First published: Tue Nov 19 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: usb: typec: fix potential out of bounds in ucsi_ccg_update_set_new_cam_cmd() The "*cmd" variable can be controlled by the user via debugfs. That means "new_cam" can be as high as 255 while the size of the uc->updated[] array is UCSI_MAX_ALTMODES (30). The call tree is: ucsi_cmd() // val comes from simple_attr_write_xsigned() -> ucsi_send_command() -> ucsi_send_command_common() -> ucsi_run_command() // calls ucsi->ops->sync_control() -> ucsi_ccg_sync_control()
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Linux kernel | >=5.6<5.10.230 | |
Linux Linux kernel | >=5.11<5.15.172 | |
Linux Linux kernel | >=5.16<6.1.117 | |
Linux Linux kernel | >=6.2<6.6.61 | |
Linux Linux kernel | >=6.7<6.11.8 | |
Linux Linux kernel | =6.12-rc1 | |
Linux Linux kernel | =6.12-rc2 | |
Linux Linux kernel | =6.12-rc3 | |
Linux Linux kernel | =6.12-rc4 | |
Linux Linux kernel | =6.12-rc5 | |
Linux Linux kernel | =6.12-rc6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.