cve/2024/CVE-2024-26716.md
2024-05-25 21:48:12 +02:00

18 lines
976 B
Markdown

### [CVE-2024-26716](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26716)
![](https://img.shields.io/static/v1?label=Product&message=Linux&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=83cb2604f641%3C%20ed85777c640c%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
In the Linux kernel, the following vulnerability has been resolved:usb: core: Prevent null pointer dereference in update_port_device_stateCurrently, the function update_port_device_state gets the usb_hub fromudev->parent by calling usb_hub_to_struct_hub.However, in case the actconfig or the maxchild is 0, the usb_hub wouldbe NULL and upon further accessing to get port_dev would result in nullpointer dereference.Fix this by introducing an if check after the usb_hub is populated.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/fkie-cad/nvd-json-data-feeds