๐Ÿ” CVE Alert

CVE-2024-46675

UNKNOWN 0.0

usb: dwc3: core: Prevent USB core invalid event buffer address access

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: usb: dwc3: core: Prevent USB core invalid event buffer address access This commit addresses an issue where the USB core could access an invalid event buffer address during runtime suspend, potentially causing SMMU faults and other memory issues in Exynos platforms. The problem arises from the following sequence. 1. In dwc3_gadget_suspend, there is a chance of a timeout when moving the USB core to the halt state after clearing the run/stop bit by software. 2. In dwc3_core_exit, the event buffer is cleared regardless of the USB core's status, which may lead to an SMMU faults and other memory issues. if the USB core tries to access the event buffer address. To prevent this hardware quirk on Exynos platforms, this commit ensures that the event buffer address is not cleared by software when the USB core is active during runtime suspend by checking its status before clearing the buffer address.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Sep 13, 2024
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
9f8a67b65a49d0e35c6ca782136c84541d948a64 < eca3f543f817da87c00d1a5697b473efb548204f 9f8a67b65a49d0e35c6ca782136c84541d948a64 < d2afc2bffec77316b90d530b07695e3f534df914 9f8a67b65a49d0e35c6ca782136c84541d948a64 < b72da4d89b97da71e056cc4d1429b2bc426a9c2f 9f8a67b65a49d0e35c6ca782136c84541d948a64 < 111277b881def3153335acfe0d1f43e6cd83ac93 9f8a67b65a49d0e35c6ca782136c84541d948a64 < 2189fd13c577d7881f94affc09c950a795064c4b 9f8a67b65a49d0e35c6ca782136c84541d948a64 < 7bb11a75dd4d3612378b90e2a4aa49bdccea28ab 9f8a67b65a49d0e35c6ca782136c84541d948a64 < e23f6ad8d110bf632f7471482e10b43dc174fb72 9f8a67b65a49d0e35c6ca782136c84541d948a64 < 14e497183df28c006603cc67fd3797a537eef7b9
Linux / Linux
4.8

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/eca3f543f817da87c00d1a5697b473efb548204f git.kernel.org: https://git.kernel.org/stable/c/d2afc2bffec77316b90d530b07695e3f534df914 git.kernel.org: https://git.kernel.org/stable/c/b72da4d89b97da71e056cc4d1429b2bc426a9c2f git.kernel.org: https://git.kernel.org/stable/c/111277b881def3153335acfe0d1f43e6cd83ac93 git.kernel.org: https://git.kernel.org/stable/c/2189fd13c577d7881f94affc09c950a795064c4b git.kernel.org: https://git.kernel.org/stable/c/7bb11a75dd4d3612378b90e2a4aa49bdccea28ab git.kernel.org: https://git.kernel.org/stable/c/e23f6ad8d110bf632f7471482e10b43dc174fb72 git.kernel.org: https://git.kernel.org/stable/c/14e497183df28c006603cc67fd3797a537eef7b9 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2024/10/msg00003.html