← Voltar para CVEs
CVE-2024-35984
MEDIUM5.5
Descricao
In the Linux kernel, the following vulnerability has been resolved: i2c: smbus: fix NULL function pointer dereference Baruch reported an OOPS when using the designware controller as target only. Target-only modes break the assumption of one transfer function always being available. Fix this by always checking the pointer in __i2c_transfer. [wsa: dropped the simplification in core-smbus to avoid theoretical regressions]
Detalhes CVE
Pontuacao CVSS v3.15.5
SeveridadeMEDIUM
Vetor CVSSCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Vetor de ataqueLOCAL
ComplexidadeLOW
Privilegios necessariosLOW
Interacao do usuarioNONE
Publicado5/20/2024
Ultima modificacao11/21/2024
Fontenvd
Avistamentos honeypot0
Produtos afetados
linux:linux_kernel
Fraquezas (CWE)
CWE-476
Referencias
https://git.kernel.org/stable/c/357c64ef1ef39b1e7cd91ab6bdd304d043702c83(416baaa9-dc9f-4396-8d5f-8c081fb06d67)
https://git.kernel.org/stable/c/40f1d79f07b49c8a64a861706e5163f2db4bd95d(416baaa9-dc9f-4396-8d5f-8c081fb06d67)
https://git.kernel.org/stable/c/4e75e222d397c6752b229ed72fc4644c8c36ecde(416baaa9-dc9f-4396-8d5f-8c081fb06d67)
https://git.kernel.org/stable/c/5a09eae9a7db597fe0c1fc91636205b4a25d2620(416baaa9-dc9f-4396-8d5f-8c081fb06d67)
https://git.kernel.org/stable/c/5fd72404587d7db4acb2d241fd8c387afb0a7aec(416baaa9-dc9f-4396-8d5f-8c081fb06d67)
https://git.kernel.org/stable/c/91811a31b68d3765b3065f4bb6d7d6d84a7cfc9f(416baaa9-dc9f-4396-8d5f-8c081fb06d67)
https://git.kernel.org/stable/c/ad3c3ac7a03be3697114f781193dd3e9d97e6e23(416baaa9-dc9f-4396-8d5f-8c081fb06d67)
https://git.kernel.org/stable/c/e3425674ff68dc521c57c6eabad0cbd20a027d85(416baaa9-dc9f-4396-8d5f-8c081fb06d67)
https://git.kernel.org/stable/c/357c64ef1ef39b1e7cd91ab6bdd304d043702c83(af854a3a-2127-422b-91ae-364da2661108)
https://git.kernel.org/stable/c/40f1d79f07b49c8a64a861706e5163f2db4bd95d(af854a3a-2127-422b-91ae-364da2661108)
https://git.kernel.org/stable/c/4e75e222d397c6752b229ed72fc4644c8c36ecde(af854a3a-2127-422b-91ae-364da2661108)
https://git.kernel.org/stable/c/5a09eae9a7db597fe0c1fc91636205b4a25d2620(af854a3a-2127-422b-91ae-364da2661108)
https://git.kernel.org/stable/c/5fd72404587d7db4acb2d241fd8c387afb0a7aec(af854a3a-2127-422b-91ae-364da2661108)
https://git.kernel.org/stable/c/91811a31b68d3765b3065f4bb6d7d6d84a7cfc9f(af854a3a-2127-422b-91ae-364da2661108)
https://git.kernel.org/stable/c/ad3c3ac7a03be3697114f781193dd3e9d97e6e23(af854a3a-2127-422b-91ae-364da2661108)
https://git.kernel.org/stable/c/e3425674ff68dc521c57c6eabad0cbd20a027d85(af854a3a-2127-422b-91ae-364da2661108)
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html(af854a3a-2127-422b-91ae-364da2661108)
https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html(af854a3a-2127-422b-91ae-364da2661108)
Correlacoes IOC
Sem correlacoes registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.