Skip to main content

CVE-2024-35836: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2024-35836cvecve-2024-35836
Published: Fri May 17 2024 (05/17/2024, 14:02:27 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: dpll: fix pin dump crash for rebound module When a kernel module is unbound but the pin resources were not entirely freed (other kernel module instance of the same PCI device have had kept the reference to that pin), and kernel module is again bound, the pin properties would not be updated (the properties are only assigned when memory for the pin is allocated), prop pointer still points to the kernel module memory of the kernel module which was deallocated on the unbind. If the pin dump is invoked in this state, the result is a kernel crash. Prevent the crash by storing persistent pin properties in dpll subsystem, copy the content from the kernel module when pin is allocated, instead of using memory of the kernel module.

AI-Powered Analysis

AILast updated: 06/29/2025, 16:26:07 UTC

Technical Analysis

CVE-2024-35836 is a vulnerability identified in the Linux kernel's dpll (Display Phase-Locked Loop) subsystem related to the handling of pin resources when kernel modules are rebound. Specifically, the issue arises when a kernel module is unbound but the pin resources it used are not fully freed because other kernel module instances referencing the same PCI device still hold references to those pins. Upon rebinding the kernel module, the pin properties are not updated correctly because these properties are only assigned when memory for the pin is initially allocated. Consequently, the pointer to the pin properties continues to reference memory that belonged to the previously unbound kernel module, which has since been deallocated. If a pin dump operation is invoked while the system is in this inconsistent state, it results in a kernel crash due to dereferencing invalid memory. The fix implemented involves storing persistent pin properties within the dpll subsystem itself, copying the pin property content from the kernel module at allocation time rather than relying on the kernel module's memory. This change ensures that pin properties remain valid and consistent even when kernel modules are rebound, preventing the crash scenario.

Potential Impact

For European organizations, this vulnerability poses a risk primarily in environments running Linux kernels with affected versions, especially those utilizing PCI devices managed by the dpll subsystem. The kernel crash caused by this vulnerability can lead to system instability and denial of service (DoS) conditions, which may disrupt critical services, particularly in data centers, cloud infrastructure, and embedded systems relying on Linux. While this vulnerability does not appear to allow privilege escalation or arbitrary code execution, the resulting kernel panic can cause downtime and potential data loss if systems are not properly configured for resilience. Industries such as telecommunications, manufacturing, and financial services in Europe that depend heavily on Linux-based infrastructure could experience operational impacts. Additionally, the lack of known exploits in the wild reduces immediate risk but does not eliminate the potential for future exploitation attempts, especially in targeted attacks or sophisticated threat actor campaigns.

Mitigation Recommendations

European organizations should prioritize updating their Linux kernel to the patched version that addresses CVE-2024-35836 as soon as it becomes available from their Linux distribution vendors. Since the vulnerability involves kernel module rebinding and pin resource management, system administrators should audit and monitor kernel module usage, particularly for PCI devices managed by the dpll subsystem. Implementing robust system monitoring to detect kernel crashes and unusual pin dump invocations can help identify exploitation attempts. For critical systems, consider deploying kernel live patching solutions where available to minimize downtime during patch application. Additionally, organizations should ensure that backup and recovery procedures are in place to mitigate the impact of potential system crashes. Network segmentation and limiting access to systems that perform pin dump operations can reduce the attack surface. Finally, maintain vigilance on security advisories from Linux kernel maintainers and relevant distribution vendors for updates and further guidance.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-05-17T13:50:33.103Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d982ac4522896dcbe35dc

Added to database: 5/21/2025, 9:08:58 AM

Last enriched: 6/29/2025, 4:26:07 PM

Last updated: 7/28/2025, 2:26:44 PM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats