5.5 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.4 Medium
AI Score
Confidence
High
0.0004 Low
EPSS
Percentile
5.1%
In the Linux kernel, the following vulnerability has been resolved: i2c:
smbus: fix NULL function pointer dereference Baruch reported an OOPS when
using the designware controller as target only. Target-only modes break the
assumption of one transfer function always being available. Fix this by
always checking the pointer in __i2c_transfer. [wsa: dropped the
simplification in core-smbus to avoid theoretical regressions]
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 20.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 23.10 | noarch | linux | < any | UNKNOWN |
ubuntu | 24.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 23.10 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 24.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws-5.15 | < any | UNKNOWN |
ubuntu | 18.04 | noarch | linux-aws-5.4 | < any | UNKNOWN |
git.kernel.org/linus/91811a31b68d3765b3065f4bb6d7d6d84a7cfc9f (6.9-rc6)
git.kernel.org/stable/c/357c64ef1ef39b1e7cd91ab6bdd304d043702c83
git.kernel.org/stable/c/40f1d79f07b49c8a64a861706e5163f2db4bd95d
git.kernel.org/stable/c/4e75e222d397c6752b229ed72fc4644c8c36ecde
git.kernel.org/stable/c/5a09eae9a7db597fe0c1fc91636205b4a25d2620
git.kernel.org/stable/c/5fd72404587d7db4acb2d241fd8c387afb0a7aec
git.kernel.org/stable/c/91811a31b68d3765b3065f4bb6d7d6d84a7cfc9f
git.kernel.org/stable/c/ad3c3ac7a03be3697114f781193dd3e9d97e6e23
git.kernel.org/stable/c/e3425674ff68dc521c57c6eabad0cbd20a027d85
launchpad.net/bugs/cve/CVE-2024-35984
nvd.nist.gov/vuln/detail/CVE-2024-35984
security-tracker.debian.org/tracker/CVE-2024-35984
www.cve.org/CVERecord?id=CVE-2024-35984
5.5 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.4 Medium
AI Score
Confidence
High
0.0004 Low
EPSS
Percentile
5.1%