In the Linux kernel, the following vulnerability has been resolved:
i2c: smbus: fix NULL function pointer dereference
Baruch reported an OOPS when using the designware controller as target
only. Target-only modes break the assumption of one transfer function
always being available. Fix this by always checking the pointer in
__i2c_transfer.
[wsa: dropped the simplification in core-smbus to avoid theoretical regressions]
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 09:21
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
References | () https://git.kernel.org/stable/c/357c64ef1ef39b1e7cd91ab6bdd304d043702c83 - Patch | |
References | () https://git.kernel.org/stable/c/40f1d79f07b49c8a64a861706e5163f2db4bd95d - Patch | |
References | () https://git.kernel.org/stable/c/4e75e222d397c6752b229ed72fc4644c8c36ecde - Patch | |
References | () https://git.kernel.org/stable/c/5a09eae9a7db597fe0c1fc91636205b4a25d2620 - Patch | |
References | () https://git.kernel.org/stable/c/5fd72404587d7db4acb2d241fd8c387afb0a7aec - Patch | |
References | () https://git.kernel.org/stable/c/91811a31b68d3765b3065f4bb6d7d6d84a7cfc9f - Patch | |
References | () https://git.kernel.org/stable/c/ad3c3ac7a03be3697114f781193dd3e9d97e6e23 - Patch | |
References | () https://git.kernel.org/stable/c/e3425674ff68dc521c57c6eabad0cbd20a027d85 - Patch |
05 Nov 2024, 10:17
Type | Values Removed | Values Added |
---|---|---|
References |
|
27 Jun 2024, 12:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
25 Jun 2024, 22:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
23 May 2024, 21:04
Type | Values Removed | Values Added |
---|---|---|
First Time |
Linux linux Kernel
Linux |
|
Summary |
|
|
CWE | CWE-476 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
References | () https://git.kernel.org/stable/c/357c64ef1ef39b1e7cd91ab6bdd304d043702c83 - Patch | |
References | () https://git.kernel.org/stable/c/40f1d79f07b49c8a64a861706e5163f2db4bd95d - Patch | |
References | () https://git.kernel.org/stable/c/4e75e222d397c6752b229ed72fc4644c8c36ecde - Patch | |
References | () https://git.kernel.org/stable/c/5a09eae9a7db597fe0c1fc91636205b4a25d2620 - Patch | |
References | () https://git.kernel.org/stable/c/5fd72404587d7db4acb2d241fd8c387afb0a7aec - Patch | |
References | () https://git.kernel.org/stable/c/91811a31b68d3765b3065f4bb6d7d6d84a7cfc9f - Patch | |
References | () https://git.kernel.org/stable/c/ad3c3ac7a03be3697114f781193dd3e9d97e6e23 - Patch | |
References | () https://git.kernel.org/stable/c/e3425674ff68dc521c57c6eabad0cbd20a027d85 - Patch |
20 May 2024, 10:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-05-20 10:15
Updated : 2024-11-21 09:21
NVD link : CVE-2024-35984
Mitre link : CVE-2024-35984
CVE.ORG link : CVE-2024-35984
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-476
NULL Pointer Dereference