First published: Sat Dec 28 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: usb: dwc3: gadget: Fix looping of queued SG entries The dwc3_request->num_queued_sgs is decremented on completion. If a partially completed request is handled, then the dwc3_request->num_queued_sgs no longer reflects the total number of num_queued_sgs (it would be cleared). Correctly check the number of request SG entries remained to be prepare and queued. Failure to do this may cause null pointer dereference when accessing non-existent SG entry.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux kernel | ||
Linux Kernel | >=4.18<5.10.231 | |
Linux Kernel | >=5.11<5.15.174 | |
Linux Kernel | >=5.16<6.1.120 | |
Linux Kernel | >=6.2<6.6.64 | |
Linux Kernel | >=6.7<6.11.11 | |
Linux Kernel | >=6.12<6.12.2 | |
debian/linux | <=5.10.223-1<=5.10.226-1 | 6.1.123-1 6.1.128-1 6.12.12-1 6.12.15-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-56698 has not publicly been assigned a specific severity rating but addresses an issue in the Linux kernel that could potentially lead to vulnerabilities in USB gadget operations.
CVE-2024-56698 affects Linux kernel versions from 4.18 up to 6.12.2, with specific ranges outlined for each affected version.
To fix CVE-2024-56698, update your Linux kernel to at least version 6.1.123-1 or a newer version available in your distribution.
The vulnerability in CVE-2024-56698 is related to the improper handling of queued scatter-gather (SG) entries in the Linux kernel USB driver.
Yes, CVE-2024-56698 has been resolved through a fix that ensures correct decrementing of queued SG entry counts upon request completion.