[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

256610

 
 

909

 
 

199263

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2024-26747Date: (C)2024-04-03   (M)2024-06-27


In the Linux kernel, the following vulnerability has been resolved: usb: roles: fix NULL pointer issue when put module's reference In current design, usb role class driver will get usb_role_switch parent's module reference after the user get usb_role_switch device and put the reference after the user put the usb_role_switch device. However, the parent device of usb_role_switch may be removed before the user put the usb_role_switch. If so, then, NULL pointer issue will be met when the user put the parent module's reference. This will save the module pointer in structure of usb_role_switch. Then, we don't need to find module by iterating long relations.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V3 Severity:CVSS V2 Severity:
CVSS Score : 4.4CVSS Score :
Exploit Score: Exploit Score:
Impact Score: Impact Score:
 
CVSS V3 Metrics:CVSS V2 Metrics:
Attack Vector: Access Vector:
Attack Complexity: Access Complexity:
Privileges Required: Authentication:
User Interaction: Confidentiality:
Scope: Integrity:
Confidentiality: Availability:
Integrity:  
Availability:  
  
Reference:
https://git.kernel.org/stable/c/0158216805ca7e498d07de38840d2732166ae5fa
https://git.kernel.org/stable/c/01f82de440f2ab07c259b7573371e1c42e5565db
https://git.kernel.org/stable/c/1c9be13846c0b2abc2480602f8ef421360e1ad9e
https://git.kernel.org/stable/c/4b45829440b1b208948b39cc71f77a37a2536734
https://git.kernel.org/stable/c/e279bf8e51893e1fe160b3d8126ef2dd00f661e1
https://git.kernel.org/stable/c/ef982fc41055fcebb361a92288d3225783d12913
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html

OVAL    16
oval:org.secpod.oval:def:708997
oval:org.secpod.oval:def:709005
oval:org.secpod.oval:def:708995
oval:org.secpod.oval:def:708993
...
XCCDF    1

© SecPod Technologies