Lucene search

K
cve416baaa9-dc9f-4396-8d5f-8c081fb06d67CVE-2024-35997
HistoryMay 20, 2024 - 10:15 a.m.

CVE-2024-35997

2024-05-2010:15:13
CWE-667
416baaa9-dc9f-4396-8d5f-8c081fb06d67
web.nvd.nist.gov
33
linux
kernel
vulnerability
flag
i2c
operations
lock-up
interrupt

5.5 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

6.6 Medium

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

5.1%

In the Linux kernel, the following vulnerability has been resolved:

HID: i2c-hid: remove I2C_HID_READ_PENDING flag to prevent lock-up

The flag I2C_HID_READ_PENDING is used to serialize I2C operations.
However, this is not necessary, because I2C core already has its own
locking for that.

More importantly, this flag can cause a lock-up: if the flag is set in
i2c_hid_xfer() and an interrupt happens, the interrupt handler
(i2c_hid_irq) will check this flag and return immediately without doing
anything, then the interrupt handler will be invoked again in an
infinite loop.

Since interrupt handler is an RT task, it takes over the CPU and the
flag-clearing task never gets scheduled, thus we have a lock-up.

Delete this unnecessary flag.

Affected configurations

Vulners
NVD
Node
linuxlinux_kernelRange3.84.19.313
OR
linuxlinux_kernelRange4.20.05.4.275
OR
linuxlinux_kernelRange5.5.05.10.216
OR
linuxlinux_kernelRange5.11.05.15.158
OR
linuxlinux_kernelRange5.16.06.1.90
OR
linuxlinux_kernelRange6.2.06.6.30
OR
linuxlinux_kernelRange6.7.06.8.9
OR
linuxlinux_kernelRange6.9.0

CNA Affected

[
  {
    "product": "Linux",
    "vendor": "Linux",
    "defaultStatus": "unaffected",
    "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
    "programFiles": [
      "drivers/hid/i2c-hid/i2c-hid-core.c"
    ],
    "versions": [
      {
        "version": "4a200c3b9a40",
        "lessThan": "21bfca822cfc",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "4a200c3b9a40",
        "lessThan": "c448a9fd50f7",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "4a200c3b9a40",
        "lessThan": "5095b93021b8",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "4a200c3b9a40",
        "lessThan": "b65fb50e04a9",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "4a200c3b9a40",
        "lessThan": "0561b65fbd53",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "4a200c3b9a40",
        "lessThan": "29e94f295bad",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "4a200c3b9a40",
        "lessThan": "418c5575d564",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "4a200c3b9a40",
        "lessThan": "9c0f59e47a90",
        "status": "affected",
        "versionType": "git"
      }
    ]
  },
  {
    "product": "Linux",
    "vendor": "Linux",
    "defaultStatus": "affected",
    "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
    "programFiles": [
      "drivers/hid/i2c-hid/i2c-hid-core.c"
    ],
    "versions": [
      {
        "version": "3.8",
        "status": "affected"
      },
      {
        "version": "0",
        "lessThan": "3.8",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "4.19.313",
        "lessThanOrEqual": "4.19.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "5.4.275",
        "lessThanOrEqual": "5.4.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "5.10.216",
        "lessThanOrEqual": "5.10.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "5.15.158",
        "lessThanOrEqual": "5.15.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "6.1.90",
        "lessThanOrEqual": "6.1.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "6.6.30",
        "lessThanOrEqual": "6.6.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "6.8.9",
        "lessThanOrEqual": "6.8.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "6.9",
        "lessThanOrEqual": "*",
        "status": "unaffected",
        "versionType": "original_commit_for_fix"
      }
    ]
  }
]

5.5 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

6.6 Medium

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

5.1%