CVE-2026-43380
Gravedad:
Pendiente de análisis
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
08/05/2026
Última modificación:
08/05/2026
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
hwmon: (pmbus/q54sj108a2) fix stack overflow in debugfs read<br />
<br />
The q54sj108a2_debugfs_read function suffers from a stack buffer overflow<br />
due to incorrect arguments passed to bin2hex(). The function currently<br />
passes &#39;data&#39; as the destination and &#39;data_char&#39; as the source.<br />
<br />
Because bin2hex() converts each input byte into two hex characters, a<br />
32-byte block read results in 64 bytes of output. Since &#39;data&#39; is only<br />
34 bytes (I2C_SMBUS_BLOCK_MAX + 2), this writes 30 bytes past the end<br />
of the buffer onto the stack.<br />
<br />
Additionally, the arguments were swapped: it was reading from the<br />
zero-initialized &#39;data_char&#39; and writing to &#39;data&#39;, resulting in<br />
all-zero output regardless of the actual I2C read.<br />
<br />
Fix this by:<br />
1. Expanding &#39;data_char&#39; to 66 bytes to safely hold the hex output.<br />
2. Correcting the bin2hex() argument order and using the actual read count.<br />
3. Using a pointer to select the correct output buffer for the final<br />
simple_read_from_buffer call.
Impacto
Referencias a soluciones, herramientas e información
- https://git.kernel.org/stable/c/24a7b9daa103fa963b3fd37d8805b23e01621976
- https://git.kernel.org/stable/c/25dd70a03b1f5f3aa71e1a5091ecd9cd2a13ee43
- https://git.kernel.org/stable/c/52db5ef163c96f916d424e472fb17aadc35a9f7a
- https://git.kernel.org/stable/c/73a7a345816946d276ad2c46c8bb771de67cfc46
- https://git.kernel.org/stable/c/a0fc1b9c738fba231f190ab960c83202722efee5
- https://git.kernel.org/stable/c/b48a0f8d4541a4f6651dc9a64430ce9fdf5c120b
- https://git.kernel.org/stable/c/c59090c50f62a17129fc4c5407bc4071305a9e82



