In the Linux kernel, the following vulnerability has been resolved:

HID: i2c-hid: remove I2C_HID_READ_PENDING flag to prevent lock-up

The flag I2C_HID_READ_PENDING is used to serialize I2C operations.
However, this is not necessary, because I2C core already has its own
locking for that.

More importantly, this flag can cause a lock-up: if the flag is set in
i2c_hid_xfer() and an interrupt happens, the interrupt handler
(i2c_hid_irq) will check this flag and return immediately without doing
anything, then the interrupt handler will be invoked again in an
infinite loop.

Since interrupt handler is an RT task, it takes over the CPU and the
flag-clearing task never gets scheduled, thus we have a lock-up.

Delete this unnecessary flag.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 16 Jan 2025 21:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-400

Thu, 16 Jan 2025 21:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2025-05-04T09:10:11.851Z

Reserved: 2024-05-17T13:50:33.148Z

Link: CVE-2024-35997

cve-icon Vulnrichment

Updated: 2024-08-02T03:30:12.481Z

cve-icon NVD

Status : Modified

Published: 2024-05-20T10:15:13.960

Modified: 2025-01-16T21:15:15.603

Link: CVE-2024-35997

cve-icon Redhat

Severity : Low

Publid Date: 2024-05-20T00:00:00Z

Links: CVE-2024-35997 - Bugzilla

cve-icon OpenCVE Enrichment

No data.