msgs pointer which may point to NULL or stale old data). Introduce a new software status flag STATUS_ACTIVE indicating when the controller is active in driver point of view. Now treat all interrupts that occur when is not set as unexpected and mask all interrupts from the controller. https://git.kernel.org/stable/c/301c8f5c32c8fb79c67539bc23972dc3ef48024chttps://git.kernel.org/stable/c/7fa5304c4b5b425d4a0b3acf10139a7f6108a85fhttps://git.kernel.org/stable/c/a206f7fbe9589c60fafad12884628c909ecb042fhttps://git.kernel.org/stable/c/aa59ac81e859006d3a1df035a19b3f2089110f93" /> msgs pointer which may point to NULL or stale old data). Introduce a new software status flag STATUS_ACTIVE indicating when the controller is active in driver point of view. Now treat all interrupts that occur when is not set as unexpected and mask all interrupts from the controller. https://git.kernel.org/stable/c/301c8f5c32c8fb79c67539bc23972dc3ef48024chttps://git.kernel.org/stable/c/7fa5304c4b5b425d4a0b3acf10139a7f6108a85fhttps://git.kernel.org/stable/c/a206f7fbe9589c60fafad12884628c909ecb042fhttps://git.kernel.org/stable/c/aa59ac81e859006d3a1df035a19b3f2089110f93"> msgs pointer which may point to NULL or stale old data). Introduce a new software status flag STATUS_ACTIVE indicating when the controller is active in driver point of view. Now treat all interrupts that occur when is not set as unexpected and mask all interrupts from the controller. https://git.kernel.org/stable/c/301c8f5c32c8fb79c67539bc23972dc3ef48024chttps://git.kernel.org/stable/c/7fa5304c4b5b425d4a0b3acf10139a7f6108a85fhttps://git.kernel.org/stable/c/a206f7fbe9589c60fafad12884628c909ecb042fhttps://git.kernel.org/stable/c/aa59ac81e859006d3a1df035a19b3f2089110f93"> In the Linux kernel, the following vulnerability has been resolved: i2c: designware: Fix handling of real but unexpected device interrupts Commit c7 In the Linux kernel, the following vulnerability has been resolved: i2c: designware: Fix handling of real but unexpected device interrupts Commit c7

VulnerAlert



FIRMWARE
LINUX
17-09-2025 19:41

CVE-2022-50370 Vulnerabilidad documentada

Sin puntuación
Tags
#data
#where
#really
#kernel
#drive
#deep
#commit
#add
#linux
#firmware
#vulnerability
#design
#issue
#fix
#bug
Descripción
In the Linux kernel, following vulnerability has been resolved: i2c: designware: Fix handling of real but unexpected device interrupts Commit c7b79a752871 ("mfd: intel-lpss: Add Intel Alder Lake PCH-S PCI IDs") caused a regression on certain Gigabyte motherboards for Intel Alder Lake-S where system crashes to NULL pointer dereference in i2c_dw_xfer_msg() when resumes from S3 sleep state ("deep"). I was able debug issue Z690 AORUS ELITE and made following notes: - Issue happens resuming not from "s2idle" - PCI 00:15.0 == i2c_designware.0 is already in D0 when enters into pci_pm_resume_noirq() while all other i2c_designware devices are D3. Devices were runtime suspended D3 prior entering suspend - Interrupt comes after interrupts are re-enabled - According register dump interrupt really the i2c_designware.0. Controller enabled, I2C target address register points one detectable 0x60 DW_IC_RAW_INTR_STAT START_DET, STOP_DET, ACTIVITY and TX_EMPTY bits set indicating completed transaction. My guess that firmware uses this controller communicate with an on-board during resume does disable controller before giving control an operating system. I told UEFI update fixes never less it revealed the driver ready handle (or RX_FULL) device is supposed be idle variables (especially the dev->msgs which may point or stale old data). Introduce new software status flag STATUS_ACTIVE the controller active driver view. Now treat interrupts that occur as mask from the controller.
https://git.kernel.org/stable/c/301c8f5c32c8fb79c67539bc23972dc3ef48024c
https://git.kernel.org/stable/c/7fa5304c4b5b425d4a0b3acf10139a7f6108a85f
https://git.kernel.org/stable/c/a206f7fbe9589c60fafad12884628c909ecb042f
https://git.kernel.org/stable/c/aa59ac81e859006d3a1df035a19b3f2089110f93
Referencia
Link externo
Ver detalles

Fuente
https://nvd.nist.gov/vuln/detail/CVE-2022-50370
Resultados similares
Coincidentes en almenos en 50% de los tags
17-09-2025 CVE-2022-50358
In the Linux kernel, the following vulnerability has been resolved: brcmfmac: return error whe...
Ver información
17-09-2025 CVE-2023-53366
In the Linux kernel, the following vulnerability has been resolved: block: be a bit more caref...
Ver información
Icons made by Freepik from www.flaticon.com
Este Proyecto fue cofinanciado por el Consejo Nacional de Ciencia y Tecnología (CONACYT) a través del PROINNOVA 2021/2023
Proyecto realizado por