In the Linux kernel, the following vulnerability has been resolved:
eeprom: at24: fix memory corruption race condition
If the eeprom is not accessible, an nvmem device will be registered, the
read will fail, and the device will be torn down. If another driver
accesses the nvmem device after the teardown, it will reference
invalid memory.
Move the failure point before registering the nvmem device.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
23 Dec 2025, 19:33
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://git.kernel.org/stable/c/26d32bec4c6d255a03762f33c637bfa3718be15a - Patch | |
| References | () https://git.kernel.org/stable/c/2af84c46b9b8f2d6c0f88d09ee5c849ae1734676 - Patch | |
| References | () https://git.kernel.org/stable/c/6d8b56ec0c8f30d5657382f47344a32569f7a9bc - Patch | |
| References | () https://git.kernel.org/stable/c/c43e5028f5a35331eb25017f5ff6cc21735005c6 - Patch | |
| References | () https://git.kernel.org/stable/c/c850f71fca09ea41800ed55905980063d17e01da - Patch | |
| References | () https://git.kernel.org/stable/c/f42c97027fb75776e2e9358d16bf4a99aeb04cf2 - Patch | |
| References | () https://lists.debian.org/debian-lts-announce/2024/06/msg00019.html - Third Party Advisory | |
| CWE | CWE-362 | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.7 |
| CPE | cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.9:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.9:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.9:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:* |
|
| First Time |
Linux
Debian Debian debian Linux Linux linux Kernel |
21 Nov 2024, 09:21
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
|
| References | () https://git.kernel.org/stable/c/26d32bec4c6d255a03762f33c637bfa3718be15a - | |
| References | () https://git.kernel.org/stable/c/2af84c46b9b8f2d6c0f88d09ee5c849ae1734676 - | |
| References | () https://git.kernel.org/stable/c/6d8b56ec0c8f30d5657382f47344a32569f7a9bc - | |
| References | () https://git.kernel.org/stable/c/c43e5028f5a35331eb25017f5ff6cc21735005c6 - | |
| References | () https://git.kernel.org/stable/c/c850f71fca09ea41800ed55905980063d17e01da - | |
| References | () https://git.kernel.org/stable/c/f42c97027fb75776e2e9358d16bf4a99aeb04cf2 - |
05 Nov 2024, 10:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
27 Jun 2024, 14:15
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
|
| References |
|
17 May 2024, 15:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2024-05-17 15:15
Updated : 2025-12-23 19:33
NVD link : CVE-2024-35848
Mitre link : CVE-2024-35848
CVE.ORG link : CVE-2024-35848
JSON object : View
Products Affected
debian
- debian_linux
linux
- linux_kernel
CWE
CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
