Bug 2281187 (CVE-2024-35825)
Summary: | CVE-2024-35825 kernel: usb: gadget: ncm: Fix handling of zero block length packets | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Zack Miele <zmiele> |
Component: | vulnerability | Assignee: | Product Security <prodsec-ir-bot> |
Status: | NEW --- | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | acaringi, allarkin, aquini, bhu, chwhite, cye, cyin, dbohanno, debarbos, dfreiber, drow, dvlasenk, esandeen, ezulian, hkrzesin, jarod, jburrell, jdenham, jfaracco, jlelli, joe.lawrence, jshortt, jstancek, jwyatt, kcarcia, ldoskova, lgoncalv, lzampier, mleitner, mmilgram, mstowell, nmurray, ptalbert, rparrazo, rrobaina, rvrbovsk, rysulliv, scweaver, sidakwo, sukulkar, tglozar, tyberry, vkumar, wcosta, williams, wmealing, ycote, ykopkova, zhijwang |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | kernel 4.19.312, kernel 5.4.274, kernel 5.10.215, kernel 5.15.154, kernel 6.1.84, kernel 6.6.24, kernel 6.7.12, kernel 6.8 | Doc Type: | If docs needed, set a value |
Doc Text: |
A vulnerability was found in the USB gadget Network Control Model (NCM) driver in the Linux kernel, where zero block length packets are not handled properly. This could lead to unintended behavior or potential system instability.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | Type: | --- | |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 2281188 | ||
Bug Blocks: | 2281793 |
Description
Zack Miele
2024-05-17 23:13:58 UTC
Created kernel tracking bugs for this issue: Affects: fedora-all [bug 2281188] The result of automatic check (that is developed by Alexander Larkin) for this CVE-2024-35825 is: SKIP No affected files built, so skip this CVE NO - - unknown (where first YES/NO value means if related sources built). |