CVE-2024-56698

In the Linux kernel, the following vulnerability has been resolved: usb: dwc3: gadget: Fix looping of queued SG entries The dwc3_request->num_queued_sgs is decremented on completion. If a partially completed request is handled, then the dwc3_request->num_queued_sgs no longer reflects the total number of num_queued_sgs (it would be cleared). Correctly check the number of request SG entries remained to be prepare and queued. Failure to do this may cause null pointer dereference when accessing non-existent SG entry.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

31 Jan 2025, 15:57

Type Values Removed Values Added
CWE CWE-476
First Time Linux linux Kernel
Linux
References () https://git.kernel.org/stable/c/0247da93bf62d33304b7bf97850ebf2a86e06d28 - () https://git.kernel.org/stable/c/0247da93bf62d33304b7bf97850ebf2a86e06d28 - Patch
References () https://git.kernel.org/stable/c/1534f6f69393aac773465d80d31801b554352627 - () https://git.kernel.org/stable/c/1534f6f69393aac773465d80d31801b554352627 - Patch
References () https://git.kernel.org/stable/c/70777a23a54e359cfdfafc625a57cd56434f3859 - () https://git.kernel.org/stable/c/70777a23a54e359cfdfafc625a57cd56434f3859 - Patch
References () https://git.kernel.org/stable/c/8ceb21d76426bbe7072cc3e43281e70c0d664cc7 - () https://git.kernel.org/stable/c/8ceb21d76426bbe7072cc3e43281e70c0d664cc7 - Patch
References () https://git.kernel.org/stable/c/b7c3d0b59213ebeedff63d128728ce0b3d7a51ec - () https://git.kernel.org/stable/c/b7c3d0b59213ebeedff63d128728ce0b3d7a51ec - Patch
References () https://git.kernel.org/stable/c/b7fc65f5141c24785dc8c19249ca4efcf71b3524 - () https://git.kernel.org/stable/c/b7fc65f5141c24785dc8c19249ca4efcf71b3524 - Patch
References () https://git.kernel.org/stable/c/c9e72352a10ae89a430449f7bfeb043e75c255d9 - () https://git.kernel.org/stable/c/c9e72352a10ae89a430449f7bfeb043e75c255d9 - Patch
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: usb: dwc3: gadget: Se corrige el bucle de entradas SG en cola. El dwc3_request->num_queued_sgs se reduce al completarse. Si se gestiona una solicitud parcialmente completada, entonces el dwc3_request->num_queued_sgs ya no refleja el número total de num_queued_sgs (se borraría). Verifique correctamente el número de entradas SG de solicitud que quedan por preparar y poner en cola. Si no lo hace, puede causar una desreferencia de puntero nulo al acceder a una entrada SG inexistente.
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

28 Dec 2024, 10:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-12-28 10:15

Updated : 2025-01-31 15:57


NVD link : CVE-2024-56698

Mitre link : CVE-2024-56698

CVE.ORG link : CVE-2024-56698


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-476

NULL Pointer Dereference