In the Linux kernel, the following vulnerability has been resolved:
usb: typec: ucsi: Fix null pointer dereference in trace
ucsiregisteraltmode checks ISERR for the alt pointer and treats NULL as valid. When CONFIGTYPECDPALTMODE is not enabled, ucsiregisterdisplayport returns NULL which causes a NULL pointer dereference in trace. Rather than return NULL, call typecportregisteraltmode to register DisplayPort alternate mode as a non-controllable mode when CONFIGTYPECDPALTMODE is not enabled.
[
{
"signature_type": "Function",
"deprecated": false,
"digest": {
"length": 110.0,
"function_hash": "219009789828292624923642871233638484228"
},
"target": {
"file": "drivers/usb/typec/ucsi/ucsi.h",
"function": "ucsi_register_displayport"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@8095bf0579ed4906a33f7bec675bfb29b6b16a3b",
"signature_version": "v1",
"id": "CVE-2024-46719-1c6d11c0"
},
{
"signature_type": "Line",
"deprecated": false,
"digest": {
"line_hashes": [
"39566262942832236533578583710607116423",
"99992886861790396343420669782934462154",
"79328345172983667623515891385738604389",
"321247531071486991754171999021384111376"
],
"threshold": 0.9
},
"target": {
"file": "drivers/usb/typec/ucsi/ucsi.h"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@99516f76db48e1a9d54cdfed63c1babcee4e71a5",
"signature_version": "v1",
"id": "CVE-2024-46719-38eb2a56"
},
{
"signature_type": "Line",
"deprecated": false,
"digest": {
"line_hashes": [
"39566262942832236533578583710607116423",
"99992886861790396343420669782934462154",
"79328345172983667623515891385738604389",
"321247531071486991754171999021384111376"
],
"threshold": 0.9
},
"target": {
"file": "drivers/usb/typec/ucsi/ucsi.h"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@3aa56313b0de06ce1911950b2cc0c269614a87a9",
"signature_version": "v1",
"id": "CVE-2024-46719-53a5fd3e"
},
{
"signature_type": "Line",
"deprecated": false,
"digest": {
"line_hashes": [
"39566262942832236533578583710607116423",
"99992886861790396343420669782934462154",
"79328345172983667623515891385738604389",
"321247531071486991754171999021384111376"
],
"threshold": 0.9
},
"target": {
"file": "drivers/usb/typec/ucsi/ucsi.h"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b4243c05d7e3db0bdbf9124e6fa59b4ca7c807ae",
"signature_version": "v1",
"id": "CVE-2024-46719-86c084c6"
},
{
"signature_type": "Function",
"deprecated": false,
"digest": {
"length": 110.0,
"function_hash": "219009789828292624923642871233638484228"
},
"target": {
"file": "drivers/usb/typec/ucsi/ucsi.h",
"function": "ucsi_register_displayport"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@3aa56313b0de06ce1911950b2cc0c269614a87a9",
"signature_version": "v1",
"id": "CVE-2024-46719-8d11302d"
},
{
"signature_type": "Function",
"deprecated": false,
"digest": {
"length": 110.0,
"function_hash": "219009789828292624923642871233638484228"
},
"target": {
"file": "drivers/usb/typec/ucsi/ucsi.h",
"function": "ucsi_register_displayport"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@99516f76db48e1a9d54cdfed63c1babcee4e71a5",
"signature_version": "v1",
"id": "CVE-2024-46719-8f77d777"
},
{
"signature_type": "Function",
"deprecated": false,
"digest": {
"length": 110.0,
"function_hash": "219009789828292624923642871233638484228"
},
"target": {
"file": "drivers/usb/typec/ucsi/ucsi.h",
"function": "ucsi_register_displayport"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b4243c05d7e3db0bdbf9124e6fa59b4ca7c807ae",
"signature_version": "v1",
"id": "CVE-2024-46719-c8c04550"
},
{
"signature_type": "Line",
"deprecated": false,
"digest": {
"line_hashes": [
"39566262942832236533578583710607116423",
"99992886861790396343420669782934462154",
"79328345172983667623515891385738604389",
"321247531071486991754171999021384111376"
],
"threshold": 0.9
},
"target": {
"file": "drivers/usb/typec/ucsi/ucsi.h"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@8095bf0579ed4906a33f7bec675bfb29b6b16a3b",
"signature_version": "v1",
"id": "CVE-2024-46719-f12e95f8"
}
]