Skip to main content

CVE-2024-35984: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2024-35984cvecve-2024-35984
Published: Mon May 20 2024 (05/20/2024, 09:47:51 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: i2c: smbus: fix NULL function pointer dereference Baruch reported an OOPS when using the designware controller as target only. Target-only modes break the assumption of one transfer function always being available. Fix this by always checking the pointer in __i2c_transfer. [wsa: dropped the simplification in core-smbus to avoid theoretical regressions]

AI-Powered Analysis

AILast updated: 06/29/2025, 08:56:17 UTC

Technical Analysis

CVE-2024-35984 is a vulnerability identified in the Linux kernel specifically related to the I2C subsystem's SMBus implementation. The issue arises from a NULL function pointer dereference in the __i2c_transfer function when operating in target-only mode on the designware I2C controller. In this mode, the assumption that a transfer function pointer is always available is broken, leading to a potential kernel OOPS (crash) due to dereferencing a NULL pointer. The vulnerability was reported by a researcher named Baruch and involves the Linux kernel's handling of SMBus transfers when the designware controller is configured as a target-only device. The fix involves adding a check to ensure the function pointer is not NULL before dereferencing it, thereby preventing the kernel crash. Additionally, a simplification in the core-smbus code was dropped to avoid theoretical regressions. This vulnerability affects Linux kernel versions containing the specified commit hashes prior to the fix. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet. The vulnerability primarily impacts the stability and availability of systems running affected Linux kernels with the designware I2C controller in target-only mode, potentially causing denial of service through kernel crashes.

Potential Impact

For European organizations, the impact of CVE-2024-35984 centers on system availability and reliability. Systems running Linux kernels with the vulnerable designware I2C controller configuration could experience kernel crashes leading to service interruptions or downtime. This is particularly relevant for embedded systems, industrial control systems, IoT devices, and specialized hardware platforms that rely on Linux and use the designware I2C controller in target-only mode. Such systems are common in manufacturing, telecommunications, and critical infrastructure sectors across Europe. While the vulnerability does not appear to allow privilege escalation or data compromise directly, repeated kernel crashes could disrupt operations, cause data loss due to improper shutdowns, and increase maintenance costs. The lack of known exploits reduces immediate risk, but unpatched systems remain vulnerable to accidental or malicious triggering of the flaw, potentially impacting service continuity.

Mitigation Recommendations

European organizations should prioritize updating their Linux kernel to the latest patched versions that include the fix for CVE-2024-35984. Specifically, kernel maintainers and system administrators should verify if their systems use the designware I2C controller in target-only mode and ensure the kernel version includes the pointer check in __i2c_transfer. For embedded and IoT devices where kernel updates may be less frequent, vendors should be contacted to provide updated firmware or kernel patches. Additionally, organizations should implement monitoring for kernel OOPS or crashes related to I2C operations to detect potential exploitation attempts or accidental triggers. Where feasible, disabling or reconfiguring the designware I2C controller to avoid target-only mode can serve as a temporary mitigation. Finally, thorough testing of kernel updates in controlled environments is recommended to avoid regressions, especially given the dropped simplification in core-smbus code to prevent theoretical regressions.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-05-17T13:50:33.145Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9828c4522896dcbe2383

Added to database: 5/21/2025, 9:08:56 AM

Last enriched: 6/29/2025, 8:56:17 AM

Last updated: 8/2/2025, 1:44:36 PM

Views: 18

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats