CVE-2024-56698

medium

Description

In the Linux kernel, the following vulnerability has been resolved: usb: dwc3: gadget: Fix looping of queued SG entries The dwc3_request->num_queued_sgs is decremented on completion. If a partially completed request is handled, then the dwc3_request->num_queued_sgs no longer reflects the total number of num_queued_sgs (it would be cleared). Correctly check the number of request SG entries remained to be prepare and queued. Failure to do this may cause null pointer dereference when accessing non-existent SG entry.

References

https://git.kernel.org/stable/c/c9e72352a10ae89a430449f7bfeb043e75c255d9

https://git.kernel.org/stable/c/b7fc65f5141c24785dc8c19249ca4efcf71b3524

https://git.kernel.org/stable/c/b7c3d0b59213ebeedff63d128728ce0b3d7a51ec

https://git.kernel.org/stable/c/8ceb21d76426bbe7072cc3e43281e70c0d664cc7

https://git.kernel.org/stable/c/70777a23a54e359cfdfafc625a57cd56434f3859

https://git.kernel.org/stable/c/1534f6f69393aac773465d80d31801b554352627

https://git.kernel.org/stable/c/0247da93bf62d33304b7bf97850ebf2a86e06d28

Details

Source: Mitre, NVD

Published: 2024-12-28

Updated: 2025-01-31

Risk Information

CVSS v2

Base Score: 4.6

Vector: CVSS2#AV:L/AC:L/Au:S/C:N/I:N/A:C

Severity: Medium

CVSS v3

Base Score: 5.5

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Severity: Medium