function must be called prior to 'finalize' because the latter can free the request object. If the sequence is incorrect, subsequent operations may access memory that has already been freed, leading to undefined behavior. This can potentially cause system crashes or memory corruption. Although the vulnerability is specific to the rk3288 crypto driver, which is a component used in certain embedded systems and devices running Linux, the underlying flaw is a classic memory management error. No known exploits have been reported in the wild as of the publication date (May 17, 2024). The vulnerability does not have an assigned CVSS score yet, and no detailed exploitability metrics are available. The fix involves correcting the order of function calls to ensure that resources are properly managed and freed only after all necessary operations are completed.

Potential Impact

For European organizations, the impact of CVE-2024-35792 depends largely on the deployment of Linux systems utilizing the rk3288 crypto driver. This hardware platform is commonly found in embedded systems, such as industrial control devices, IoT gateways, and specialized networking equipment. If exploited, the use-after-free vulnerability could lead to denial of service (system crashes) or potentially allow an attacker to execute arbitrary code with kernel privileges, depending on the context and additional conditions. This could compromise the confidentiality, integrity, and availability of affected systems. Critical infrastructure sectors in Europe that rely on embedded Linux devices, such as manufacturing, energy, and telecommunications, may be at risk if these devices incorporate the vulnerable driver. However, since no known exploits are currently reported, the immediate risk is moderate. The vulnerability's exploitation would require local or privileged access to the device, limiting the attack surface. Nonetheless, unpatched devices could be targeted in supply chain attacks or insider threat scenarios, making timely patching important to maintain operational security.

Mitigation Recommendations

European organizations should first identify any devices or systems running Linux kernels that include the rk3288 crypto driver. This can be done through asset inventory and firmware analysis. Once identified, organizations should apply the official Linux kernel patches that correct the function call order in the crypto driver. If immediate patching is not feasible, organizations should implement compensating controls such as restricting access to affected devices, especially limiting local administrative access and network exposure. Monitoring system logs for unusual crashes or memory errors related to the crypto subsystem can help detect exploitation attempts. Additionally, organizations should engage with their hardware vendors to obtain updated firmware or kernel versions that include the fix. For embedded and IoT devices, a secure update mechanism is critical to deploy patches promptly. Finally, security teams should incorporate this vulnerability into their risk assessments and incident response plans, ensuring readiness to respond if exploitation attempts arise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-05-17T12:19:12.339Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d982ac4522896dcbe34ca

Added to database: 5/21/2025, 9:08:58 AM

Last enriched: 6/29/2025, 3:56:12 PM

Last updated: 8/13/2025, 12:05:29 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats