5.5
CVE-2024-35997
- EPSS 0.01%
- Published 20.05.2024 10:15:13
- Last modified 16.01.2025 21:15:15
- Source 416baaa9-dc9f-4396-8d5f-8c081f
- CVE-Watchlists
- Open
In the Linux kernel, the following vulnerability has been resolved: HID: i2c-hid: remove I2C_HID_READ_PENDING flag to prevent lock-up The flag I2C_HID_READ_PENDING is used to serialize I2C operations. However, this is not necessary, because I2C core already has its own locking for that. More importantly, this flag can cause a lock-up: if the flag is set in i2c_hid_xfer() and an interrupt happens, the interrupt handler (i2c_hid_irq) will check this flag and return immediately without doing anything, then the interrupt handler will be invoked again in an infinite loop. Since interrupt handler is an RT task, it takes over the CPU and the flag-clearing task never gets scheduled, thus we have a lock-up. Delete this unnecessary flag.
Data is provided by the National Vulnerability Database (NVD)
Linux ≫ Linux Kernel Version >= 3.8 < 4.19.313
Linux ≫ Linux Kernel Version >= 4.20 < 5.4.275
Linux ≫ Linux Kernel Version >= 5.5 < 5.10.216
Linux ≫ Linux Kernel Version >= 5.11 < 5.15.158
Linux ≫ Linux Kernel Version >= 5.16 < 6.1.90
Linux ≫ Linux Kernel Version >= 6.2 < 6.6.30
Linux ≫ Linux Kernel Version >= 6.7 < 6.8.9
| Type | Source | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.01% | 0.008 |
| Source | Base Score | Exploit Score | Impact Score | Vector string |
|---|---|---|---|---|
| nvd@nist.gov | 5.5 | 1.8 | 3.6 |
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
|
CWE-667 Improper Locking
The product does not properly acquire or release a lock on a resource, leading to unexpected resource state changes and behaviors.