CVE-2024-42226

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
CVSS

No CVSS.

References

No reference.

Configurations

No configuration.

History

12 Aug 2024, 13:38

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: usb: xhci: evita posibles fallos en handle_tx_event() para eventos de transferencia sin TRB Algunos eventos de transferencia no siempre apuntan a un TRB y, en consecuencia, no tienen un anillo de endpoint. En estos casos, la función handle_tx_event() no debe continuar, porque si se establece 'ep->skip', se utiliza el puntero al anillo del endpoint. Para evitar una posible falla y hacer que el código sea lógico, regrese después de verificar el código de finalización para un evento de Transferencia sin TRB.
Summary (en) In the Linux kernel, the following vulnerability has been resolved: usb: xhci: prevent potential failure in handle_tx_event() for Transfer events without TRB Some transfer events don't always point to a TRB, and consequently don't have a endpoint ring. In these cases, function handle_tx_event() should not proceed, because if 'ep->skip' is set, the pointer to the endpoint ring is used. To prevent a potential failure and make the code logical, return after checking the completion code for a Transfer event without TRBs. (en) Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
References
  • {'url': 'https://git.kernel.org/stable/c/1f4a10cb826fdec5cd442df010bcb3043bfd6464', 'tags': ['Not Applicable'], 'source': '416baaa9-dc9f-4396-8d5f-8c081fb06d67'}
  • {'url': 'https://git.kernel.org/stable/c/66cb618bf0bb82859875b00eeffaf223557cb416', 'tags': ['Patch'], 'source': '416baaa9-dc9f-4396-8d5f-8c081fb06d67'}
  • {'url': 'https://git.kernel.org/stable/c/69bed24c82139bbad0a78a075e1834a2ea7bd064', 'tags': ['Not Applicable'], 'source': '416baaa9-dc9f-4396-8d5f-8c081fb06d67'}
  • {'url': 'https://git.kernel.org/stable/c/948554f1bb16e15b90006c109c3a558c66d4c4ac', 'tags': ['Patch'], 'source': '416baaa9-dc9f-4396-8d5f-8c081fb06d67'}
  • {'url': 'https://git.kernel.org/stable/c/9a24eb8010c2dc6a2eba56e3eb9fc07d14ffe00a', 'tags': ['Patch'], 'source': '416baaa9-dc9f-4396-8d5f-8c081fb06d67'}
  • {'url': 'https://git.kernel.org/stable/c/c0ee01e8ba19ff7edc98f68a114d4789faa219b9', 'tags': ['Patch'], 'source': '416baaa9-dc9f-4396-8d5f-8c081fb06d67'}
CWE CWE-476
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : 4.6
v2 : unknown
v3 : unknown

30 Jul 2024, 20:12

Type Values Removed Values Added
First Time Linux linux Kernel
Linux
CWE CWE-476
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 4.6
References () https://git.kernel.org/stable/c/1f4a10cb826fdec5cd442df010bcb3043bfd6464 - () https://git.kernel.org/stable/c/1f4a10cb826fdec5cd442df010bcb3043bfd6464 - Not Applicable
References () https://git.kernel.org/stable/c/66cb618bf0bb82859875b00eeffaf223557cb416 - () https://git.kernel.org/stable/c/66cb618bf0bb82859875b00eeffaf223557cb416 - Patch
References () https://git.kernel.org/stable/c/69bed24c82139bbad0a78a075e1834a2ea7bd064 - () https://git.kernel.org/stable/c/69bed24c82139bbad0a78a075e1834a2ea7bd064 - Not Applicable
References () https://git.kernel.org/stable/c/948554f1bb16e15b90006c109c3a558c66d4c4ac - () https://git.kernel.org/stable/c/948554f1bb16e15b90006c109c3a558c66d4c4ac - Patch
References () https://git.kernel.org/stable/c/9a24eb8010c2dc6a2eba56e3eb9fc07d14ffe00a - () https://git.kernel.org/stable/c/9a24eb8010c2dc6a2eba56e3eb9fc07d14ffe00a - Patch
References () https://git.kernel.org/stable/c/c0ee01e8ba19ff7edc98f68a114d4789faa219b9 - () https://git.kernel.org/stable/c/c0ee01e8ba19ff7edc98f68a114d4789faa219b9 - Patch
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

30 Jul 2024, 13:32

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: usb: xhci: evita posibles fallos en handle_tx_event() para eventos de transferencia sin TRB Algunos eventos de transferencia no siempre apuntan a un TRB y, en consecuencia, no tienen un anillo de endpoint. En estos casos, la función handle_tx_event() no debe continuar, porque si se establece 'ep->skip', se utiliza el puntero al anillo del endpoint. Para evitar una posible falla y hacer que el código sea lógico, regrese después de verificar el código de finalización para un evento de Transferencia sin TRB.

30 Jul 2024, 08:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-07-30 08:15

Updated : 2024-08-12 13:38


NVD link : CVE-2024-42226

Mitre link : CVE-2024-42226

CVE.ORG link : CVE-2024-42226


JSON object : View

Products Affected

No product.

CWE

No CWE.