๐Ÿ” CVE Alert

CVE-2024-46674

UNKNOWN 0.0

usb: dwc3: st: fix probed platform device ref count on probe error path

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: usb: dwc3: st: fix probed platform device ref count on probe error path The probe function never performs any paltform device allocation, thus error path "undo_platform_dev_alloc" is entirely bogus. It drops the reference count from the platform device being probed. If error path is triggered, this will lead to unbalanced device reference counts and premature release of device resources, thus possible use-after-free when releasing remaining devm-managed resources.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Sep 13, 2024
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
f83fca0707c66e36f14efef7f68702cb12de70b7 < b0979a885b9d4df2a25b88e9d444ccaa5f9f495c f83fca0707c66e36f14efef7f68702cb12de70b7 < f3498650df0805c75b4e1c94d07423c46cbf4ce1 f83fca0707c66e36f14efef7f68702cb12de70b7 < 6aee4c5635d81f4809c3b9f0c198a65adfbb2ada f83fca0707c66e36f14efef7f68702cb12de70b7 < 060f41243ad7f6f5249fa7290dda0c01f723d12d f83fca0707c66e36f14efef7f68702cb12de70b7 < 4c6735299540f3c82a5033d35be76a5c42e0fb18 f83fca0707c66e36f14efef7f68702cb12de70b7 < e1e5e8ea2731150d5ba7c707f9e02fafebcfeb49 f83fca0707c66e36f14efef7f68702cb12de70b7 < 1de989668708ce5875efc9d669d227212aeb9a90 f83fca0707c66e36f14efef7f68702cb12de70b7 < ddfcfeba891064b88bb844208b43bef2ef970f0c
Linux / Linux
3.18

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/b0979a885b9d4df2a25b88e9d444ccaa5f9f495c git.kernel.org: https://git.kernel.org/stable/c/f3498650df0805c75b4e1c94d07423c46cbf4ce1 git.kernel.org: https://git.kernel.org/stable/c/6aee4c5635d81f4809c3b9f0c198a65adfbb2ada git.kernel.org: https://git.kernel.org/stable/c/060f41243ad7f6f5249fa7290dda0c01f723d12d git.kernel.org: https://git.kernel.org/stable/c/4c6735299540f3c82a5033d35be76a5c42e0fb18 git.kernel.org: https://git.kernel.org/stable/c/e1e5e8ea2731150d5ba7c707f9e02fafebcfeb49 git.kernel.org: https://git.kernel.org/stable/c/1de989668708ce5875efc9d669d227212aeb9a90 git.kernel.org: https://git.kernel.org/stable/c/ddfcfeba891064b88bb844208b43bef2ef970f0c lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2024/10/msg00003.html