{"id":"CVE-2024-35947","summary":"dyndbg: fix old BUG_ON in \u003econtrol parser","details":"In the Linux kernel, the following vulnerability has been resolved:\n\ndyndbg: fix old BUG_ON in \u003econtrol parser\n\nFix a BUG_ON from 2009.  Even if it looks \"unreachable\" (I didn't\nreally look), lets make sure by removing it, doing pr_err and return\n-EINVAL instead.","modified":"2026-03-20T12:36:45.178160Z","published":"2024-05-19T11:14:49.924Z","related":["ALSA-2024:5101","ALSA-2024:5102","MGASA-2024-0263","MGASA-2024-0266","SUSE-SU-2024:2008-1","SUSE-SU-2024:2019-1","SUSE-SU-2024:2135-1","SUSE-SU-2024:2190-1","SUSE-SU-2024:2203-1","SUSE-SU-2024:2493-1","SUSE-SU-2024:2561-1","SUSE-SU-2024:2901-1","SUSE-SU-2024:2973-1","SUSE-SU-2025:20008-1","SUSE-SU-2025:20028-1","SUSE-SU-2025:20166-1","SUSE-SU-2025:20249-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/35xxx/CVE-2024-35947.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/00e7d3bea2ce7dac7bee1cf501fb071fd0ea8f6c"},{"type":"WEB","url":"https://git.kernel.org/stable/c/343081c21e56bd6690d342e2f5ae8c00183bf081"},{"type":"WEB","url":"https://git.kernel.org/stable/c/3c718bddddca9cbef177ac475b94c5c91147fb38"},{"type":"WEB","url":"https://git.kernel.org/stable/c/41d8ac238ab1cab01a8c71798d61903304f4e79b"},{"type":"WEB","url":"https://git.kernel.org/stable/c/529e1852785599160415e964ca322ee7add7aef0"},{"type":"WEB","url":"https://git.kernel.org/stable/c/a66c869b17c4c4dcf81d273b02cb0efe88e127ab"},{"type":"WEB","url":"https://git.kernel.org/stable/c/a69e1bdd777ce51061111dc419801e8a2fd241cc"},{"type":"WEB","url":"https://git.kernel.org/stable/c/ba3c118cff7bcb0fe6aa84ae1f9080d50e31c561"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00019.html"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OTB4HWU2PTVW5NEYHHLOCXDKG3PYA534/"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/35xxx/CVE-2024-35947.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-35947"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"9898abb3d23311fa227a7f46bf4e40fd2954057f"},{"fixed":"3c718bddddca9cbef177ac475b94c5c91147fb38"},{"fixed":"343081c21e56bd6690d342e2f5ae8c00183bf081"},{"fixed":"41d8ac238ab1cab01a8c71798d61903304f4e79b"},{"fixed":"ba3c118cff7bcb0fe6aa84ae1f9080d50e31c561"},{"fixed":"a66c869b17c4c4dcf81d273b02cb0efe88e127ab"},{"fixed":"a69e1bdd777ce51061111dc419801e8a2fd241cc"},{"fixed":"529e1852785599160415e964ca322ee7add7aef0"},{"fixed":"00e7d3bea2ce7dac7bee1cf501fb071fd0ea8f6c"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-35947.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}]}