CVE-2024-35984: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: i2c: smbus: fix NULL function pointer dereference Baruch reported an OOPS when using the designware controller as target only. Target-only modes break the assumption of one transfer function always being available. Fix this by always checking the pointer in __i2c_transfer. [wsa: dropped the simplification in core-smbus to avoid theoretical regressions]
AI Analysis
Technical Summary
CVE-2024-35984 is a vulnerability identified in the Linux kernel specifically related to the I2C subsystem's SMBus implementation. The issue arises from a NULL function pointer dereference in the __i2c_transfer function when operating in target-only mode on the designware I2C controller. In this mode, the assumption that a transfer function pointer is always available is broken, leading to a potential kernel OOPS (crash) due to dereferencing a NULL pointer. The vulnerability was reported by a researcher named Baruch and involves the Linux kernel's handling of SMBus transfers when the designware controller is configured as a target-only device. The fix involves adding a check to ensure the function pointer is not NULL before dereferencing it, thereby preventing the kernel crash. Additionally, a simplification in the core-smbus code was dropped to avoid theoretical regressions. This vulnerability affects Linux kernel versions containing the specified commit hashes prior to the fix. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet. The vulnerability primarily impacts the stability and availability of systems running affected Linux kernels with the designware I2C controller in target-only mode, potentially causing denial of service through kernel crashes.
Potential Impact
For European organizations, the impact of CVE-2024-35984 centers on system availability and reliability. Systems running Linux kernels with the vulnerable designware I2C controller configuration could experience kernel crashes leading to service interruptions or downtime. This is particularly relevant for embedded systems, industrial control systems, IoT devices, and specialized hardware platforms that rely on Linux and use the designware I2C controller in target-only mode. Such systems are common in manufacturing, telecommunications, and critical infrastructure sectors across Europe. While the vulnerability does not appear to allow privilege escalation or data compromise directly, repeated kernel crashes could disrupt operations, cause data loss due to improper shutdowns, and increase maintenance costs. The lack of known exploits reduces immediate risk, but unpatched systems remain vulnerable to accidental or malicious triggering of the flaw, potentially impacting service continuity.
Mitigation Recommendations
European organizations should prioritize updating their Linux kernel to the latest patched versions that include the fix for CVE-2024-35984. Specifically, kernel maintainers and system administrators should verify if their systems use the designware I2C controller in target-only mode and ensure the kernel version includes the pointer check in __i2c_transfer. For embedded and IoT devices where kernel updates may be less frequent, vendors should be contacted to provide updated firmware or kernel patches. Additionally, organizations should implement monitoring for kernel OOPS or crashes related to I2C operations to detect potential exploitation attempts or accidental triggers. Where feasible, disabling or reconfiguring the designware I2C controller to avoid target-only mode can serve as a temporary mitigation. Finally, thorough testing of kernel updates in controlled environments is recommended to avoid regressions, especially given the dropped simplification in core-smbus code to prevent theoretical regressions.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Sweden, Finland, Poland
CVE-2024-35984: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: i2c: smbus: fix NULL function pointer dereference Baruch reported an OOPS when using the designware controller as target only. Target-only modes break the assumption of one transfer function always being available. Fix this by always checking the pointer in __i2c_transfer. [wsa: dropped the simplification in core-smbus to avoid theoretical regressions]
AI-Powered Analysis
Technical Analysis
CVE-2024-35984 is a vulnerability identified in the Linux kernel specifically related to the I2C subsystem's SMBus implementation. The issue arises from a NULL function pointer dereference in the __i2c_transfer function when operating in target-only mode on the designware I2C controller. In this mode, the assumption that a transfer function pointer is always available is broken, leading to a potential kernel OOPS (crash) due to dereferencing a NULL pointer. The vulnerability was reported by a researcher named Baruch and involves the Linux kernel's handling of SMBus transfers when the designware controller is configured as a target-only device. The fix involves adding a check to ensure the function pointer is not NULL before dereferencing it, thereby preventing the kernel crash. Additionally, a simplification in the core-smbus code was dropped to avoid theoretical regressions. This vulnerability affects Linux kernel versions containing the specified commit hashes prior to the fix. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet. The vulnerability primarily impacts the stability and availability of systems running affected Linux kernels with the designware I2C controller in target-only mode, potentially causing denial of service through kernel crashes.
Potential Impact
For European organizations, the impact of CVE-2024-35984 centers on system availability and reliability. Systems running Linux kernels with the vulnerable designware I2C controller configuration could experience kernel crashes leading to service interruptions or downtime. This is particularly relevant for embedded systems, industrial control systems, IoT devices, and specialized hardware platforms that rely on Linux and use the designware I2C controller in target-only mode. Such systems are common in manufacturing, telecommunications, and critical infrastructure sectors across Europe. While the vulnerability does not appear to allow privilege escalation or data compromise directly, repeated kernel crashes could disrupt operations, cause data loss due to improper shutdowns, and increase maintenance costs. The lack of known exploits reduces immediate risk, but unpatched systems remain vulnerable to accidental or malicious triggering of the flaw, potentially impacting service continuity.
Mitigation Recommendations
European organizations should prioritize updating their Linux kernel to the latest patched versions that include the fix for CVE-2024-35984. Specifically, kernel maintainers and system administrators should verify if their systems use the designware I2C controller in target-only mode and ensure the kernel version includes the pointer check in __i2c_transfer. For embedded and IoT devices where kernel updates may be less frequent, vendors should be contacted to provide updated firmware or kernel patches. Additionally, organizations should implement monitoring for kernel OOPS or crashes related to I2C operations to detect potential exploitation attempts or accidental triggers. Where feasible, disabling or reconfiguring the designware I2C controller to avoid target-only mode can serve as a temporary mitigation. Finally, thorough testing of kernel updates in controlled environments is recommended to avoid regressions, especially given the dropped simplification in core-smbus code to prevent theoretical regressions.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-05-17T13:50:33.145Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9828c4522896dcbe2383
Added to database: 5/21/2025, 9:08:56 AM
Last enriched: 6/29/2025, 8:56:17 AM
Last updated: 8/2/2025, 1:44:36 PM
Views: 18
Related Threats
CVE-2025-8982: SQL Injection in itsourcecode Online Tour and Travel Management System
MediumCVE-2025-8981: SQL Injection in itsourcecode Online Tour and Travel Management System
MediumCVE-2025-50862: n/a
MediumCVE-2025-50861: n/a
HighCVE-2025-8978: Insufficient Verification of Data Authenticity in D-Link DIR-619L
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.