CVE-2024-35796: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: net: ll_temac: platform_get_resource replaced by wrong function The function platform_get_resource was replaced with devm_platform_ioremap_resource_byname and is called using 0 as name. This eventually ends up in platform_get_resource_byname in the call stack, where it causes a null pointer in strcmp. if (type == resource_type(r) && !strcmp(r->name, name)) It should have been replaced with devm_platform_ioremap_resource.
AI Analysis
Technical Summary
CVE-2024-35796 is a medium-severity vulnerability identified in the Linux kernel, specifically within the network driver component ll_temac. The root cause is a coding error where the function platform_get_resource was incorrectly replaced by devm_platform_ioremap_resource_byname and invoked with a null (0) name parameter. This leads to a null pointer dereference in the strcmp function during the resource lookup process in platform_get_resource_byname. The vulnerable code attempts to compare the resource name with a null pointer, causing a kernel crash (denial of service) due to the null pointer dereference. The issue arises from improper handling of resource mapping functions in the platform device driver code. The affected Linux kernel versions include specific commits identified by their hashes, indicating the vulnerability exists in certain recent or development versions of the kernel. The CVSS 3.1 base score is 5.5 (medium), with the vector AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H, meaning the attack requires local access with low complexity and low privileges, no user interaction, and results in an availability impact only (kernel crash). There is no indication of confidentiality or integrity compromise. No known exploits in the wild have been reported so far. The vulnerability can cause denial of service by crashing the kernel, which could disrupt network services or system stability on affected Linux systems running the vulnerable kernel versions. This is primarily a stability and availability issue rather than a direct code execution or privilege escalation vulnerability.
Potential Impact
For European organizations, the impact of CVE-2024-35796 is primarily related to system availability and stability. Organizations relying on Linux-based systems, especially those using network drivers that include the ll_temac component (commonly found in embedded or specialized network hardware), may experience unexpected kernel crashes leading to service interruptions. This can affect critical infrastructure, telecommunications, industrial control systems, or data centers that utilize Linux kernels with the affected versions. Although the vulnerability does not allow data theft or system takeover, denial of service conditions can cause operational disruptions, potentially impacting business continuity and service level agreements. In sectors such as finance, healthcare, and public administration, even short outages can have significant repercussions. The requirement for local access and low privileges to trigger the vulnerability means that insider threats or attackers with some foothold on the system could exploit this to cause disruption. However, remote exploitation is not feasible, limiting the attack surface to internal users or processes.
Mitigation Recommendations
To mitigate CVE-2024-35796, European organizations should: 1) Apply the official Linux kernel patches that correct the improper function replacement and prevent null pointer dereference. Monitor kernel updates from trusted sources and deploy them promptly. 2) Identify and inventory systems running the affected kernel versions, especially those using the ll_temac network driver or similar platform device drivers. 3) Limit local access to critical Linux systems by enforcing strict access controls, minimizing the number of users with local login privileges, and using multi-factor authentication where possible. 4) Implement monitoring and alerting for kernel crashes or unusual system reboots that may indicate exploitation attempts. 5) For embedded or specialized devices that cannot be easily updated, consider isolating them in network segments with restricted access to reduce risk. 6) Conduct security awareness training for administrators and users about the risks of local exploits and the importance of applying patches. 7) Review and harden system configurations to reduce the attack surface, such as disabling unnecessary drivers or services that may invoke the vulnerable code path.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain
CVE-2024-35796: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: net: ll_temac: platform_get_resource replaced by wrong function The function platform_get_resource was replaced with devm_platform_ioremap_resource_byname and is called using 0 as name. This eventually ends up in platform_get_resource_byname in the call stack, where it causes a null pointer in strcmp. if (type == resource_type(r) && !strcmp(r->name, name)) It should have been replaced with devm_platform_ioremap_resource.
AI-Powered Analysis
Technical Analysis
CVE-2024-35796 is a medium-severity vulnerability identified in the Linux kernel, specifically within the network driver component ll_temac. The root cause is a coding error where the function platform_get_resource was incorrectly replaced by devm_platform_ioremap_resource_byname and invoked with a null (0) name parameter. This leads to a null pointer dereference in the strcmp function during the resource lookup process in platform_get_resource_byname. The vulnerable code attempts to compare the resource name with a null pointer, causing a kernel crash (denial of service) due to the null pointer dereference. The issue arises from improper handling of resource mapping functions in the platform device driver code. The affected Linux kernel versions include specific commits identified by their hashes, indicating the vulnerability exists in certain recent or development versions of the kernel. The CVSS 3.1 base score is 5.5 (medium), with the vector AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H, meaning the attack requires local access with low complexity and low privileges, no user interaction, and results in an availability impact only (kernel crash). There is no indication of confidentiality or integrity compromise. No known exploits in the wild have been reported so far. The vulnerability can cause denial of service by crashing the kernel, which could disrupt network services or system stability on affected Linux systems running the vulnerable kernel versions. This is primarily a stability and availability issue rather than a direct code execution or privilege escalation vulnerability.
Potential Impact
For European organizations, the impact of CVE-2024-35796 is primarily related to system availability and stability. Organizations relying on Linux-based systems, especially those using network drivers that include the ll_temac component (commonly found in embedded or specialized network hardware), may experience unexpected kernel crashes leading to service interruptions. This can affect critical infrastructure, telecommunications, industrial control systems, or data centers that utilize Linux kernels with the affected versions. Although the vulnerability does not allow data theft or system takeover, denial of service conditions can cause operational disruptions, potentially impacting business continuity and service level agreements. In sectors such as finance, healthcare, and public administration, even short outages can have significant repercussions. The requirement for local access and low privileges to trigger the vulnerability means that insider threats or attackers with some foothold on the system could exploit this to cause disruption. However, remote exploitation is not feasible, limiting the attack surface to internal users or processes.
Mitigation Recommendations
To mitigate CVE-2024-35796, European organizations should: 1) Apply the official Linux kernel patches that correct the improper function replacement and prevent null pointer dereference. Monitor kernel updates from trusted sources and deploy them promptly. 2) Identify and inventory systems running the affected kernel versions, especially those using the ll_temac network driver or similar platform device drivers. 3) Limit local access to critical Linux systems by enforcing strict access controls, minimizing the number of users with local login privileges, and using multi-factor authentication where possible. 4) Implement monitoring and alerting for kernel crashes or unusual system reboots that may indicate exploitation attempts. 5) For embedded or specialized devices that cannot be easily updated, consider isolating them in network segments with restricted access to reduce risk. 6) Conduct security awareness training for administrators and users about the risks of local exploits and the importance of applying patches. 7) Review and harden system configurations to reduce the attack surface, such as disabling unnecessary drivers or services that may invoke the vulnerable code path.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-05-17T12:19:12.339Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9821c4522896dcbddc38
Added to database: 5/21/2025, 9:08:49 AM
Last enriched: 6/28/2025, 3:11:49 AM
Last updated: 7/31/2025, 12:56:10 PM
Views: 12
Related Threats
CVE-2025-8878: CWE-94 Improper Control of Generation of Code ('Code Injection') in properfraction Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content – ProfilePress
MediumCVE-2025-8143: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in pencidesign Soledad
MediumCVE-2025-8142: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in pencidesign Soledad
HighCVE-2025-8105: CWE-94 Improper Control of Generation of Code ('Code Injection') in pencidesign Soledad
HighCVE-2025-8719: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in reubenthiessen Translate This gTranslate Shortcode
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.