{"id":"CVE-2024-46719","summary":"usb: typec: ucsi: Fix null pointer dereference in trace","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nusb: typec: ucsi: Fix null pointer dereference in trace\n\nucsi_register_altmode checks IS_ERR for the alt pointer and treats\nNULL as valid. When CONFIG_TYPEC_DP_ALTMODE is not enabled,\nucsi_register_displayport returns NULL which causes a NULL pointer\ndereference in trace. Rather than return NULL, call\ntypec_port_register_altmode to register DisplayPort alternate mode\nas a non-controllable mode when CONFIG_TYPEC_DP_ALTMODE is not enabled.","modified":"2026-04-02T12:19:31.761794Z","published":"2024-09-18T06:32:18.028Z","related":["SUSE-SU-2024:3551-1","SUSE-SU-2024:3553-1","SUSE-SU-2024:3561-1","SUSE-SU-2024:3564-1","SUSE-SU-2024:3983-1","SUSE-SU-2024:3985-1","SUSE-SU-2024:4364-1","SUSE-SU-2025:20073-1","SUSE-SU-2025:20077-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/46xxx/CVE-2024-46719.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/3aa56313b0de06ce1911950b2cc0c269614a87a9"},{"type":"WEB","url":"https://git.kernel.org/stable/c/3b9f2d9301ae67070fe77a0c06758722fd7172b7"},{"type":"WEB","url":"https://git.kernel.org/stable/c/7e64cabe81c303bdf6fd26b6a09a3289b33bc870"},{"type":"WEB","url":"https://git.kernel.org/stable/c/8095bf0579ed4906a33f7bec675bfb29b6b16a3b"},{"type":"WEB","url":"https://git.kernel.org/stable/c/99331fe68a8eaa4097143a33fb0c12d5e5e8e830"},{"type":"WEB","url":"https://git.kernel.org/stable/c/99516f76db48e1a9d54cdfed63c1babcee4e71a5"},{"type":"WEB","url":"https://git.kernel.org/stable/c/b4243c05d7e3db0bdbf9124e6fa59b4ca7c807ae"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2024/10/msg00003.html"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/46xxx/CVE-2024-46719.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-46719"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"af8622f6a585d8d82b11cd7987e082861fd0edd3"},{"fixed":"8095bf0579ed4906a33f7bec675bfb29b6b16a3b"},{"fixed":"7e64cabe81c303bdf6fd26b6a09a3289b33bc870"},{"fixed":"3aa56313b0de06ce1911950b2cc0c269614a87a9"},{"fixed":"b4243c05d7e3db0bdbf9124e6fa59b4ca7c807ae"},{"fixed":"3b9f2d9301ae67070fe77a0c06758722fd7172b7"},{"fixed":"99331fe68a8eaa4097143a33fb0c12d5e5e8e830"},{"fixed":"99516f76db48e1a9d54cdfed63c1babcee4e71a5"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-46719.json"}}],"schema_version":"1.7.5"}