CVE-2024-35848
low-risk
Published 2024-05-17
In the Linux kernel, the following vulnerability has been resolved: eeprom: at24: fix memory corruption race condition If the eeprom is not accessible, an nvmem device will be registered, the read will fail, and the device will be torn down. If another driver accesses the nvmem device after the teardown, it will reference invalid memory. Move the failure point before registering the nvmem device.
Do I need to act?
-
0.02% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
4
CVSS 4.7/10
Medium
LOCAL
/ HIGH complexity
Affected Products (7)
References (13)
Third Party Advisory
https://lists.debian.org/debian-lts-announce/2024/06/msg00019.html
26
/ 100
low-risk
Severity
12/34 · Low
Exploitability
0/34 · Minimal
Exposure
14/34 · Moderate