CVE-2024-35878

Source
https://cve.org/CVERecord?id=CVE-2024-35878
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-35878.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-35878
Downstream
Related
Published
2024-05-19T08:34:35.622Z
Modified
2026-03-20T12:36:42.828190Z
Severity
  • 5.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L CVSS Calculator
Summary
of: module: prevent NULL pointer dereference in vsnprintf()
Details

In the Linux kernel, the following vulnerability has been resolved:

of: module: prevent NULL pointer dereference in vsnprintf()

In ofmodalias(), we can get passed the str and len parameters which would cause a kernel oops in vsnprintf() since it only allows passing a NULL ptr when the length is also 0. Also, we need to filter out the negative values of the len parameter as these will result in a really huge buffer since snprintf() takes sizet parameter while ours is ssize_t...

Found by Linux Verification Center (linuxtesting.org) with the Svace static analysis tool.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/35xxx/CVE-2024-35878.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
bd7a7ed774afd1a4174df34227626c95573be517
Fixed
e4a449368a2ce6d57a775d0ead27fc07f5a86e5b
Fixed
544561dc56f7e69a053c25e11e6170f48bb97898
Fixed
a1aa5390cc912934fee76ce80af5f940452fa987

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-35878.json"