Bug 2327199 (CVE-2024-50268) - CVE-2024-50268 kernel: usb: typec: fix potential out of bounds in ucsi_ccg_update_set_new_cam_cmd()
Summary: CVE-2024-50268 kernel: usb: typec: fix potential out of bounds in ucsi_ccg_up...
Keywords:
Status: NEW
Alias: CVE-2024-50268
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On: 2327220
Blocks:
TreeView+ depends on / blocked
 
Reported: 2024-11-19 02:03 UTC by OSIDB Bzimport
Modified: 2024-12-18 04:12 UTC (History)
4 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2024-11-19 02:03:27 UTC
In the Linux kernel, the following vulnerability has been resolved:

usb: typec: fix potential out of bounds in ucsi_ccg_update_set_new_cam_cmd()

The "*cmd" variable can be controlled by the user via debugfs.  That means
"new_cam" can be as high as 255 while the size of the uc->updated[] array
is UCSI_MAX_ALTMODES (30).

The call tree is:
ucsi_cmd() // val comes from simple_attr_write_xsigned()
-> ucsi_send_command()
   -> ucsi_send_command_common()
      -> ucsi_run_command() // calls ucsi->ops->sync_control()
         -> ucsi_ccg_sync_control()

Comment 1 Avinash Hanwate 2024-11-19 04:29:14 UTC
Upstream advisory:
https://lore.kernel.org/linux-cve-announce/2024111925-CVE-2024-50268-9b55@gregkh/T


Note You need to log in before you can comment on or make changes to this bug.