CVE-2024-26593

In the Linux kernel, the following vulnerability has been resolved: i2c: i801: Fix block process call transactions According to the Intel datasheets, software must reset the block buffer index twice for block process call transactions: once before writing the outgoing data to the buffer, and once again before reading the incoming data from the buffer. The driver is currently missing the second reset, causing the wrong portion of the block buffer to be read.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

19 Apr 2024, 17:58

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.1
CWE CWE-125
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
First Time Linux linux Kernel
Linux
References () https://git.kernel.org/stable/c/1f8d0691c50581ba6043f009ec9e8b9f78f09d5a - () https://git.kernel.org/stable/c/1f8d0691c50581ba6043f009ec9e8b9f78f09d5a - Patch
References () https://git.kernel.org/stable/c/491528935c9c48bf341d8b40eabc6c4fc5df6f2c - () https://git.kernel.org/stable/c/491528935c9c48bf341d8b40eabc6c4fc5df6f2c - Patch
References () https://git.kernel.org/stable/c/609c7c1cc976e740d0fed4dbeec688b3ecb5dce2 - () https://git.kernel.org/stable/c/609c7c1cc976e740d0fed4dbeec688b3ecb5dce2 - Patch
References () https://git.kernel.org/stable/c/6be99c51829b24c914cef5bff6164877178e84d9 - () https://git.kernel.org/stable/c/6be99c51829b24c914cef5bff6164877178e84d9 - Patch
References () https://git.kernel.org/stable/c/7a14b8a477b88607d157c24aeb23e7389ec3319f - () https://git.kernel.org/stable/c/7a14b8a477b88607d157c24aeb23e7389ec3319f - Patch
References () https://git.kernel.org/stable/c/c1c9d0f6f7f1dbf29db996bd8e166242843a5f21 - () https://git.kernel.org/stable/c/c1c9d0f6f7f1dbf29db996bd8e166242843a5f21 - Patch
References () https://git.kernel.org/stable/c/d074d5ff5ae77b18300e5079c6bda6342a4d44b7 - () https://git.kernel.org/stable/c/d074d5ff5ae77b18300e5079c6bda6342a4d44b7 - Patch

11 Mar 2024, 18:15

Type Values Removed Values Added
References
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZOU3745CWCDZ7EMKMXB2OEEIB5Q3IWM/', 'source': '416baaa9-dc9f-4396-8d5f-8c081fb06d67'}
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OX4EWCYDZRTOEMC2C6OF7ZACAP23SUB5/', 'source': '416baaa9-dc9f-4396-8d5f-8c081fb06d67'}

28 Feb 2024, 03:15

Type Values Removed Values Added
References
  • () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZOU3745CWCDZ7EMKMXB2OEEIB5Q3IWM/ -
  • () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OX4EWCYDZRTOEMC2C6OF7ZACAP23SUB5/ -

23 Feb 2024, 16:14

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: i2c: i801: Reparar transacciones de llamada de proceso de bloque Según las hojas de datos de Intel, el software debe restablecer el índice del búfer de bloque dos veces para transacciones de llamada de proceso de bloque: una vez antes de escribir los datos salientes en el búfer , y una vez más antes de leer los datos entrantes del búfer. Actualmente, al controlador le falta el segundo reinicio, lo que provoca que se lea la parte incorrecta del búfer de bloque.

23 Feb 2024, 10:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-02-23 10:15

Updated : 2024-04-19 17:58


NVD link : CVE-2024-26593

Mitre link : CVE-2024-26593

CVE.ORG link : CVE-2024-26593


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-125

Out-of-bounds Read