CVE-2024-53203
Published: January 1, 2025Last modified: January 1, 2025
Description
In the Linux kernel, the following vulnerability has been resolved: usb: typec: fix potential array underflow in ucsi_ccg_sync_control() The "command" variable can be controlled by the user via debugfs. The worry is that if con_index is zero then "&uc->ucsi->connector[con_index - 1]" would be an array underflow.
Severity score breakdown
Parameter | Value |
---|---|
Base score | 7.8 |
Attack Vector | LOCAL |
Attack complexity | LOW |
Privileges required | LOW |
User interaction | NONE |
Scope | UNCHANGED |
Confidentiality | HIGH |
Integrity impact | HIGH |
Availability impact | HIGH |
Vector | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
Status
Product | Release | Package | Status |
---|---|---|---|
Alpaquita Linux | 23 LTS | linux-lts | Vulnerable (6.1.134-r0) |
Stream | linux-lts | Fixed (6.6.89-r0) |
References
- https://git.kernel.org/stable/c/0e66fd8e5a2e45c7dacfc9178ba702153f4a61a8
- https://git.kernel.org/stable/c/56971710cd541f2f05160a84b3183477d34a1be9
- https://git.kernel.org/stable/c/e15fd96c0b701c53f9006bcc836eaeb35a05a023
- https://git.kernel.org/stable/c/e44189455c62469eb91d383ce9103d54c1f807a3
- https://git.kernel.org/stable/c/e56aac6e5a25630645607b6856d4b2a17b2311a5
- https://git.kernel.org/stable/c/ef92cd55289a282910575c5b9d87f646f2d39b38