{"id":"CVE-2024-35984","summary":"i2c: smbus: fix NULL function pointer dereference","details":"In the Linux kernel, the following vulnerability has been resolved:\n\ni2c: smbus: fix NULL function pointer dereference\n\nBaruch reported an OOPS when using the designware controller as target\nonly. Target-only modes break the assumption of one transfer function\nalways being available. Fix this by always checking the pointer in\n__i2c_transfer.\n\n[wsa: dropped the simplification in core-smbus to avoid theoretical regressions]","modified":"2026-04-02T09:50:59.675956Z","published":"2024-05-20T09:47:51.738Z","related":["MGASA-2024-0263","MGASA-2024-0266","SUSE-SU-2024:1979-1","SUSE-SU-2024:1983-1","SUSE-SU-2024:2008-1","SUSE-SU-2024:2019-1","SUSE-SU-2024:2135-1","SUSE-SU-2024:2190-1","SUSE-SU-2024:2203-1","SUSE-SU-2024:2973-1","SUSE-SU-2025:20008-1","SUSE-SU-2025:20028-1","SUSE-SU-2025:20166-1","SUSE-SU-2025:20249-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/35xxx/CVE-2024-35984.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/357c64ef1ef39b1e7cd91ab6bdd304d043702c83"},{"type":"WEB","url":"https://git.kernel.org/stable/c/40f1d79f07b49c8a64a861706e5163f2db4bd95d"},{"type":"WEB","url":"https://git.kernel.org/stable/c/4e75e222d397c6752b229ed72fc4644c8c36ecde"},{"type":"WEB","url":"https://git.kernel.org/stable/c/5a09eae9a7db597fe0c1fc91636205b4a25d2620"},{"type":"WEB","url":"https://git.kernel.org/stable/c/5fd72404587d7db4acb2d241fd8c387afb0a7aec"},{"type":"WEB","url":"https://git.kernel.org/stable/c/91811a31b68d3765b3065f4bb6d7d6d84a7cfc9f"},{"type":"WEB","url":"https://git.kernel.org/stable/c/ad3c3ac7a03be3697114f781193dd3e9d97e6e23"},{"type":"WEB","url":"https://git.kernel.org/stable/c/e3425674ff68dc521c57c6eabad0cbd20a027d85"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/35xxx/CVE-2024-35984.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-35984"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"63453b59e41173241c4efe9335815f6432fa8586"},{"fixed":"40f1d79f07b49c8a64a861706e5163f2db4bd95d"},{"fixed":"ad3c3ac7a03be3697114f781193dd3e9d97e6e23"},{"fixed":"5fd72404587d7db4acb2d241fd8c387afb0a7aec"},{"fixed":"5a09eae9a7db597fe0c1fc91636205b4a25d2620"},{"fixed":"4e75e222d397c6752b229ed72fc4644c8c36ecde"},{"fixed":"e3425674ff68dc521c57c6eabad0cbd20a027d85"},{"fixed":"357c64ef1ef39b1e7cd91ab6bdd304d043702c83"},{"fixed":"91811a31b68d3765b3065f4bb6d7d6d84a7cfc9f"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-35984.json"}}],"schema_version":"1.7.5"}