cve-2024-53070
Vulnerability from cvelistv5
Published
2024-11-19 17:22
Modified
2024-12-19 09:38
Severity ?
Summary
In the Linux kernel, the following vulnerability has been resolved: usb: dwc3: fix fault at system suspend if device was already runtime suspended If the device was already runtime suspended then during system suspend we cannot access the device registers else it will crash. Also we cannot access any registers after dwc3_core_exit() on some platforms so move the dwc3_enable_susphy() call to the top.
Impacted products
Vendor Product Version
Linux Linux Version: 073530898ebf44a9418434e899cfa9ca86945333
Version: 85ca88f93162acb94dbcb26d0ee2b145864d14a1
Version: 4fad7370086797afe6471493e3a5f36add8c48a7
Version: a690a9e38e6ba819789074388de7cff06425ef5b
Version: 705e3ce37bccdf2ed6f848356ff355f480d51a91
Create a notification for this product.
   Linux Linux Version: 5.15.170   
Version: 6.1.115   
Version: 6.6.59   
Version: 6.11.5   
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "drivers/usb/dwc3/core.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "d9e65d461a9de037e7c9d584776d025cfce6d86d",
              "status": "affected",
              "version": "073530898ebf44a9418434e899cfa9ca86945333",
              "versionType": "git"
            },
            {
              "lessThan": "562804b1561cc248cc37746a1c96c83cab1d7209",
              "status": "affected",
              "version": "85ca88f93162acb94dbcb26d0ee2b145864d14a1",
              "versionType": "git"
            },
            {
              "lessThan": "4abc5ee334fe4aba50461c45fdaaa4c5e5c57789",
              "status": "affected",
              "version": "4fad7370086797afe6471493e3a5f36add8c48a7",
              "versionType": "git"
            },
            {
              "lessThan": "06b98197b69e2f2af9cb1991ee0b1c876edf7b86",
              "status": "affected",
              "version": "a690a9e38e6ba819789074388de7cff06425ef5b",
              "versionType": "git"
            },
            {
              "lessThan": "9cfb31e4c89d200d8ab7cb1e0bb9e6e8d621ca0b",
              "status": "affected",
              "version": "705e3ce37bccdf2ed6f848356ff355f480d51a91",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "drivers/usb/dwc3/core.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "5.15.172",
              "status": "affected",
              "version": "5.15.170",
              "versionType": "semver"
            },
            {
              "lessThan": "6.1.117",
              "status": "affected",
              "version": "6.1.115",
              "versionType": "semver"
            },
            {
              "lessThan": "6.6.61",
              "status": "affected",
              "version": "6.6.59",
              "versionType": "semver"
            },
            {
              "lessThan": "6.11.8",
              "status": "affected",
              "version": "6.11.5",
              "versionType": "semver"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: dwc3: fix fault at system suspend if device was already runtime suspended\n\nIf the device was already runtime suspended then during system suspend\nwe cannot access the device registers else it will crash.\n\nAlso we cannot access any registers after dwc3_core_exit() on some\nplatforms so move the dwc3_enable_susphy() call to the top."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-12-19T09:38:25.820Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/d9e65d461a9de037e7c9d584776d025cfce6d86d"
        },
        {
          "url": "https://git.kernel.org/stable/c/562804b1561cc248cc37746a1c96c83cab1d7209"
        },
        {
          "url": "https://git.kernel.org/stable/c/4abc5ee334fe4aba50461c45fdaaa4c5e5c57789"
        },
        {
          "url": "https://git.kernel.org/stable/c/06b98197b69e2f2af9cb1991ee0b1c876edf7b86"
        },
        {
          "url": "https://git.kernel.org/stable/c/9cfb31e4c89d200d8ab7cb1e0bb9e6e8d621ca0b"
        }
      ],
      "title": "usb: dwc3: fix fault at system suspend if device was already runtime suspended",
      "x_generator": {
        "engine": "bippy-5f407fcff5a0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2024-53070",
    "datePublished": "2024-11-19T17:22:37.706Z",
    "dateReserved": "2024-11-19T17:17:24.976Z",
    "dateUpdated": "2024-12-19T09:38:25.820Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2024-53070\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2024-11-19T18:15:26.700\",\"lastModified\":\"2024-11-25T20:53:55.200\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nusb: dwc3: fix fault at system suspend if device was already runtime suspended\\n\\nIf the device was already runtime suspended then during system suspend\\nwe cannot access the device registers else it will crash.\\n\\nAlso we cannot access any registers after dwc3_core_exit() on some\\nplatforms so move the dwc3_enable_susphy() call to the top.\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: usb: dwc3: se corrige un error en la suspensi\u00f3n del sistema si el dispositivo ya estaba suspendido en tiempo de ejecuci\u00f3n. Si el dispositivo ya estaba suspendido en tiempo de ejecuci\u00f3n, durante la suspensi\u00f3n del sistema no podemos acceder a los registros del dispositivo, de lo contrario, se bloquear\u00e1. Adem\u00e1s, no podemos acceder a ning\u00fan registro despu\u00e9s de dwc3_core_exit() en algunas plataformas, por lo que movemos la llamada dwc3_enable_susphy() al principio.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.15.170\",\"versionEndExcluding\":\"5.15.172\",\"matchCriteriaId\":\"5CC09466-A4C0-4FE6-AC81-F620B65EC4AF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.1.115\",\"versionEndExcluding\":\"6.1.117\",\"matchCriteriaId\":\"CACEF6C4-89D7-488E-8023-41C8325AA271\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.6.59\",\"versionEndExcluding\":\"6.6.61\",\"matchCriteriaId\":\"962E4D7B-164B-4604-A273-17BDEBC12DA1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.11.5\",\"versionEndExcluding\":\"6.11.8\",\"matchCriteriaId\":\"744A9D07-6FE7-48A4-BA82-4A599235CEC6\"}]}]}],\"references\":[{\"url\":\"https://git.kernel.org/stable/c/06b98197b69e2f2af9cb1991ee0b1c876edf7b86\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/4abc5ee334fe4aba50461c45fdaaa4c5e5c57789\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/562804b1561cc248cc37746a1c96c83cab1d7209\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/9cfb31e4c89d200d8ab7cb1e0bb9e6e8d621ca0b\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/d9e65d461a9de037e7c9d584776d025cfce6d86d\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.