CVE-2024-53203

In the Linux kernel, the following vulnerability has been resolved: usb: typec: fix potential array underflow in ucsi_ccg_sync_control() The "command" variable can be controlled by the user via debugfs. The worry is that if con_index is zero then "&uc->ucsi->connector[con_index - 1]" would be an array underflow.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

25 Apr 2025, 11:15

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/0e66fd8e5a2e45c7dacfc9178ba702153f4a61a8 -

16 Jan 2025, 16:46

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
CWE CWE-129
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: usb: typec: se corrige un posible desbordamiento de matriz en ucsi_ccg_sync_control(). El usuario puede controlar la variable "command" a través de debugfs. La preocupación es que si con_index es cero, entonces "&uc->ucsi->connector[con_index - 1]" sería un desbordamiento de matriz.
First Time Linux linux Kernel
Linux
References () https://git.kernel.org/stable/c/56971710cd541f2f05160a84b3183477d34a1be9 - () https://git.kernel.org/stable/c/56971710cd541f2f05160a84b3183477d34a1be9 - Patch
References () https://git.kernel.org/stable/c/e56aac6e5a25630645607b6856d4b2a17b2311a5 - () https://git.kernel.org/stable/c/e56aac6e5a25630645607b6856d4b2a17b2311a5 - Patch
References () https://git.kernel.org/stable/c/ef92cd55289a282910575c5b9d87f646f2d39b38 - () https://git.kernel.org/stable/c/ef92cd55289a282910575c5b9d87f646f2d39b38 - Patch

27 Dec 2024, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-12-27 14:15

Updated : 2025-04-25 11:15


NVD link : CVE-2024-53203

Mitre link : CVE-2024-53203

CVE.ORG link : CVE-2024-53203


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-129

Improper Validation of Array Index