{"id":"CVE-2024-43883","summary":"usb: vhci-hcd: Do not drop references before new references are gained","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nusb: vhci-hcd: Do not drop references before new references are gained\n\nAt a few places the driver carries stale pointers\nto references that can still be used. Make sure that does not happen.\nThis strictly speaking closes ZDI-CAN-22273, though there may be\nsimilar races in the driver.","modified":"2026-05-18T05:57:54.439270602Z","published":"2024-08-23T13:08:10.508Z","related":["SUSE-SU-2024:3189-1","SUSE-SU-2024:3190-1","SUSE-SU-2024:3194-1","SUSE-SU-2024:3195-1","SUSE-SU-2024:3209-1","SUSE-SU-2024:3225-1","SUSE-SU-2024:3227-1","SUSE-SU-2024:3249-1","SUSE-SU-2024:3251-1","SUSE-SU-2024:3252-1","SUSE-SU-2024:3383-1","SUSE-SU-2024:3408-1","SUSE-SU-2024:3467-1","SUSE-SU-2024:3483-1","SUSE-SU-2024:3499-1","SUSE-SU-2025:20044-1","SUSE-SU-2025:20047-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/43xxx/CVE-2024-43883.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/128e82e41cf7d74a562726c1587d9d2ede1a0a37"},{"type":"WEB","url":"https://git.kernel.org/stable/c/4dacdb9720aaab10b6be121eae55820174d97174"},{"type":"WEB","url":"https://git.kernel.org/stable/c/585e6bc7d0a9bf73a8be3d3fb34e86b90cc61a14"},{"type":"WEB","url":"https://git.kernel.org/stable/c/5a3c473b28ae1c1f7c4dc129e30cb19ae6e96f89"},{"type":"WEB","url":"https://git.kernel.org/stable/c/9c3746ce8d8fcb3a2405644fc0eec7fc5312de80"},{"type":"WEB","url":"https://git.kernel.org/stable/c/afdcfd3d6fcdeca2735ca8d994c5f2d24a368f0a"},{"type":"WEB","url":"https://git.kernel.org/stable/c/c3d0857b7fc2c49f68f89128a5440176089a8f54"},{"type":"WEB","url":"https://git.kernel.org/stable/c/e8c1e606dab8c56cf074b43b98d0805de7322ba2"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2024/10/msg00003.html"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/43xxx/CVE-2024-43883.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-43883"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"7606ee8aa33287dd3e6eb44c78541b87a413a325"},{"fixed":"5a3c473b28ae1c1f7c4dc129e30cb19ae6e96f89"},{"fixed":"9c3746ce8d8fcb3a2405644fc0eec7fc5312de80"},{"fixed":"4dacdb9720aaab10b6be121eae55820174d97174"},{"fixed":"e8c1e606dab8c56cf074b43b98d0805de7322ba2"},{"fixed":"585e6bc7d0a9bf73a8be3d3fb34e86b90cc61a14"},{"fixed":"128e82e41cf7d74a562726c1587d9d2ede1a0a37"},{"fixed":"c3d0857b7fc2c49f68f89128a5440176089a8f54"},{"fixed":"afdcfd3d6fcdeca2735ca8d994c5f2d24a368f0a"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"0"},{"last_affected":"96ea4801d2035f89fc4ec4a67f49a18c35cb6715"},{"last_affected":"075b4e6a982d38121250c090f7b9294314ac1b19"},{"last_affected":"436e52f1a628233f080605dd736594df250897ca"},{"last_affected":"1c8d316294916da7e2a2f1f178ca3f3bd6d7b531"},{"last_affected":"927c3fa44e24300eb827ab9f9dacce6dff9c9bb7"}]}],"versions":["v2.6.34.9","v2.6.34.8","v2.6.37","v2.6.35.11","v2.6.33.7","v2.6.37.2","v2.6.32.29","v2.6.37.1","v2.6.32.28","v2.6.35.10","v2.6.37-rc4","v2.6.37-rc2","v2.6.36","v2.6.32.27","v2.6.37-rc5","v2.6.34.7","v2.6.37-rc8","v2.6.37-rc7","v2.6.37-rc6","v2.6.37-rc1","v2.6.35.9","v2.6.32.26","v2.6.37-rc3","v2.6.35.8","v2.6.32.25","v2.6.35.7","v2.6.32.24","v2.6.36-rc6","v2.6.35-rc4","v2.6.36-rc8","v2.6.35","v2.6.36-rc7","v2.6.36-rc3","v2.6.36-rc5","v2.6.32.23","v2.6.35.6","v2.6.36-rc4","v2.6.32.22","v2.6.35.5","v2.6.35.4","v2.6.32.21","v2.6.34.6","v2.6.36-rc2","v2.6.36-rc1","v2.6.35.3","v2.6.34.5","v2.6.32.20","v2.6.35.2","v2.6.34.4","v2.6.32.19","v2.6.35.1","v2.6.34.3","v2.6.32.18","v2.6.32.17","v2.6.34.2","v2.6.35-rc5","v2.6.34.1","v2.6.33.6","v2.6.32.16","v2.6.35-rc6","v2.6.34","v2.6.35-rc3","v2.6.35-rc1","v2.6.33.5","v2.6.32.15","v2.6.35-rc2","v2.6.32.14","v2.6.33.4","v2.6.34-rc7","v2.6.32.13","v2.6.33.3","v2.6.32.12","v2.6.34-rc6","v2.6.34-rc5","v2.6.34-rc4","v2.6.33.2","v2.6.32.11","v2.6.34-rc3","v2.6.34-rc2","v2.6.33.1","v2.6.32.10","v2.6.34-rc1","v2.6.33","v2.6.32.9","v2.6.33-rc6","v2.6.33-rc8","v2.6.32.8","v2.6.33-rc4","v2.6.33-rc5","v2.6.33-rc3","v2.6.33-rc7","v2.6.32.7","v2.6.32.6","v2.6.32.5","v2.6.33-rc2","v2.6.32.4","v2.6.32.3","v2.6.32","v2.6.32.2","v2.6.33-rc1","v2.6.32.1","v2.6.32-rc8","v2.6.32-rc7","v2.6.32-rc6","v2.6.31","v2.6.32-rc5","v2.6.32-rc4","v2.6.32-rc2","v2.6.32-rc1","v2.6.32-rc3","v2.6.31-rc9","v2.6.31-rc1","v2.6.31-rc7","v2.6.31-rc8","v2.6.31-rc6","v2.6.30-rc6","v2.6.30","v2.6.31-rc4","v2.6.31-rc5","v2.6.31-rc3","v2.6.31-rc2","v2.6.30-rc7","v2.6.30-rc8","v2.6.30-rc5","v2.6.30-rc3","v2.6.30-rc4","v2.6.30-rc1","v2.6.30-rc2","v2.6.29","v2.6.29-rc8","v2.6.29-rc7","v2.6.29-rc5","v2.6.29-rc1","v2.6.29-rc6","v2.6.29-rc4","v2.6.29-rc3","v2.6.29-rc2","v2.6.28","v2.6.28-rc7","v2.6.28-rc9","v2.6.28-rc8","v2.6.28-rc6","v2.6.28-rc5","v2.6.28-rc4","v2.6.28-rc2","v2.6.28-rc3","v2.6.28-rc1","v2.6.27","v2.6.27-rc7","v2.6.27-rc9","v2.6.27-rc8","v2.6.27-rc5","v2.6.27-rc6","v2.6.27-rc4","v2.6.27-rc1","v2.6.27-rc3","v2.6.27-rc2","v2.6.26","v2.6.26-rc9","v2.6.26-rc8","v2.6.26-rc3","v2.6.26-rc7","v2.6.26-rc6","v2.6.26-rc5","v2.6.26-rc4","v2.6.26-rc2","v2.6.26-rc1","v2.6.25","v2.6.25-rc7","v2.6.25-rc9","v2.6.25-rc8","v2.6.25-rc6","v2.6.25-rc5","v2.6.25-rc3","v2.6.25-rc4","v2.6.24","v2.6.25-rc2","v2.6.25-rc1","v2.6.24-rc8","v2.6.24-rc7","v2.6.24-rc6","v2.6.24-rc5","v2.6.24-rc4","v2.6.24-rc3","v2.6.24-rc2","v2.6.24-rc1","v2.6.23","v2.6.23-rc9","v2.6.23-rc8","v2.6.23-rc5","v2.6.23-rc7","v2.6.23-rc6","v2.6.23-rc4","v2.6.23-rc3","v2.6.23-rc2","v2.6.23-rc1","v2.6.22","v2.6.22-rc7","v2.6.22-rc6","v2.6.22-rc5","v2.6.22-rc4","v2.6.22-rc3","v2.6.22-rc2","v2.6.22-rc1","v2.6.21","v2.6.21-rc7","v2.6.21-rc6","v2.6.21-rc5","v2.6.21-rc4","v2.6.21-rc3","v2.6.21-rc2","v2.6.21-rc1","v2.6.20-rc7","v2.6.20-rc6","v2.6.20-rc5","v2.6.20-rc4","v2.6.20-rc3","v2.6.20-rc1","v2.6.20-rc2","v2.6.19-rc2","v2.6.18","v2.6.19-rc1","v2.6.18-rc6","v2.6.18-rc5","v2.6.18-rc3","v2.6.18-rc2","v2.6.18-rc1","v2.6.17","v2.6.17-rc4","v2.6.17-rc6","v2.6.17-rc5","v2.6.17-rc3","v2.6.17-rc2","v2.6.17-rc1","v2.6.16","v2.6.16-rc6","v2.6.16-rc4","v2.6.16-rc5","v2.6.16-rc3","v2.6.16-rc2","v2.6.16-rc1","v2.6.15-rc7","v2.6.15-rc5","v2.6.15-rc4","v2.6.15-rc2","v2.6.15-rc1","v2.6.14-rc3","v2.6.14-rc2","v2.6.14-rc1","v2.6.13","v2.6.13-rc7","v2.6.13-rc6","v2.6.13-rc5","v2.6.13-rc3","v2.6.13-rc4","v2.6.13-rc2","v2.6.13-rc1","v2.6.12-rc4","v2.6.12-rc3","v2.6.12-rc2"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-43883.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"2.6.38"},{"fixed":"4.19.320"}]},{"type":"ECOSYSTEM","events":[{"introduced":"4.20.0"},{"fixed":"5.4.282"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.5.0"},{"fixed":"5.10.224"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.11.0"},{"fixed":"5.15.165"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"6.1.105"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.2.0"},{"fixed":"6.6.46"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.7.0"},{"fixed":"6.10.5"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-43883.json"}}],"schema_version":"1.7.5"}