Skip to main content

CVE-2024-35796: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2024-35796cvecve-2024-35796
Published: Fri May 17 2024 (05/17/2024, 13:23:07 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: net: ll_temac: platform_get_resource replaced by wrong function The function platform_get_resource was replaced with devm_platform_ioremap_resource_byname and is called using 0 as name. This eventually ends up in platform_get_resource_byname in the call stack, where it causes a null pointer in strcmp. if (type == resource_type(r) && !strcmp(r->name, name)) It should have been replaced with devm_platform_ioremap_resource.

AI-Powered Analysis

AILast updated: 06/28/2025, 03:11:49 UTC

Technical Analysis

CVE-2024-35796 is a medium-severity vulnerability identified in the Linux kernel, specifically within the network driver component ll_temac. The root cause is a coding error where the function platform_get_resource was incorrectly replaced by devm_platform_ioremap_resource_byname and invoked with a null (0) name parameter. This leads to a null pointer dereference in the strcmp function during the resource lookup process in platform_get_resource_byname. The vulnerable code attempts to compare the resource name with a null pointer, causing a kernel crash (denial of service) due to the null pointer dereference. The issue arises from improper handling of resource mapping functions in the platform device driver code. The affected Linux kernel versions include specific commits identified by their hashes, indicating the vulnerability exists in certain recent or development versions of the kernel. The CVSS 3.1 base score is 5.5 (medium), with the vector AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H, meaning the attack requires local access with low complexity and low privileges, no user interaction, and results in an availability impact only (kernel crash). There is no indication of confidentiality or integrity compromise. No known exploits in the wild have been reported so far. The vulnerability can cause denial of service by crashing the kernel, which could disrupt network services or system stability on affected Linux systems running the vulnerable kernel versions. This is primarily a stability and availability issue rather than a direct code execution or privilege escalation vulnerability.

Potential Impact

For European organizations, the impact of CVE-2024-35796 is primarily related to system availability and stability. Organizations relying on Linux-based systems, especially those using network drivers that include the ll_temac component (commonly found in embedded or specialized network hardware), may experience unexpected kernel crashes leading to service interruptions. This can affect critical infrastructure, telecommunications, industrial control systems, or data centers that utilize Linux kernels with the affected versions. Although the vulnerability does not allow data theft or system takeover, denial of service conditions can cause operational disruptions, potentially impacting business continuity and service level agreements. In sectors such as finance, healthcare, and public administration, even short outages can have significant repercussions. The requirement for local access and low privileges to trigger the vulnerability means that insider threats or attackers with some foothold on the system could exploit this to cause disruption. However, remote exploitation is not feasible, limiting the attack surface to internal users or processes.

Mitigation Recommendations

To mitigate CVE-2024-35796, European organizations should: 1) Apply the official Linux kernel patches that correct the improper function replacement and prevent null pointer dereference. Monitor kernel updates from trusted sources and deploy them promptly. 2) Identify and inventory systems running the affected kernel versions, especially those using the ll_temac network driver or similar platform device drivers. 3) Limit local access to critical Linux systems by enforcing strict access controls, minimizing the number of users with local login privileges, and using multi-factor authentication where possible. 4) Implement monitoring and alerting for kernel crashes or unusual system reboots that may indicate exploitation attempts. 5) For embedded or specialized devices that cannot be easily updated, consider isolating them in network segments with restricted access to reduce risk. 6) Conduct security awareness training for administrators and users about the risks of local exploits and the importance of applying patches. 7) Review and harden system configurations to reduce the attack surface, such as disabling unnecessary drivers or services that may invoke the vulnerable code path.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-05-17T12:19:12.339Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9821c4522896dcbddc38

Added to database: 5/21/2025, 9:08:49 AM

Last enriched: 6/28/2025, 3:11:49 AM

Last updated: 7/31/2025, 12:56:10 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats