๐Ÿ” CVE Alert

CVE-2024-44960

UNKNOWN 0.0

usb: gadget: core: Check for unset descriptor

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: usb: gadget: core: Check for unset descriptor Make sure the descriptor has been set before looking at maxpacket. This fixes a null pointer panic in this case. This may happen if the gadget doesn't properly set up the endpoint for the current speed, or the gadget descriptors are malformed and the descriptor for the speed/endpoint are not found. No current gadget driver is known to have this problem, but this may cause a hard-to-find bug during development of new gadgets.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Sep 4, 2024
Last Updated May 12, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
d1c188d330ca33cc35d1590441ba276f31144299 < ba15815dd24cc5ec0d23e2170dc58c7db1e03b4a 54f83b8c8ea9b22082a496deadf90447a326954e < df8e734ae5e605348aa0ca2498aedb73e815f244 54f83b8c8ea9b22082a496deadf90447a326954e < 7cc9ebcfe58be22f18056ad8bc6272d120bdcb3e 54f83b8c8ea9b22082a496deadf90447a326954e < 50c5248b0ea8aae0529fdf28dac42a41312d3b62 54f83b8c8ea9b22082a496deadf90447a326954e < a0362cd6e503278add954123957fd47990e8d9bf 54f83b8c8ea9b22082a496deadf90447a326954e < 1a9df57d57452b104c46c918569143cf21d7ebf1 54f83b8c8ea9b22082a496deadf90447a326954e < 716cba46f73a92645cf13eded8d257ed48afc2a4 54f83b8c8ea9b22082a496deadf90447a326954e < 973a57891608a98e894db2887f278777f564de18 d7e3f2fe01372eb914d0e451f0e7a46cbcb98f9e 85c9ece11264499890d0e9f0dee431ac1bda981c fc71e39a6c07440e6968227f3db1988f45d7a7b7 94f5de2eefae22c449e367c2dacafe869af73e3f 8212b44b7109bd30dbf7eb7f5ecbbc413757a7d7
Linux / Linux
5.4

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/ba15815dd24cc5ec0d23e2170dc58c7db1e03b4a git.kernel.org: https://git.kernel.org/stable/c/df8e734ae5e605348aa0ca2498aedb73e815f244 git.kernel.org: https://git.kernel.org/stable/c/7cc9ebcfe58be22f18056ad8bc6272d120bdcb3e git.kernel.org: https://git.kernel.org/stable/c/50c5248b0ea8aae0529fdf28dac42a41312d3b62 git.kernel.org: https://git.kernel.org/stable/c/a0362cd6e503278add954123957fd47990e8d9bf git.kernel.org: https://git.kernel.org/stable/c/1a9df57d57452b104c46c918569143cf21d7ebf1 git.kernel.org: https://git.kernel.org/stable/c/716cba46f73a92645cf13eded8d257ed48afc2a4 git.kernel.org: https://git.kernel.org/stable/c/973a57891608a98e894db2887f278777f564de18 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2024/10/msg00003.html cert-portal.siemens.com: https://cert-portal.siemens.com/productcert/html/ssa-265688.html cert-portal.siemens.com: https://cert-portal.siemens.com/productcert/html/ssa-613116.html cert-portal.siemens.com: https://cert-portal.siemens.com/productcert/html/ssa-355557.html