In the Linux kernel, the following vulnerability has been resolved:
usb: gadget: ncm: Fix handling of zero block length packets
While connecting to a Linux host with CDC_NCM_NTB_DEF_SIZE_TX
set to 65536, it has been observed that we receive short packets,
which come at interval of 5-10 seconds sometimes and have block
length zero but still contain 1-2 valid datagrams present.
According to the NCM spec:
"If wBlockLength = 0x0000, the block is terminated by a
short packet. In this case, the USB transfer must still
be shorter than dwNtbInMaxSize or dwNtbOutMaxSize. If
exactly dwNtbInMaxSize or dwNtbOutMaxSize bytes are sent,
and the size is a multiple of wMaxPacketSize for the
given pipe, then no ZLP shall be sent.
wBlockLength= 0x0000 must be used with extreme care, because
of the possibility that the host and device may get out of
sync, and because of test issues.
wBlockLength = 0x0000 allows the sender to reduce latency by
starting to send a very large NTB, and then shortening it when
the sender discovers that there’s not sufficient data to justify
sending a large NTB"
However, there is a potential issue with the current implementation,
as it checks for the occurrence of multiple NTBs in a single
giveback by verifying if the leftover bytes to be processed is zero
or not. If the block length reads zero, we would process the same
NTB infintely because the leftover bytes is never zero and it leads
to a crash. Fix this by bailing out if block length reads zero.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
17 Dec 2025, 19:23
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | NVD-CWE-noinfo | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
| First Time |
Linux
Debian Debian debian Linux Linux linux Kernel |
|
| CPE | cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc7:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.6:rc6:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.6:rc7:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.6:-:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc6:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:* |
|
| References | () https://git.kernel.org/stable/c/6b2c73111a252263807b7598682663dc33aa4b4c - Patch | |
| References | () https://git.kernel.org/stable/c/7664ee8bd80309b90d53488b619764f0a057f2b7 - Patch | |
| References | () https://git.kernel.org/stable/c/92b051b87658df7649ffcdef522593f21a2b296b - Patch | |
| References | () https://git.kernel.org/stable/c/a0f77b5d6067285b8eca0ee3bd1e448a6258026f - Patch | |
| References | () https://git.kernel.org/stable/c/a766761d206e7c36d7526e0ae749949d17ca582c - Patch | |
| References | () https://git.kernel.org/stable/c/e2dbfea520e60d58e0c498ba41bde10452257779 - Patch | |
| References | () https://git.kernel.org/stable/c/ef846cdbd100f7f9dc045e8bcd7fe4b3a3713c03 - Patch | |
| References | () https://git.kernel.org/stable/c/f90ce1e04cbcc76639d6cba0fdbd820cd80b3c70 - Patch | |
| References | () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - Third Party Advisory | |
| References | () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html - Third Party Advisory |
21 Nov 2024, 09:20
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
|
| References | () https://git.kernel.org/stable/c/6b2c73111a252263807b7598682663dc33aa4b4c - | |
| References | () https://git.kernel.org/stable/c/7664ee8bd80309b90d53488b619764f0a057f2b7 - | |
| References | () https://git.kernel.org/stable/c/92b051b87658df7649ffcdef522593f21a2b296b - | |
| References | () https://git.kernel.org/stable/c/a0f77b5d6067285b8eca0ee3bd1e448a6258026f - | |
| References | () https://git.kernel.org/stable/c/a766761d206e7c36d7526e0ae749949d17ca582c - | |
| References | () https://git.kernel.org/stable/c/e2dbfea520e60d58e0c498ba41bde10452257779 - | |
| References | () https://git.kernel.org/stable/c/ef846cdbd100f7f9dc045e8bcd7fe4b3a3713c03 - | |
| References | () https://git.kernel.org/stable/c/f90ce1e04cbcc76639d6cba0fdbd820cd80b3c70 - |
05 Nov 2024, 10:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
27 Jun 2024, 12:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
25 Jun 2024, 22:15
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
|
| References |
|
17 May 2024, 14:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2024-05-17 14:15
Updated : 2025-12-17 19:23
NVD link : CVE-2024-35825
Mitre link : CVE-2024-35825
CVE.ORG link : CVE-2024-35825
JSON object : View
Products Affected
debian
- debian_linux
linux
- linux_kernel
CWE
