CVE-2024-35883

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-35883
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-35883.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-35883
Downstream
Related
Published
2024-05-19T08:34:40Z
Modified
2025-10-17T03:36:11.989215Z
Summary
spi: mchp-pci1xxx: Fix a possible null pointer dereference in pci1xxx_spi_probe
Details

In the Linux kernel, the following vulnerability has been resolved:

spi: mchp-pci1xxx: Fix a possible null pointer dereference in pci1xxxspiprobe

In function pci1xxxxspiprobe, there is a potential null pointer that may be caused by a failed memory allocation by the function devm_kzalloc. Hence, a null pointer check needs to be added to prevent null pointer dereferencing later in the code.

To fix this issue, spibus->spiint[iter] should be checked. The memory allocated by devm_kzalloc will be automatically released, so just directly return -ENOMEM without worrying about memory leaks.

References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
1cc0cbea7167af524a7f7b2d0d2f19f7a324e807
Fixed
4b31a226097cf8cc3c9de5e855d97757fdb2bf06
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
1cc0cbea7167af524a7f7b2d0d2f19f7a324e807
Fixed
95e5d9eb26705a9a76d2ef8bcba9ee2e195d653d
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
1cc0cbea7167af524a7f7b2d0d2f19f7a324e807
Fixed
1f886a7bfb3faf4c1021e73f045538008ce7634e

Affected versions

v6.*

v6.1
v6.1-rc2
v6.1-rc3
v6.1-rc4
v6.1-rc5
v6.1-rc6
v6.1-rc7
v6.1-rc8
v6.2
v6.2-rc1
v6.2-rc2
v6.2-rc3
v6.2-rc4
v6.2-rc5
v6.2-rc6
v6.2-rc7
v6.2-rc8
v6.3
v6.3-rc1
v6.3-rc2
v6.3-rc3
v6.3-rc4
v6.3-rc5
v6.3-rc6
v6.3-rc7
v6.4
v6.4-rc1
v6.4-rc2
v6.4-rc3
v6.4-rc4
v6.4-rc5
v6.4-rc6
v6.4-rc7
v6.5
v6.5-rc1
v6.5-rc2
v6.5-rc3
v6.5-rc4
v6.5-rc5
v6.5-rc6
v6.5-rc7
v6.6
v6.6-rc1
v6.6-rc2
v6.6-rc3
v6.6-rc4
v6.6-rc5
v6.6-rc6
v6.6-rc7
v6.6.1
v6.6.10
v6.6.11
v6.6.12
v6.6.13
v6.6.14
v6.6.15
v6.6.16
v6.6.17
v6.6.18
v6.6.19
v6.6.2
v6.6.20
v6.6.21
v6.6.22
v6.6.23
v6.6.24
v6.6.25
v6.6.3
v6.6.4
v6.6.5
v6.6.6
v6.6.7
v6.6.8
v6.6.9
v6.7
v6.7-rc1
v6.7-rc2
v6.7-rc3
v6.7-rc4
v6.7-rc5
v6.7-rc6
v6.7-rc7
v6.7-rc8
v6.8
v6.8-rc1
v6.8-rc2
v6.8-rc3
v6.8-rc4
v6.8-rc5
v6.8-rc6
v6.8-rc7
v6.8.1
v6.8.2
v6.8.3
v6.8.4
v6.9-rc1

Database specific

vanir_signatures

[
    {
        "signature_type": "Function",
        "deprecated": false,
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@4b31a226097cf8cc3c9de5e855d97757fdb2bf06",
        "signature_version": "v1",
        "target": {
            "function": "pci1xxxx_spi_probe",
            "file": "drivers/spi/spi-pci1xxxx.c"
        },
        "digest": {
            "function_hash": "211725272164178730282543087747349945502",
            "length": 2985.0
        },
        "id": "CVE-2024-35883-35bde5d5"
    },
    {
        "signature_type": "Function",
        "deprecated": false,
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@1f886a7bfb3faf4c1021e73f045538008ce7634e",
        "signature_version": "v1",
        "target": {
            "function": "pci1xxxx_spi_probe",
            "file": "drivers/spi/spi-pci1xxxx.c"
        },
        "digest": {
            "function_hash": "70800791552645455022427733374651909137",
            "length": 3110.0
        },
        "id": "CVE-2024-35883-4ef4be77"
    },
    {
        "signature_type": "Line",
        "deprecated": false,
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@95e5d9eb26705a9a76d2ef8bcba9ee2e195d653d",
        "signature_version": "v1",
        "target": {
            "file": "drivers/spi/spi-pci1xxxx.c"
        },
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "308119984646425913715770066045635423759",
                "76273038767711896095824632650828606554",
                "279706289285096320680342353563951948838",
                "277568885378955769828871120622664135412"
            ]
        },
        "id": "CVE-2024-35883-7f3c84f9"
    },
    {
        "signature_type": "Line",
        "deprecated": false,
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@1f886a7bfb3faf4c1021e73f045538008ce7634e",
        "signature_version": "v1",
        "target": {
            "file": "drivers/spi/spi-pci1xxxx.c"
        },
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "308119984646425913715770066045635423759",
                "76273038767711896095824632650828606554",
                "279706289285096320680342353563951948838",
                "277568885378955769828871120622664135412"
            ]
        },
        "id": "CVE-2024-35883-a071c735"
    },
    {
        "signature_type": "Line",
        "deprecated": false,
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@4b31a226097cf8cc3c9de5e855d97757fdb2bf06",
        "signature_version": "v1",
        "target": {
            "file": "drivers/spi/spi-pci1xxxx.c"
        },
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "308119984646425913715770066045635423759",
                "76273038767711896095824632650828606554",
                "279706289285096320680342353563951948838",
                "277568885378955769828871120622664135412"
            ]
        },
        "id": "CVE-2024-35883-dd9dba32"
    },
    {
        "signature_type": "Function",
        "deprecated": false,
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@95e5d9eb26705a9a76d2ef8bcba9ee2e195d653d",
        "signature_version": "v1",
        "target": {
            "function": "pci1xxxx_spi_probe",
            "file": "drivers/spi/spi-pci1xxxx.c"
        },
        "digest": {
            "function_hash": "211725272164178730282543087747349945502",
            "length": 2985.0
        },
        "id": "CVE-2024-35883-e3a4445d"
    }
]

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.6.26
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.8.5