SB2024070229 - Buffer overflow in Linux kernel typec ucsi driver
Published: July 2, 2024 Updated: May 13, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Buffer overflow (CVE-ID: CVE-2024-35924)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the ucsi_read_message_in(), ucsi_read_error(), ucsi_send_command() and ucsi_register() functions in drivers/usb/typec/ucsi/ucsi.c. A local user can perform a denial of service (DoS) attack.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/stable/c/266f403ec47573046dee4bcebda82777ce702c40
- https://git.kernel.org/stable/c/0defcaa09d3b21e8387829ee3a652c43fa91e13f
- https://git.kernel.org/stable/c/b3db266fb031fba88c423d4bb8983a73a3db6527
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.27
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.8.6