First published: Fri Sep 27 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: usb: gadget: aspeed_udc: validate endpoint index for ast udc We should verify the bound of the array to assure that host may not manipulate the index to point past endpoint array. Found by static analysis.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | <6.1.110 | |
Linux Kernel | >=6.2<6.6.51 | |
Linux Kernel | >=6.7<6.10.10 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.119-1 6.12.11-1 | |
debian/linux-6.1 | 6.1.119-1~deb11u1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-46836 is classified as a vulnerability affecting the Linux kernel, specifically in the usb gadget aspeed_udc component.
To fix CVE-2024-46836, update your Linux kernel to versions 5.10.223-1, 5.10.226-1, 6.1.119-1, or newer versions.
CVE-2024-46836 affects various Linux kernel versions, specifically those prior to 6.1.110, between 6.2 and 6.6.51, and between 6.7 and 6.10.10.
CVE-2024-46836 impacts the usb gadget aspeed_udc due to improper validation of endpoint index.
CVE-2024-46836 was identified through static analysis of the Linux kernel code.