First published: Thu May 30 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: USB: core: Fix access violation during port device removal Testing with KASAN and syzkaller revealed a bug in port.c:disable_store(): usb_hub_to_struct_hub() can return NULL if the hub that the port belongs to is concurrently removed, but the function does not check for this possibility before dereferencing the returned value. It turns out that the first dereference is unnecessary, since hub->intfdev is the parent of the port device, so it can be changed easily. Adding a check for hub == NULL prevents further problems. The same bug exists in the disable_show() routine, and it can be fixed the same way.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <6.1.91 | 6.1.91 |
redhat/kernel | <6.6.31 | 6.6.31 |
redhat/kernel | <6.8.10 | 6.8.10 |
redhat/kernel | <6.9 | 6.9 |
Linux Kernel | >=6.0<6.1.91 | |
Linux Kernel | >=6.2<6.6.31 | |
Linux Kernel | >=6.7<6.8.10 | |
Linux Kernel | =6.9-rc1 | |
Linux Kernel | =6.9-rc2 | |
Linux Kernel | =6.9-rc3 | |
Linux Kernel | =6.9-rc4 | |
Linux Kernel | =6.9-rc5 | |
Linux Kernel | =6.9-rc6 | |
debian/linux | 5.10.223-1 5.10.234-1 6.1.129-1 6.1.128-1 6.12.20-1 6.12.21-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-36896 has not been assigned a CVSS score but is considered a critical access violation vulnerability.
To fix CVE-2024-36896, update your kernel to the latest patched versions provided by your distribution.
CVE-2024-36896 affects multiple versions of the Linux kernel across various distributions, including Red Hat and Debian.
CVE-2024-36896 is an access violation vulnerability that occurs during the USB port device removal process.
Yes, patches for CVE-2024-36896 are included in kernel versions 6.1.91, 6.6.31, 6.8.10, 6.9, and specific Debian Linux kernel updates.