In the Linux kernel, the following vulnerability has been resolved:
usb: dwc3: gadget: Fix looping of queued SG entries
The dwc3_request->num_queued_sgs is decremented on completion. If a
partially completed request is handled, then the
dwc3_request->num_queued_sgs no longer reflects the total number of
num_queued_sgs (it would be cleared).
Correctly check the number of request SG entries remained to be prepare
and queued. Failure to do this may cause null pointer dereference when
accessing non-existent SG entry.
References
Configurations
Configuration 1 (hide)
|
History
31 Jan 2025, 15:57
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-476 | |
First Time |
Linux linux Kernel
Linux |
|
References | () https://git.kernel.org/stable/c/0247da93bf62d33304b7bf97850ebf2a86e06d28 - Patch | |
References | () https://git.kernel.org/stable/c/1534f6f69393aac773465d80d31801b554352627 - Patch | |
References | () https://git.kernel.org/stable/c/70777a23a54e359cfdfafc625a57cd56434f3859 - Patch | |
References | () https://git.kernel.org/stable/c/8ceb21d76426bbe7072cc3e43281e70c0d664cc7 - Patch | |
References | () https://git.kernel.org/stable/c/b7c3d0b59213ebeedff63d128728ce0b3d7a51ec - Patch | |
References | () https://git.kernel.org/stable/c/b7fc65f5141c24785dc8c19249ca4efcf71b3524 - Patch | |
References | () https://git.kernel.org/stable/c/c9e72352a10ae89a430449f7bfeb043e75c255d9 - Patch | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
Summary |
|
|
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
28 Dec 2024, 10:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-12-28 10:15
Updated : 2025-01-31 15:57
NVD link : CVE-2024-56698
Mitre link : CVE-2024-56698
CVE.ORG link : CVE-2024-56698
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-476
NULL Pointer Dereference