Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-35997— HID: i2c-hid: remove I2C_HID_READ_PENDING flag to prevent lock-up

EPSS 0.01% · P3

Affected Version Matrix 18

VendorProductVersion RangeStatus
LinuxLinux4a200c3b9a40242652b5734630bdd0bcf3aca75f< 21bfca822cfc1e71796124e93b46e0d9fa584401affected
4a200c3b9a40242652b5734630bdd0bcf3aca75f< c448a9fd50f77e8fb9156ff64848aa4295eb3003affected
4a200c3b9a40242652b5734630bdd0bcf3aca75f< 5095b93021b899f54c9355bebf36d78854c33a22affected
4a200c3b9a40242652b5734630bdd0bcf3aca75f< b65fb50e04a95eec34a9d1bc138454a98a5578d8affected
4a200c3b9a40242652b5734630bdd0bcf3aca75f< 0561b65fbd53d3e788c5b0222d9112ca016fd6a1affected
4a200c3b9a40242652b5734630bdd0bcf3aca75f< 29e94f295bad5be59cf4271a93e22cdcf5536722affected
4a200c3b9a40242652b5734630bdd0bcf3aca75f< 418c5575d56410c6e186ab727bf32ae32447d497affected
4a200c3b9a40242652b5734630bdd0bcf3aca75f< 9c0f59e47a90c54d0153f8ddc0f80d7a36207d0eaffected
… +10 more rows
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2024-35997

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
HID: i2c-hid: remove I2C_HID_READ_PENDING flag to prevent lock-up
Source: NVD (National Vulnerability Database)
Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: HID: i2c-hid: remove I2C_HID_READ_PENDING flag to prevent lock-up The flag I2C_HID_READ_PENDING is used to serialize I2C operations. However, this is not necessary, because I2C core already has its own locking for that. More importantly, this flag can cause a lock-up: if the flag is set in i2c_hid_xfer() and an interrupt happens, the interrupt handler (i2c_hid_irq) will check this flag and return immediately without doing anything, then the interrupt handler will be invoked again in an infinite loop. Since interrupt handler is an RT task, it takes over the CPU and the flag-clearing task never gets scheduled, thus we have a lock-up. Delete this unnecessary flag.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Linux kernel 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel存在安全漏洞,该漏洞源于中断处理程序将在无限循环中再次调用。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
LinuxLinux 4a200c3b9a40242652b5734630bdd0bcf3aca75f ~ 21bfca822cfc1e71796124e93b46e0d9fa584401 -
LinuxLinux 3.8 -

II. Public POCs for CVE-2024-35997

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2024-35997

登录查看更多情报信息。

Same Patch Batch · Linux · 2024-05-20 · 62 CVEs total

CVE-2024-35967Bluetooth: SCO: Fix not validating setsockopt user input
CVE-2024-35954scsi: sg: Avoid sg device teardown race
CVE-2024-35951drm/panfrost: Fix the error path in panfrost_mmu_map_fault_addr()
CVE-2024-35952drm/ast: Fix soft lockup
CVE-2024-35953accel/ivpu: Fix deadlock in context_xa
CVE-2024-35963Bluetooth: hci_sock: Fix not validating setsockopt user input
CVE-2024-35964Bluetooth: ISO: Fix not validating setsockopt user input
CVE-2024-35965Bluetooth: L2CAP: Fix not validating setsockopt user input
CVE-2024-35966Bluetooth: RFCOMM: Fix not validating setsockopt user input
CVE-2024-35968pds_core: Fix pdsc_check_pci_health function to use work thread
CVE-2024-35962netfilter: complete validation of user input
CVE-2024-35969ipv6: fix race condition between ipv6_get_ifaddr and ipv6_del_addr
CVE-2024-35971net: ks8851: Handle softirqs at the end of IRQ thread to fix hang
CVE-2024-35970af_unix: Clear stale u->oob_skb.
CVE-2024-35973geneve: fix header validation in geneve[6]_xmit_skb
CVE-2024-35972bnxt_en: Fix possible memory leak in bnxt_rdma_aux_device_init()
CVE-2024-35974block: fix q->blkg_list corruption during disk rebind
CVE-2024-35975octeontx2-pf: Fix transmit scheduler resource leak
CVE-2024-35976xsk: validate user input for XDP_{UMEM|COMPLETION}_FILL_RING
CVE-2024-35977platform/chrome: cros_ec_uart: properly fix race condition

Showing top 20 of 62 CVEs. View all on vendor page &rarr; →

IV. Related Vulnerabilities

V. Comments for CVE-2024-35997

No comments yet


Leave a comment