CVE-2024-26593

In the Linux kernel, the following vulnerability has been resolved: i2c: i801: Fix block process call transactions According to the Intel datasheets, software must reset the block buffer index twice for block process call transactions: once before writing the outgoing data to the buffer, and once again before reading the incoming data from the buffer. The driver is currently missing the second reset, causing the wrong portion of the block buffer to be read.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

25 Jun 2024, 23:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html -

19 Apr 2024, 17:58

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.1
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CWE CWE-125
First Time Linux
Linux linux Kernel
References () https://git.kernel.org/stable/c/1f8d0691c50581ba6043f009ec9e8b9f78f09d5a - () https://git.kernel.org/stable/c/1f8d0691c50581ba6043f009ec9e8b9f78f09d5a - Patch
References () https://git.kernel.org/stable/c/491528935c9c48bf341d8b40eabc6c4fc5df6f2c - () https://git.kernel.org/stable/c/491528935c9c48bf341d8b40eabc6c4fc5df6f2c - Patch
References () https://git.kernel.org/stable/c/609c7c1cc976e740d0fed4dbeec688b3ecb5dce2 - () https://git.kernel.org/stable/c/609c7c1cc976e740d0fed4dbeec688b3ecb5dce2 - Patch
References () https://git.kernel.org/stable/c/6be99c51829b24c914cef5bff6164877178e84d9 - () https://git.kernel.org/stable/c/6be99c51829b24c914cef5bff6164877178e84d9 - Patch
References () https://git.kernel.org/stable/c/7a14b8a477b88607d157c24aeb23e7389ec3319f - () https://git.kernel.org/stable/c/7a14b8a477b88607d157c24aeb23e7389ec3319f - Patch
References () https://git.kernel.org/stable/c/c1c9d0f6f7f1dbf29db996bd8e166242843a5f21 - () https://git.kernel.org/stable/c/c1c9d0f6f7f1dbf29db996bd8e166242843a5f21 - Patch
References () https://git.kernel.org/stable/c/d074d5ff5ae77b18300e5079c6bda6342a4d44b7 - () https://git.kernel.org/stable/c/d074d5ff5ae77b18300e5079c6bda6342a4d44b7 - Patch

11 Mar 2024, 18:15

Type Values Removed Values Added
References
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZOU3745CWCDZ7EMKMXB2OEEIB5Q3IWM/', 'source': '416baaa9-dc9f-4396-8d5f-8c081fb06d67'}
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OX4EWCYDZRTOEMC2C6OF7ZACAP23SUB5/', 'source': '416baaa9-dc9f-4396-8d5f-8c081fb06d67'}

28 Feb 2024, 03:15

Type Values Removed Values Added
References
  • () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZOU3745CWCDZ7EMKMXB2OEEIB5Q3IWM/ -
  • () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OX4EWCYDZRTOEMC2C6OF7ZACAP23SUB5/ -

23 Feb 2024, 10:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-02-23 10:15

Updated : 2024-06-25 23:15


NVD link : CVE-2024-26593

Mitre link : CVE-2024-26593

CVE.ORG link : CVE-2024-26593


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-125

Out-of-bounds Read