CVE-2024-35883

Source
https://cve.org/CVERecord?id=CVE-2024-35883
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-35883.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-35883
Downstream
Related
Published
2024-05-19T08:34:40.035Z
Modified
2026-03-12T04:04:46.323581Z
Summary
spi: mchp-pci1xxx: Fix a possible null pointer dereference in pci1xxx_spi_probe
Details

In the Linux kernel, the following vulnerability has been resolved:

spi: mchp-pci1xxx: Fix a possible null pointer dereference in pci1xxxspiprobe

In function pci1xxxxspiprobe, there is a potential null pointer that may be caused by a failed memory allocation by the function devm_kzalloc. Hence, a null pointer check needs to be added to prevent null pointer dereferencing later in the code.

To fix this issue, spibus->spiint[iter] should be checked. The memory allocated by devm_kzalloc will be automatically released, so just directly return -ENOMEM without worrying about memory leaks.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/35xxx/CVE-2024-35883.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
1cc0cbea7167af524a7f7b2d0d2f19f7a324e807
Fixed
4b31a226097cf8cc3c9de5e855d97757fdb2bf06
Fixed
95e5d9eb26705a9a76d2ef8bcba9ee2e195d653d
Fixed
1f886a7bfb3faf4c1021e73f045538008ce7634e

Affected versions

v6.*
v6.1
v6.1-rc2
v6.1-rc3
v6.1-rc4
v6.1-rc5
v6.1-rc6
v6.1-rc7
v6.1-rc8
v6.2
v6.2-rc1
v6.2-rc2
v6.2-rc3
v6.2-rc4
v6.2-rc5
v6.2-rc6
v6.2-rc7
v6.2-rc8
v6.3
v6.3-rc1
v6.3-rc2
v6.3-rc3
v6.3-rc4
v6.3-rc5
v6.3-rc6
v6.3-rc7
v6.4
v6.4-rc1
v6.4-rc2
v6.4-rc3
v6.4-rc4
v6.4-rc5
v6.4-rc6
v6.4-rc7
v6.5
v6.5-rc1
v6.5-rc2
v6.5-rc3
v6.5-rc4
v6.5-rc5
v6.5-rc6
v6.5-rc7
v6.6
v6.6-rc1
v6.6-rc2
v6.6-rc3
v6.6-rc4
v6.6-rc5
v6.6-rc6
v6.6-rc7
v6.6.1
v6.6.10
v6.6.11
v6.6.12
v6.6.13
v6.6.14
v6.6.15
v6.6.16
v6.6.17
v6.6.18
v6.6.19
v6.6.2
v6.6.20
v6.6.21
v6.6.22
v6.6.23
v6.6.24
v6.6.25
v6.6.3
v6.6.4
v6.6.5
v6.6.6
v6.6.7
v6.6.8
v6.6.9
v6.7
v6.7-rc1
v6.7-rc2
v6.7-rc3
v6.7-rc4
v6.7-rc5
v6.7-rc6
v6.7-rc7
v6.7-rc8
v6.8
v6.8-rc1
v6.8-rc2
v6.8-rc3
v6.8-rc4
v6.8-rc5
v6.8-rc6
v6.8-rc7
v6.8.1
v6.8.2
v6.8.3
v6.8.4
v6.9-rc1

Database specific

vanir_signatures
[
    {
        "signature_type": "Function",
        "deprecated": false,
        "id": "CVE-2024-35883-35bde5d5",
        "target": {
            "file": "drivers/spi/spi-pci1xxxx.c",
            "function": "pci1xxxx_spi_probe"
        },
        "digest": {
            "length": 2985.0,
            "function_hash": "211725272164178730282543087747349945502"
        },
        "signature_version": "v1",
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@4b31a226097cf8cc3c9de5e855d97757fdb2bf06"
    },
    {
        "signature_type": "Line",
        "deprecated": false,
        "id": "CVE-2024-35883-dd9dba32",
        "target": {
            "file": "drivers/spi/spi-pci1xxxx.c"
        },
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "308119984646425913715770066045635423759",
                "76273038767711896095824632650828606554",
                "279706289285096320680342353563951948838",
                "277568885378955769828871120622664135412"
            ]
        },
        "signature_version": "v1",
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@4b31a226097cf8cc3c9de5e855d97757fdb2bf06"
    }
]
source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-35883.json"