CVE-2024-56698

NameCVE-2024-56698
DescriptionIn the Linux kernel, the following vulnerability has been resolved: usb: dwc3: gadget: Fix looping of queued SG entries The dwc3_request->num_queued_sgs is decremented on completion. If a partially completed request is handled, then the dwc3_request->num_queued_sgs no longer reflects the total number of num_queued_sgs (it would be cleared). Correctly check the number of request SG entries remained to be prepare and queued. Failure to do this may cause null pointer dereference when accessing non-existent SG entry.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-4075-1, DLA-4076-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
linux (PTS)bullseye5.10.223-1vulnerable
bullseye (security)5.10.234-1fixed
bookworm6.1.123-1fixed
bookworm (security)6.1.128-1fixed
sid, trixie6.12.17-1fixed
linux-6.1 (PTS)bullseye (security)6.1.128-1~deb11u1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
linuxsourcebullseye5.10.234-1DLA-4075-1
linuxsourcebookworm6.1.123-1
linuxsource(unstable)6.12.3-1
linux-6.1sourcebullseye6.1.128-1~deb11u1DLA-4076-1

Notes

https://git.kernel.org/linus/b7fc65f5141c24785dc8c19249ca4efcf71b3524 (6.13-rc1)

Search for package or bug name: Reporting problems