Executive Summary

Informations
Name CVE-2024-35985 First vendor Publication 2024-05-20
Vendor Cve Last vendor Modification 2025-01-16

Security-Database Scoring CVSS v3

Cvss vector : CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Overall CVSS Score 5.5
Base Score 5.5 Environmental Score 5.5
impact SubScore 3.6 Temporal Score 5.5
Exploitabality Sub Score 1.8
 
Attack Vector Local Attack Complexity Low
Privileges Required Low User Interaction None
Scope Unchanged Confidentiality Impact None
Integrity Impact None Availability Impact High
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

In the Linux kernel, the following vulnerability has been resolved:

sched/eevdf: Prevent vlag from going out of bounds in reweight_eevdf()

It was possible to have pick_eevdf() return NULL, which then causes a NULL-deref. This turned out to be due to entity_eligible() returning falsely negative because of a s64 multiplcation overflow.

Specifically, reweight_eevdf() computes the vlag without considering the limit placed upon vlag as update_entity_lag() does, and then the scaling multiplication (remember that weight is 20bit fixed point) can overflow. This then leads to the new vruntime being weird which then causes the above entity_eligible() to go side-ways and claim nothing is eligible.

Thus limit the range of vlag accordingly.

All this was quite rare, but fatal when it does happen.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35985

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-476 NULL Pointer Dereference

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 8
Os 3663

Sources (Detail)

https://git.kernel.org/stable/c/06f27e6d7bf0abf54488259ef36bbf0e1fccb35c
https://git.kernel.org/stable/c/1560d1f6eb6b398bddd80c16676776c0325fe5fe
https://git.kernel.org/stable/c/470d347b14b0ecffa9b39cf8f644fa2351db3efb
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
Date Informations
2025-05-27 02:39:33
  • Multiple Updates
2025-03-29 03:36:52
  • Multiple Updates
2025-03-28 13:42:26
  • Multiple Updates
2025-03-28 03:15:43
  • Multiple Updates
2025-03-19 03:11:10
  • Multiple Updates
2025-03-18 03:24:00
  • Multiple Updates
2025-03-14 03:11:25
  • Multiple Updates
2025-03-06 14:07:49
  • Multiple Updates
2025-02-22 03:21:14
  • Multiple Updates
2025-01-16 21:21:30
  • Multiple Updates
2024-11-25 09:25:29
  • Multiple Updates
2024-05-20 17:27:24
  • First insertion