Skip to main content

CVE-2024-35848: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2024-35848cvecve-2024-35848
Published: Fri May 17 2024 (05/17/2024, 14:47:26 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: eeprom: at24: fix memory corruption race condition If the eeprom is not accessible, an nvmem device will be registered, the read will fail, and the device will be torn down. If another driver accesses the nvmem device after the teardown, it will reference invalid memory. Move the failure point before registering the nvmem device.

AI-Powered Analysis

AILast updated: 06/29/2025, 16:28:45 UTC

Technical Analysis

CVE-2024-35848 is a vulnerability identified in the Linux kernel's EEPROM driver subsystem, specifically within the at24 EEPROM driver. The issue arises from a race condition that leads to memory corruption. When the EEPROM device is inaccessible, the kernel registers a non-volatile memory (nvmem) device. If the read operation on this nvmem device fails, the device is torn down. However, if another driver attempts to access the nvmem device after it has been torn down, it ends up referencing invalid memory, which can lead to memory corruption. The root cause is the improper ordering of failure handling; the failure point occurs after the nvmem device registration rather than before it. The fix involves moving the failure detection before the registration of the nvmem device to prevent invalid memory references. This vulnerability affects Linux kernel versions identified by the commit hash b20eb4c1f0261eebe6e1b9221c0d6e4048837778 and possibly others in the same range. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet. The vulnerability is technical and low-level, impacting kernel memory management related to EEPROM device handling.

Potential Impact

For European organizations, the impact of CVE-2024-35848 depends largely on the deployment of affected Linux kernel versions and the use of hardware relying on the at24 EEPROM driver. The vulnerability could lead to memory corruption within the kernel, potentially causing system instability, crashes, or denial of service. In worst-case scenarios, memory corruption could be leveraged by an attacker with local access to escalate privileges or execute arbitrary code within the kernel context, although this would require specific conditions and local access. Systems running embedded Linux or specialized hardware that uses the at24 EEPROM driver are more at risk. Given the Linux kernel's widespread use across servers, desktops, and embedded devices in Europe, organizations using affected kernels without patches could face operational disruptions. However, since no known exploits are reported and exploitation requires specific conditions, the immediate risk is moderate. Critical infrastructure or industries relying on embedded Linux systems (e.g., telecommunications, manufacturing, automotive) may be more sensitive to this vulnerability due to potential downtime or security breaches.

Mitigation Recommendations

European organizations should prioritize updating their Linux kernel to the latest patched versions that include the fix for CVE-2024-35848. Specifically, kernel maintainers and system administrators should apply the patch that moves the failure detection before the nvmem device registration in the at24 EEPROM driver. For embedded systems or devices where kernel updates are more complex, vendors should be contacted for firmware updates or mitigations. Additionally, organizations should audit their systems to identify devices using the at24 EEPROM driver and assess exposure. Implementing strict access controls to limit local user access can reduce the risk of exploitation. Monitoring kernel logs for unusual memory access errors or device teardown events related to nvmem devices can help detect potential exploitation attempts. Finally, organizations should integrate this vulnerability into their patch management and vulnerability scanning processes to ensure timely remediation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-05-17T13:50:33.105Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d982ac4522896dcbe363d

Added to database: 5/21/2025, 9:08:58 AM

Last enriched: 6/29/2025, 4:28:45 PM

Last updated: 7/28/2025, 7:03:15 PM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats