CVE-2024-35825 (GCVE-0-2024-35825)

Vulnerability from cvelistv5 – Published: 2024-05-17 13:27 – Updated: 2026-05-11 20:11
VLAI?
Title
usb: gadget: ncm: Fix handling of zero block length packets
Summary
In the Linux kernel, the following vulnerability has been resolved: usb: gadget: ncm: Fix handling of zero block length packets While connecting to a Linux host with CDC_NCM_NTB_DEF_SIZE_TX set to 65536, it has been observed that we receive short packets, which come at interval of 5-10 seconds sometimes and have block length zero but still contain 1-2 valid datagrams present. According to the NCM spec: "If wBlockLength = 0x0000, the block is terminated by a short packet. In this case, the USB transfer must still be shorter than dwNtbInMaxSize or dwNtbOutMaxSize. If exactly dwNtbInMaxSize or dwNtbOutMaxSize bytes are sent, and the size is a multiple of wMaxPacketSize for the given pipe, then no ZLP shall be sent. wBlockLength= 0x0000 must be used with extreme care, because of the possibility that the host and device may get out of sync, and because of test issues. wBlockLength = 0x0000 allows the sender to reduce latency by starting to send a very large NTB, and then shortening it when the sender discovers that there’s not sufficient data to justify sending a large NTB" However, there is a potential issue with the current implementation, as it checks for the occurrence of multiple NTBs in a single giveback by verifying if the leftover bytes to be processed is zero or not. If the block length reads zero, we would process the same NTB infintely because the leftover bytes is never zero and it leads to a crash. Fix this by bailing out if block length reads zero.
Severity ?
No CVSS data available.
Assigner
Impacted products
Vendor Product Version
Linux Linux Affected: ff3ba016263ee93a1c6209bf5ab1599de7ab1512 , < e2dbfea520e60d58e0c498ba41bde10452257779 (git)
Affected: e7ca00f35d8a17af1ae19d529193ebc21bfda164 , < a766761d206e7c36d7526e0ae749949d17ca582c (git)
Affected: 17c653d4913bbc50d284aa96cf12bfc63e41ee5c , < ef846cdbd100f7f9dc045e8bcd7fe4b3a3713c03 (git)
Affected: 7014807fb7efa169a47a7a0a0a41d2c513925de0 , < 92b051b87658df7649ffcdef522593f21a2b296b (git)
Affected: 49fbc18378ae72a47feabee97fdb86f3cea09765 , < 7664ee8bd80309b90d53488b619764f0a057f2b7 (git)
Affected: 427694cfaafa565a3db5c5ea71df6bc095dca92f , < a0f77b5d6067285b8eca0ee3bd1e448a6258026f (git)
Affected: 427694cfaafa565a3db5c5ea71df6bc095dca92f , < 6b2c73111a252263807b7598682663dc33aa4b4c (git)
Affected: 427694cfaafa565a3db5c5ea71df6bc095dca92f , < f90ce1e04cbcc76639d6cba0fdbd820cd80b3c70 (git)
Affected: 5bdf93a2f5459f944b416b188178ca4a92fd206f (git)
Affected: 4bf1a9d20c65b9e80ca4b171267103f8d4f2c61f (git)
Create a notification for this product.
Linux Linux Affected: 6.6
Unaffected: 0 , < 6.6 (semver)
Unaffected: 4.19.312 , ≤ 4.19.* (semver)
Unaffected: 5.4.274 , ≤ 5.4.* (semver)
Unaffected: 5.10.215 , ≤ 5.10.* (semver)
Unaffected: 5.15.154 , ≤ 5.15.* (semver)
Unaffected: 6.1.84 , ≤ 6.1.* (semver)
Unaffected: 6.6.24 , ≤ 6.6.* (semver)
Unaffected: 6.7.12 , ≤ 6.7.* (semver)
Unaffected: 6.8 , ≤ * (original_commit_for_fix)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T03:21:47.690Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/e2dbfea520e60d58e0c498ba41bde10452257779"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/a766761d206e7c36d7526e0ae749949d17ca582c"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/ef846cdbd100f7f9dc045e8bcd7fe4b3a3713c03"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/92b051b87658df7649ffcdef522593f21a2b296b"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/7664ee8bd80309b90d53488b619764f0a057f2b7"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/a0f77b5d6067285b8eca0ee3bd1e448a6258026f"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/6b2c73111a252263807b7598682663dc33aa4b4c"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/f90ce1e04cbcc76639d6cba0fdbd820cd80b3c70"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-35825",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-09-10T15:42:28.954371Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-09-11T17:33:21.446Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "drivers/usb/gadget/function/f_ncm.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "e2dbfea520e60d58e0c498ba41bde10452257779",
              "status": "affected",
              "version": "ff3ba016263ee93a1c6209bf5ab1599de7ab1512",
              "versionType": "git"
            },
            {
              "lessThan": "a766761d206e7c36d7526e0ae749949d17ca582c",
              "status": "affected",
              "version": "e7ca00f35d8a17af1ae19d529193ebc21bfda164",
              "versionType": "git"
            },
            {
              "lessThan": "ef846cdbd100f7f9dc045e8bcd7fe4b3a3713c03",
              "status": "affected",
              "version": "17c653d4913bbc50d284aa96cf12bfc63e41ee5c",
              "versionType": "git"
            },
            {
              "lessThan": "92b051b87658df7649ffcdef522593f21a2b296b",
              "status": "affected",
              "version": "7014807fb7efa169a47a7a0a0a41d2c513925de0",
              "versionType": "git"
            },
            {
              "lessThan": "7664ee8bd80309b90d53488b619764f0a057f2b7",
              "status": "affected",
              "version": "49fbc18378ae72a47feabee97fdb86f3cea09765",
              "versionType": "git"
            },
            {
              "lessThan": "a0f77b5d6067285b8eca0ee3bd1e448a6258026f",
              "status": "affected",
              "version": "427694cfaafa565a3db5c5ea71df6bc095dca92f",
              "versionType": "git"
            },
            {
              "lessThan": "6b2c73111a252263807b7598682663dc33aa4b4c",
              "status": "affected",
              "version": "427694cfaafa565a3db5c5ea71df6bc095dca92f",
              "versionType": "git"
            },
            {
              "lessThan": "f90ce1e04cbcc76639d6cba0fdbd820cd80b3c70",
              "status": "affected",
              "version": "427694cfaafa565a3db5c5ea71df6bc095dca92f",
              "versionType": "git"
            },
            {
              "status": "affected",
              "version": "5bdf93a2f5459f944b416b188178ca4a92fd206f",
              "versionType": "git"
            },
            {
              "status": "affected",
              "version": "4bf1a9d20c65b9e80ca4b171267103f8d4f2c61f",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "drivers/usb/gadget/function/f_ncm.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "6.6"
            },
            {
              "lessThan": "6.6",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.19.*",
              "status": "unaffected",
              "version": "4.19.312",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.4.*",
              "status": "unaffected",
              "version": "5.4.274",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.10.*",
              "status": "unaffected",
              "version": "5.10.215",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.15.*",
              "status": "unaffected",
              "version": "5.15.154",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.1.*",
              "status": "unaffected",
              "version": "6.1.84",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.6.*",
              "status": "unaffected",
              "version": "6.6.24",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.7.*",
              "status": "unaffected",
              "version": "6.7.12",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "6.8",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "4.19.312",
                  "versionStartIncluding": "4.19.297",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.4.274",
                  "versionStartIncluding": "5.4.259",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.10.215",
                  "versionStartIncluding": "5.10.199",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.15.154",
                  "versionStartIncluding": "5.15.136",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.1.84",
                  "versionStartIncluding": "6.1.59",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.6.24",
                  "versionStartIncluding": "6.6",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.7.12",
                  "versionStartIncluding": "6.6",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.8",
                  "versionStartIncluding": "6.6",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionStartIncluding": "4.14.328",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionStartIncluding": "6.5.8",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: gadget: ncm: Fix handling of zero block length packets\n\nWhile connecting to a Linux host with CDC_NCM_NTB_DEF_SIZE_TX\nset to 65536, it has been observed that we receive short packets,\nwhich come at interval of 5-10 seconds sometimes and have block\nlength zero but still contain 1-2 valid datagrams present.\n\nAccording to the NCM spec:\n\n\"If wBlockLength = 0x0000, the block is terminated by a\nshort packet. In this case, the USB transfer must still\nbe shorter than dwNtbInMaxSize or dwNtbOutMaxSize. If\nexactly dwNtbInMaxSize or dwNtbOutMaxSize bytes are sent,\nand the size is a multiple of wMaxPacketSize for the\ngiven pipe, then no ZLP shall be sent.\n\nwBlockLength= 0x0000 must be used with extreme care, because\nof the possibility that the host and device may get out of\nsync, and because of test issues.\n\nwBlockLength = 0x0000 allows the sender to reduce latency by\nstarting to send a very large NTB, and then shortening it when\nthe sender discovers that there\u2019s not sufficient data to justify\nsending a large NTB\"\n\nHowever, there is a potential issue with the current implementation,\nas it checks for the occurrence of multiple NTBs in a single\ngiveback by verifying if the leftover bytes to be processed is zero\nor not. If the block length reads zero, we would process the same\nNTB infintely because the leftover bytes is never zero and it leads\nto a crash. Fix this by bailing out if block length reads zero."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-05-11T20:11:43.427Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/e2dbfea520e60d58e0c498ba41bde10452257779"
        },
        {
          "url": "https://git.kernel.org/stable/c/a766761d206e7c36d7526e0ae749949d17ca582c"
        },
        {
          "url": "https://git.kernel.org/stable/c/ef846cdbd100f7f9dc045e8bcd7fe4b3a3713c03"
        },
        {
          "url": "https://git.kernel.org/stable/c/92b051b87658df7649ffcdef522593f21a2b296b"
        },
        {
          "url": "https://git.kernel.org/stable/c/7664ee8bd80309b90d53488b619764f0a057f2b7"
        },
        {
          "url": "https://git.kernel.org/stable/c/a0f77b5d6067285b8eca0ee3bd1e448a6258026f"
        },
        {
          "url": "https://git.kernel.org/stable/c/6b2c73111a252263807b7598682663dc33aa4b4c"
        },
        {
          "url": "https://git.kernel.org/stable/c/f90ce1e04cbcc76639d6cba0fdbd820cd80b3c70"
        }
      ],
      "title": "usb: gadget: ncm: Fix handling of zero block length packets",
      "x_generator": {
        "engine": "bippy-1.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2024-35825",
    "datePublished": "2024-05-17T13:27:28.914Z",
    "dateReserved": "2024-05-17T12:19:12.347Z",
    "dateUpdated": "2026-05-11T20:11:43.427Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2",
  "vulnerability-lookup:meta": {
    "epss": {
      "cve": "CVE-2024-35825",
      "date": "2026-05-20",
      "epss": "0.00024",
      "percentile": "0.06751"
    },
    "fkie_nvd": {
      "descriptions": "[{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\nusb: gadget: ncm: Fix handling of zero block length packets\\n\\nWhile connecting to a Linux host with CDC_NCM_NTB_DEF_SIZE_TX\\nset to 65536, it has been observed that we receive short packets,\\nwhich come at interval of 5-10 seconds sometimes and have block\\nlength zero but still contain 1-2 valid datagrams present.\\n\\nAccording to the NCM spec:\\n\\n\\\"If wBlockLength = 0x0000, the block is terminated by a\\nshort packet. In this case, the USB transfer must still\\nbe shorter than dwNtbInMaxSize or dwNtbOutMaxSize. If\\nexactly dwNtbInMaxSize or dwNtbOutMaxSize bytes are sent,\\nand the size is a multiple of wMaxPacketSize for the\\ngiven pipe, then no ZLP shall be sent.\\n\\nwBlockLength= 0x0000 must be used with extreme care, because\\nof the possibility that the host and device may get out of\\nsync, and because of test issues.\\n\\nwBlockLength = 0x0000 allows the sender to reduce latency by\\nstarting to send a very large NTB, and then shortening it when\\nthe sender discovers that there\\u2019s not sufficient data to justify\\nsending a large NTB\\\"\\n\\nHowever, there is a potential issue with the current implementation,\\nas it checks for the occurrence of multiple NTBs in a single\\ngiveback by verifying if the leftover bytes to be processed is zero\\nor not. If the block length reads zero, we would process the same\\nNTB infintely because the leftover bytes is never zero and it leads\\nto a crash. Fix this by bailing out if block length reads zero.\"}, {\"lang\": \"es\", \"value\": \"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: usb: gadget: ncm: corregido el manejo de paquetes de longitud de bloque cero Al conectarnos a un host Linux con CDC_NCM_NTB_DEF_SIZE_TX configurado en 65536, se ha observado que recibimos paquetes cortos, que vienen en intervalo de 5 a 10 segundos a veces y tiene una longitud de bloque cero, pero a\\u00fan contiene 1 o 2 datagramas v\\u00e1lidos presentes. Seg\\u00fan la especificaci\\u00f3n NCM: \\\"Si wBlockLength = 0x0000, el bloque finaliza con un paquete corto. En este caso, la transferencia USB a\\u00fan debe ser m\\u00e1s corta que dwNtbInMaxSize o dwNtbOutMaxSize. Si se env\\u00edan exactamente bytes dwNtbInMaxSize o dwNtbOutMaxSize, y el tama\\u00f1o es un m\\u00faltiplo de wMaxPacketSize para la pipe dada, entonces no se enviar\\u00e1 ning\\u00fan ZLP. wBlockLength= 0x0000 debe usarse con extremo cuidado, debido a la posibilidad de que el host y el dispositivo no est\\u00e9n sincronizados y debido a problemas de prueba con wBlockLength = 0x0000. permite al remitente reducir la latencia comenzando a enviar un NTB muy grande y luego acort\\u00e1ndolo cuando el remitente descubre que no hay datos suficientes para justificar el env\\u00edo de un NTB grande\\\". Sin embargo, existe un problema potencial con la implementaci\\u00f3n actual, ya que verifica para la aparici\\u00f3n de m\\u00faltiples NTB en una sola devoluci\\u00f3n verificando si los bytes sobrantes a procesar son cero o no. Si la longitud del bloque es cero, procesar\\u00edamos el mismo NTB infinitamente porque los bytes sobrantes nunca son cero y provocan un bloqueo. Solucione este problema rescatando si la longitud del bloque es cero.\"}]",
      "id": "CVE-2024-35825",
      "lastModified": "2024-11-21T09:20:59.060",
      "published": "2024-05-17T14:15:18.227",
      "references": "[{\"url\": \"https://git.kernel.org/stable/c/6b2c73111a252263807b7598682663dc33aa4b4c\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}, {\"url\": \"https://git.kernel.org/stable/c/7664ee8bd80309b90d53488b619764f0a057f2b7\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}, {\"url\": \"https://git.kernel.org/stable/c/92b051b87658df7649ffcdef522593f21a2b296b\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}, {\"url\": \"https://git.kernel.org/stable/c/a0f77b5d6067285b8eca0ee3bd1e448a6258026f\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}, {\"url\": \"https://git.kernel.org/stable/c/a766761d206e7c36d7526e0ae749949d17ca582c\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}, {\"url\": \"https://git.kernel.org/stable/c/e2dbfea520e60d58e0c498ba41bde10452257779\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}, {\"url\": \"https://git.kernel.org/stable/c/ef846cdbd100f7f9dc045e8bcd7fe4b3a3713c03\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}, {\"url\": \"https://git.kernel.org/stable/c/f90ce1e04cbcc76639d6cba0fdbd820cd80b3c70\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}, {\"url\": \"https://git.kernel.org/stable/c/6b2c73111a252263807b7598682663dc33aa4b4c\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://git.kernel.org/stable/c/7664ee8bd80309b90d53488b619764f0a057f2b7\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://git.kernel.org/stable/c/92b051b87658df7649ffcdef522593f21a2b296b\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://git.kernel.org/stable/c/a0f77b5d6067285b8eca0ee3bd1e448a6258026f\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://git.kernel.org/stable/c/a766761d206e7c36d7526e0ae749949d17ca582c\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://git.kernel.org/stable/c/e2dbfea520e60d58e0c498ba41bde10452257779\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://git.kernel.org/stable/c/ef846cdbd100f7f9dc045e8bcd7fe4b3a3713c03\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://git.kernel.org/stable/c/f90ce1e04cbcc76639d6cba0fdbd820cd80b3c70\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
      "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
      "vulnStatus": "Awaiting Analysis"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2024-35825\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2024-05-17T14:15:18.227\",\"lastModified\":\"2025-12-17T19:23:38.127\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nusb: gadget: ncm: Fix handling of zero block length packets\\n\\nWhile connecting to a Linux host with CDC_NCM_NTB_DEF_SIZE_TX\\nset to 65536, it has been observed that we receive short packets,\\nwhich come at interval of 5-10 seconds sometimes and have block\\nlength zero but still contain 1-2 valid datagrams present.\\n\\nAccording to the NCM spec:\\n\\n\\\"If wBlockLength = 0x0000, the block is terminated by a\\nshort packet. In this case, the USB transfer must still\\nbe shorter than dwNtbInMaxSize or dwNtbOutMaxSize. If\\nexactly dwNtbInMaxSize or dwNtbOutMaxSize bytes are sent,\\nand the size is a multiple of wMaxPacketSize for the\\ngiven pipe, then no ZLP shall be sent.\\n\\nwBlockLength= 0x0000 must be used with extreme care, because\\nof the possibility that the host and device may get out of\\nsync, and because of test issues.\\n\\nwBlockLength = 0x0000 allows the sender to reduce latency by\\nstarting to send a very large NTB, and then shortening it when\\nthe sender discovers that there\u2019s not sufficient data to justify\\nsending a large NTB\\\"\\n\\nHowever, there is a potential issue with the current implementation,\\nas it checks for the occurrence of multiple NTBs in a single\\ngiveback by verifying if the leftover bytes to be processed is zero\\nor not. If the block length reads zero, we would process the same\\nNTB infintely because the leftover bytes is never zero and it leads\\nto a crash. Fix this by bailing out if block length reads zero.\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: usb: gadget: ncm: corregido el manejo de paquetes de longitud de bloque cero Al conectarnos a un host Linux con CDC_NCM_NTB_DEF_SIZE_TX configurado en 65536, se ha observado que recibimos paquetes cortos, que vienen en intervalo de 5 a 10 segundos a veces y tiene una longitud de bloque cero, pero a\u00fan contiene 1 o 2 datagramas v\u00e1lidos presentes. Seg\u00fan la especificaci\u00f3n NCM: \\\"Si wBlockLength = 0x0000, el bloque finaliza con un paquete corto. En este caso, la transferencia USB a\u00fan debe ser m\u00e1s corta que dwNtbInMaxSize o dwNtbOutMaxSize. Si se env\u00edan exactamente bytes dwNtbInMaxSize o dwNtbOutMaxSize, y el tama\u00f1o es un m\u00faltiplo de wMaxPacketSize para la pipe dada, entonces no se enviar\u00e1 ning\u00fan ZLP. wBlockLength= 0x0000 debe usarse con extremo cuidado, debido a la posibilidad de que el host y el dispositivo no est\u00e9n sincronizados y debido a problemas de prueba con wBlockLength = 0x0000. permite al remitente reducir la latencia comenzando a enviar un NTB muy grande y luego acort\u00e1ndolo cuando el remitente descubre que no hay datos suficientes para justificar el env\u00edo de un NTB grande\\\". Sin embargo, existe un problema potencial con la implementaci\u00f3n actual, ya que verifica para la aparici\u00f3n de m\u00faltiples NTB en una sola devoluci\u00f3n verificando si los bytes sobrantes a procesar son cero o no. Si la longitud del bloque es cero, procesar\u00edamos el mismo NTB infinitamente porque los bytes sobrantes nunca son cero y provocan un bloqueo. Solucione este problema rescatando si la longitud del bloque es cero.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.14.328\",\"versionEndExcluding\":\"4.15\",\"matchCriteriaId\":\"1ECB0106-30FC-4AED-AF86-853B9D63803B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.19.297\",\"versionEndExcluding\":\"4.19.312\",\"matchCriteriaId\":\"15A8F138-E808-4523-A212-46F3B6637BC4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.4.259\",\"versionEndExcluding\":\"5.4.274\",\"matchCriteriaId\":\"B79400B5-5DD8-4B30-9D9A-A4D1B5E64C64\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.10.199\",\"versionEndExcluding\":\"5.10.215\",\"matchCriteriaId\":\"0BF4FF1A-8B15-4A4A-9D82-4642AAA95672\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.15.136\",\"versionEndExcluding\":\"5.15.154\",\"matchCriteriaId\":\"BA868794-FE36-4A46-B6CC-59BA1DB7D40A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.1.59\",\"versionEndExcluding\":\"6.1.84\",\"matchCriteriaId\":\"5E211F95-3615-4CA6-8798-246021912B8D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.5.8\",\"versionEndExcluding\":\"6.6\",\"matchCriteriaId\":\"EB6FAAAD-2171-4941-8EE2-DE548E9A1DD9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.6.1\",\"versionEndExcluding\":\"6.6.24\",\"matchCriteriaId\":\"2100F47E-70DC-4998-A59C-C33FAB4F3678\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.7\",\"versionEndExcluding\":\"6.7.12\",\"matchCriteriaId\":\"6BE9771A-BAFD-4624-95F9-58D536540C53\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.6:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"E346B162-D566-4E62-ABDE-ECBFB21B8BFD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.6:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"E114E9DD-F7E1-40CC-AAD5-F14E586CB2E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.6:rc7:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC5BD782-474C-4A68-AED7-6EC818FF89AE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"B9F4EA73-0894-400F-A490-3A397AB7A517\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"056BD938-0A27-4569-B391-30578B309EE3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"F02056A5-B362-4370-9FF8-6F0BD384D520\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"62075ACE-B2A0-4B16-829D-B3DA5AE5CC41\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"A780F817-2A77-4130-A9B7-5C25606314E3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.8:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"AEB9199B-AB8F-4877-8964-E2BA95B5F15C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.8:rc7:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9B8A5CE-6D20-4C36-AC01-ACA4B70003A8\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07B237A9-69A3-4A9C-9DA0-4E06BD37AE73\"}]}]}],\"references\":[{\"url\":\"https://git.kernel.org/stable/c/6b2c73111a252263807b7598682663dc33aa4b4c\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/7664ee8bd80309b90d53488b619764f0a057f2b7\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/92b051b87658df7649ffcdef522593f21a2b296b\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/a0f77b5d6067285b8eca0ee3bd1e448a6258026f\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/a766761d206e7c36d7526e0ae749949d17ca582c\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/e2dbfea520e60d58e0c498ba41bde10452257779\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/ef846cdbd100f7f9dc045e8bcd7fe4b3a3713c03\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/f90ce1e04cbcc76639d6cba0fdbd820cd80b3c70\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/6b2c73111a252263807b7598682663dc33aa4b4c\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/7664ee8bd80309b90d53488b619764f0a057f2b7\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/92b051b87658df7649ffcdef522593f21a2b296b\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/a0f77b5d6067285b8eca0ee3bd1e448a6258026f\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/a766761d206e7c36d7526e0ae749949d17ca582c\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/e2dbfea520e60d58e0c498ba41bde10452257779\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/ef846cdbd100f7f9dc045e8bcd7fe4b3a3713c03\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/f90ce1e04cbcc76639d6cba0fdbd820cd80b3c70\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://git.kernel.org/stable/c/e2dbfea520e60d58e0c498ba41bde10452257779\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/a766761d206e7c36d7526e0ae749949d17ca582c\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/ef846cdbd100f7f9dc045e8bcd7fe4b3a3713c03\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/92b051b87658df7649ffcdef522593f21a2b296b\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/7664ee8bd80309b90d53488b619764f0a057f2b7\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/a0f77b5d6067285b8eca0ee3bd1e448a6258026f\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/6b2c73111a252263807b7598682663dc33aa4b4c\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/f90ce1e04cbcc76639d6cba0fdbd820cd80b3c70\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T03:21:47.690Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-35825\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-09-10T15:42:28.954371Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-09-11T12:42:16.305Z\"}}], \"cna\": {\"title\": \"usb: gadget: ncm: Fix handling of zero block length packets\", \"affected\": [{\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"ff3ba016263ee93a1c6209bf5ab1599de7ab1512\", \"lessThan\": \"e2dbfea520e60d58e0c498ba41bde10452257779\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"e7ca00f35d8a17af1ae19d529193ebc21bfda164\", \"lessThan\": \"a766761d206e7c36d7526e0ae749949d17ca582c\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"17c653d4913bbc50d284aa96cf12bfc63e41ee5c\", \"lessThan\": \"ef846cdbd100f7f9dc045e8bcd7fe4b3a3713c03\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"7014807fb7efa169a47a7a0a0a41d2c513925de0\", \"lessThan\": \"92b051b87658df7649ffcdef522593f21a2b296b\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"49fbc18378ae72a47feabee97fdb86f3cea09765\", \"lessThan\": \"7664ee8bd80309b90d53488b619764f0a057f2b7\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"427694cfaafa565a3db5c5ea71df6bc095dca92f\", \"lessThan\": \"a0f77b5d6067285b8eca0ee3bd1e448a6258026f\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"427694cfaafa565a3db5c5ea71df6bc095dca92f\", \"lessThan\": \"6b2c73111a252263807b7598682663dc33aa4b4c\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"427694cfaafa565a3db5c5ea71df6bc095dca92f\", \"lessThan\": \"f90ce1e04cbcc76639d6cba0fdbd820cd80b3c70\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"5bdf93a2f5459f944b416b188178ca4a92fd206f\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"4bf1a9d20c65b9e80ca4b171267103f8d4f2c61f\", \"versionType\": \"git\"}], \"programFiles\": [\"drivers/usb/gadget/function/f_ncm.c\"], \"defaultStatus\": \"unaffected\"}, {\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"6.6\"}, {\"status\": \"unaffected\", \"version\": \"0\", \"lessThan\": \"6.6\", \"versionType\": \"semver\"}, {\"status\": \"unaffected\", \"version\": \"4.19.312\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"4.19.*\"}, {\"status\": \"unaffected\", \"version\": \"5.4.274\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.4.*\"}, {\"status\": \"unaffected\", \"version\": \"5.10.215\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.10.*\"}, {\"status\": \"unaffected\", \"version\": \"5.15.154\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.15.*\"}, {\"status\": \"unaffected\", \"version\": \"6.1.84\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.1.*\"}, {\"status\": \"unaffected\", \"version\": \"6.6.24\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.6.*\"}, {\"status\": \"unaffected\", \"version\": \"6.7.12\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.7.*\"}, {\"status\": \"unaffected\", \"version\": \"6.8\", \"versionType\": \"original_commit_for_fix\", \"lessThanOrEqual\": \"*\"}], \"programFiles\": [\"drivers/usb/gadget/function/f_ncm.c\"], \"defaultStatus\": \"affected\"}], \"references\": [{\"url\": \"https://git.kernel.org/stable/c/e2dbfea520e60d58e0c498ba41bde10452257779\"}, {\"url\": \"https://git.kernel.org/stable/c/a766761d206e7c36d7526e0ae749949d17ca582c\"}, {\"url\": \"https://git.kernel.org/stable/c/ef846cdbd100f7f9dc045e8bcd7fe4b3a3713c03\"}, {\"url\": \"https://git.kernel.org/stable/c/92b051b87658df7649ffcdef522593f21a2b296b\"}, {\"url\": \"https://git.kernel.org/stable/c/7664ee8bd80309b90d53488b619764f0a057f2b7\"}, {\"url\": \"https://git.kernel.org/stable/c/a0f77b5d6067285b8eca0ee3bd1e448a6258026f\"}, {\"url\": \"https://git.kernel.org/stable/c/6b2c73111a252263807b7598682663dc33aa4b4c\"}, {\"url\": \"https://git.kernel.org/stable/c/f90ce1e04cbcc76639d6cba0fdbd820cd80b3c70\"}], \"x_generator\": {\"engine\": \"bippy-1.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\nusb: gadget: ncm: Fix handling of zero block length packets\\n\\nWhile connecting to a Linux host with CDC_NCM_NTB_DEF_SIZE_TX\\nset to 65536, it has been observed that we receive short packets,\\nwhich come at interval of 5-10 seconds sometimes and have block\\nlength zero but still contain 1-2 valid datagrams present.\\n\\nAccording to the NCM spec:\\n\\n\\\"If wBlockLength = 0x0000, the block is terminated by a\\nshort packet. In this case, the USB transfer must still\\nbe shorter than dwNtbInMaxSize or dwNtbOutMaxSize. If\\nexactly dwNtbInMaxSize or dwNtbOutMaxSize bytes are sent,\\nand the size is a multiple of wMaxPacketSize for the\\ngiven pipe, then no ZLP shall be sent.\\n\\nwBlockLength= 0x0000 must be used with extreme care, because\\nof the possibility that the host and device may get out of\\nsync, and because of test issues.\\n\\nwBlockLength = 0x0000 allows the sender to reduce latency by\\nstarting to send a very large NTB, and then shortening it when\\nthe sender discovers that there\\u2019s not sufficient data to justify\\nsending a large NTB\\\"\\n\\nHowever, there is a potential issue with the current implementation,\\nas it checks for the occurrence of multiple NTBs in a single\\ngiveback by verifying if the leftover bytes to be processed is zero\\nor not. If the block length reads zero, we would process the same\\nNTB infintely because the leftover bytes is never zero and it leads\\nto a crash. Fix this by bailing out if block length reads zero.\"}], \"cpeApplicability\": [{\"nodes\": [{\"negate\": false, \"cpeMatch\": [{\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"4.19.312\", \"versionStartIncluding\": \"4.19.297\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.4.274\", \"versionStartIncluding\": \"5.4.259\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.10.215\", \"versionStartIncluding\": \"5.10.199\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.15.154\", \"versionStartIncluding\": \"5.15.136\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.1.84\", \"versionStartIncluding\": \"6.1.59\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.6.24\", \"versionStartIncluding\": \"6.6\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.7.12\", \"versionStartIncluding\": \"6.6\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.8\", \"versionStartIncluding\": \"6.6\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionStartIncluding\": \"4.14.328\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionStartIncluding\": \"6.5.8\"}], \"operator\": \"OR\"}]}], \"providerMetadata\": {\"orgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"shortName\": \"Linux\", \"dateUpdated\": \"2026-05-11T20:11:43.427Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2024-35825\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-05-11T20:11:43.427Z\", \"dateReserved\": \"2024-05-17T12:19:12.347Z\", \"assignerOrgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"datePublished\": \"2024-05-17T13:27:28.914Z\", \"assignerShortName\": \"Linux\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.2"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.

Sightings

Author Source Type Date Other

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…