CVE-2024-50268

Source
https://cve.org/CVERecord?id=CVE-2024-50268
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-50268.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-50268
Downstream
Related
Published
2024-11-19T01:30:05.437Z
Modified
2026-03-11T07:51:44.482107756Z
Severity
  • 7.1 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H CVSS Calculator
Summary
usb: typec: fix potential out of bounds in ucsi_ccg_update_set_new_cam_cmd()
Details

In the Linux kernel, the following vulnerability has been resolved:

usb: typec: fix potential out of bounds in ucsiccgupdatesetnewcamcmd()

The "*cmd" variable can be controlled by the user via debugfs. That means "newcam" can be as high as 255 while the size of the uc->updated[] array is UCSIMAX_ALTMODES (30).

The call tree is: ucsicmd() // val comes from simpleattrwritexsigned() -> ucsisendcommand() -> ucsisendcommandcommon() -> ucsiruncommand() // calls ucsi->ops->synccontrol() -> ucsiccgsync_control()

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/50xxx/CVE-2024-50268.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
170a6726d0e266f2c8f306e3d61715c32f4ee41e
Fixed
d76923164705821aa1b01b8d9d1741f20c654ab4
Fixed
8f47984b35f3be0cfc652c2ca358d5768ea3456b
Fixed
604314ecd682913925980dc955caea2d036eab5f
Fixed
69e19774f15e12dda6c6c58001d059e30895009b
Fixed
3a2ba841659a0f15102585120dea75d8d5209616
Fixed
7dd08a0b4193087976db6b3ee7807de7e8316f96

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-50268.json"