Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2026-23197

Опубликовано: 14 фев. 2026
Источник: redhat
CVSS3: 6.3

Описание

In the Linux kernel, the following vulnerability has been resolved: i2c: imx: preserve error state in block data length handler When a block read returns an invalid length, zero or >I2C_SMBUS_BLOCK_MAX, the length handler sets the state to IMX_I2C_STATE_FAILED. However, i2c_imx_master_isr() unconditionally overwrites this with IMX_I2C_STATE_READ_CONTINUE, causing an endless read loop that overruns buffers and crashes the system. Guard the state transition to preserve error states set by the length handler.

A flaw was found in the Linux kernel's i2c-imx driver. A local attacker could exploit a vulnerability in the block data length handler. When an I2C block read returns an invalid length, the system enters an endless read loop, leading to buffer overruns and a system crash, resulting in a Denial of Service (DoS).

Отчет

This is a MODERATE impact denial of service flaw in the Linux kernel's i2c-imx driver. A local attacker could trigger an endless read loop by providing an invalid I2C block data length, leading to a system crash. Red Hat Enterprise Linux 6, 7, 8, and 9 are not affected as the vulnerable code is not present. Red Hat Enterprise Linux 10 and Red Hat In-Vehicle OS are affected.

Меры по смягчению последствий

To mitigate this issue, if the i2c-imx kernel module is not essential for system operation, it can be prevented from loading. Create a file named /etc/modprobe.d/blacklist-i2c-imx.conf with the content blacklist i2c-imx. After creating the file, regenerate the initramfs and reboot the system for the changes to take effect. This can be done using the commands: dracut -f -v followed by reboot. Be aware that blacklisting this module may impact functionality if I2C devices relying on the i2c-imx driver are in use.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10kernelFix deferred
Red Hat Enterprise Linux 6kernelNot affected
Red Hat Enterprise Linux 7kernelNot affected
Red Hat Enterprise Linux 7kernel-rtNot affected
Red Hat Enterprise Linux 8kernelNot affected
Red Hat Enterprise Linux 8kernel-rtNot affected
Red Hat Enterprise Linux 9kernelNot affected
Red Hat Enterprise Linux 9kernel-rtNot affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-835
https://bugzilla.redhat.com/show_bug.cgi?id=2439896kernel: Linux kernel i2c-imx driver: Denial of Service via invalid I2C block data length handling

6.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.5
ubuntu
около 1 месяца назад

In the Linux kernel, the following vulnerability has been resolved: i2c: imx: preserve error state in block data length handler When a block read returns an invalid length, zero or >I2C_SMBUS_BLOCK_MAX, the length handler sets the state to IMX_I2C_STATE_FAILED. However, i2c_imx_master_isr() unconditionally overwrites this with IMX_I2C_STATE_READ_CONTINUE, causing an endless read loop that overruns buffers and crashes the system. Guard the state transition to preserve error states set by the length handler.

CVSS3: 5.5
nvd
около 1 месяца назад

In the Linux kernel, the following vulnerability has been resolved: i2c: imx: preserve error state in block data length handler When a block read returns an invalid length, zero or >I2C_SMBUS_BLOCK_MAX, the length handler sets the state to IMX_I2C_STATE_FAILED. However, i2c_imx_master_isr() unconditionally overwrites this with IMX_I2C_STATE_READ_CONTINUE, causing an endless read loop that overruns buffers and crashes the system. Guard the state transition to preserve error states set by the length handler.

CVSS3: 5.5
debian
около 1 месяца назад

In the Linux kernel, the following vulnerability has been resolved: i ...

CVSS3: 5.5
github
около 1 месяца назад

In the Linux kernel, the following vulnerability has been resolved: i2c: imx: preserve error state in block data length handler When a block read returns an invalid length, zero or >I2C_SMBUS_BLOCK_MAX, the length handler sets the state to IMX_I2C_STATE_FAILED. However, i2c_imx_master_isr() unconditionally overwrites this with IMX_I2C_STATE_READ_CONTINUE, causing an endless read loop that overruns buffers and crashes the system. Guard the state transition to preserve error states set by the length handler.

6.3 Medium

CVSS3