In the Linux kernel, the following vulnerability has been resolved:
usb: acpi: Prevent null pointer dereference in usbacpiaddusb4devlink()
As demonstrated by the fix for updateportdevicestate, commit 12783c0b9e2c ("usb: core: Prevent null pointer dereference in updateportdevicestate"), usbhubtostructhub() can return NULL in certain scenarios, such as during hub driver unbind or teardown race conditions, even if the underlying usb_device structure exists.
Plus, all other places that call usbhubtostructhub() in the same file do check for NULL return values.
If usbhubtostructhub() returns NULL, the subsequent access to hub->ports[udev->portnum - 1] will cause a null pointer dereference.
[
{
"signature_type": "Line",
"deprecated": false,
"signature_version": "v1",
"digest": {
"line_hashes": [
"156088278845164605804619162731829389726",
"247122399895214487508755729865223257528",
"291356380637205931340559126496684646351",
"322339384637621244931948077126260972912"
],
"threshold": 0.9
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e3d530173b70514d4390a94f9f979acad689b70a",
"target": {
"file": "drivers/usb/core/usb-acpi.c"
},
"id": "CVE-2025-38134-16efa466"
},
{
"signature_type": "Function",
"deprecated": false,
"signature_version": "v1",
"digest": {
"length": 842.0,
"function_hash": "304941221843467651236675041467659073688"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e3d530173b70514d4390a94f9f979acad689b70a",
"target": {
"file": "drivers/usb/core/usb-acpi.c",
"function": "usb_acpi_add_usb4_devlink"
},
"id": "CVE-2025-38134-97a28f3f"
}
]