U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2024-57915

Change History

CVE Modified by kernel.org 2/13/2025 11:16:43 AM

Action Type Old Value New Value
Changed Description
In the Linux kernel, the following vulnerability has been resolved:

usb: gadget: u_serial: Disable ep before setting port to null to fix the crash caused by port being null

Considering that in some extreme cases, when performing the
unbinding operation, gserial_disconnect has cleared gser->ioport,
which triggers gadget reconfiguration, and then calls gs_read_complete,
resulting in access to a null pointer. Therefore, ep is disabled before
gserial_disconnect sets port to null to prevent this from happening.

Call trace:
 gs_read_complete+0x58/0x240
 usb_gadget_giveback_request+0x40/0x160
 dwc3_remove_requests+0x170/0x484
 dwc3_ep0_out_start+0xb0/0x1d4
 __dwc3_gadget_start+0x25c/0x720
 kretprobe_trampoline.cfi_jt+0x0/0x8
 kretprobe_trampoline.cfi_jt+0x0/0x8
 udc_bind_to_driver+0x1d8/0x300
 usb_gadget_probe_driver+0xa8/0x1dc
 gadget_dev_desc_UDC_store+0x13c/0x188
 configfs_write_iter+0x160/0x1f4
 vfs_write+0x2d0/0x40c
 ksys_write+0x7c/0xf0
 __arm64_sys_write+0x20/0x30
 invoke_syscall+0x60/0x150
 el0_svc_common+0x8c/0xf8
 do_el0_svc+0x28/0xa0
 el0_svc+0x24/0x84
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
Removed CVSS V3.1
NIST: AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

								
						
Removed CWE
NIST: CWE-476

								
						
Removed CPE Configuration
3225683   Config Identifier: 0, OR
     
          *cpe:2.3:o:linux:linux_kernel:6.13:rc2:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:6.13:rc3:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:6.13:rc4:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:6.13:rc5:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:6.13:rc6:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 6.7 from (excluding) 6.12.10
          *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 6.2 from (excluding) 6.6.72
          *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 2.6.27 from (excluding) 6.1.125

								
						
Removed Reference
kernel.org: https://git.kernel.org/stable/c/0c50f00cc29948184af05bda31392fff5821f4f3

								
						
Removed Reference
kernel.org: https://git.kernel.org/stable/c/1062b648bff63ed62b2d47a045e08ea9741d98ea

								
						
Removed Reference
kernel.org: https://git.kernel.org/stable/c/13014969cbf07f18d62ceea40bd8ca8ec9d36cec

								
						
Removed Reference
kernel.org: https://git.kernel.org/stable/c/3d730e8758c75b68a0152ee1ac48a270ea6725b4

								
						
Removed Reference
kernel.org: https://git.kernel.org/stable/c/8e122d780a0f19aefd700dbd0b0e3ed3af0ae97f

								
						
Removed Reference
kernel.org: https://git.kernel.org/stable/c/d2de56cc45ee447f005d63217e84988b4f02faa9

								
						
Removed Reference
kernel.org: https://git.kernel.org/stable/c/f5f33fb57aae12e4b0add79e0242f458ea0bc510

								
						
Removed Reference Type
kernel.org: https://git.kernel.org/stable/c/0c50f00cc29948184af05bda31392fff5821f4f3 Types: Patch

								
						
Removed Reference Type
kernel.org: https://git.kernel.org/stable/c/13014969cbf07f18d62ceea40bd8ca8ec9d36cec Types: Patch

								
						
Removed Reference Type
kernel.org: https://git.kernel.org/stable/c/3d730e8758c75b68a0152ee1ac48a270ea6725b4 Types: Patch

								
						
Removed Reference Type
kernel.org: https://git.kernel.org/stable/c/8e122d780a0f19aefd700dbd0b0e3ed3af0ae97f Types: Patch

								
						
Removed Reference Type
kernel.org: https://git.kernel.org/stable/c/d2de56cc45ee447f005d63217e84988b4f02faa9 Types: Patch

								
						

CVE Rejected by kernel.org 2/13/2025 11:16:43 AM

Action Type Old Value New Value