In the Linux kernel, the following vulnerability has been resolved:
i2c: i801: Fix block process call transactions
According to the Intel datasheets, software must reset the block
buffer index twice for block process call transactions: once before
writing the outgoing data to the buffer, and once again before
reading the incoming data from the buffer.
The driver is currently missing the second reset, causing the wrong
portion of the block buffer to be read.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 09:02
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
References | () https://git.kernel.org/stable/c/1f8d0691c50581ba6043f009ec9e8b9f78f09d5a - Patch | |
References | () https://git.kernel.org/stable/c/491528935c9c48bf341d8b40eabc6c4fc5df6f2c - Patch | |
References | () https://git.kernel.org/stable/c/609c7c1cc976e740d0fed4dbeec688b3ecb5dce2 - Patch | |
References | () https://git.kernel.org/stable/c/6be99c51829b24c914cef5bff6164877178e84d9 - Patch | |
References | () https://git.kernel.org/stable/c/7a14b8a477b88607d157c24aeb23e7389ec3319f - Patch | |
References | () https://git.kernel.org/stable/c/c1c9d0f6f7f1dbf29db996bd8e166242843a5f21 - Patch | |
References | () https://git.kernel.org/stable/c/d074d5ff5ae77b18300e5079c6bda6342a4d44b7 - Patch |
05 Nov 2024, 10:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
25 Jun 2024, 23:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
19 Apr 2024, 17:58
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.1 |
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
CWE | CWE-125 | |
References | () https://git.kernel.org/stable/c/1f8d0691c50581ba6043f009ec9e8b9f78f09d5a - Patch | |
References | () https://git.kernel.org/stable/c/491528935c9c48bf341d8b40eabc6c4fc5df6f2c - Patch | |
References | () https://git.kernel.org/stable/c/609c7c1cc976e740d0fed4dbeec688b3ecb5dce2 - Patch | |
References | () https://git.kernel.org/stable/c/6be99c51829b24c914cef5bff6164877178e84d9 - Patch | |
References | () https://git.kernel.org/stable/c/7a14b8a477b88607d157c24aeb23e7389ec3319f - Patch | |
References | () https://git.kernel.org/stable/c/c1c9d0f6f7f1dbf29db996bd8e166242843a5f21 - Patch | |
References | () https://git.kernel.org/stable/c/d074d5ff5ae77b18300e5079c6bda6342a4d44b7 - Patch | |
First Time |
Linux
Linux linux Kernel |
11 Mar 2024, 18:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
28 Feb 2024, 03:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
23 Feb 2024, 10:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-02-23 10:15
Updated : 2024-11-21 09:02
NVD link : CVE-2024-26593
Mitre link : CVE-2024-26593
CVE.ORG link : CVE-2024-26593
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-125
Out-of-bounds Read