CVE-2024-53203

Source
https://cve.org/CVERecord?id=CVE-2024-53203
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-53203.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-53203
Downstream
Related
Published
2024-12-27T13:49:49.484Z
Modified
2026-03-20T12:40:49.138341Z
Summary
usb: typec: fix potential array underflow in ucsi_ccg_sync_control()
Details

In the Linux kernel, the following vulnerability has been resolved:

usb: typec: fix potential array underflow in ucsiccgsync_control()

The "command" variable can be controlled by the user via debugfs. The worry is that if conindex is zero then "&uc->ucsi->connector[conindex - 1]" would be an array underflow.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/53xxx/CVE-2024-53203.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
170a6726d0e266f2c8f306e3d61715c32f4ee41e
Fixed
627c2a5056aba42a8a96a8fffe8996aeccf919a9
Fixed
e15fd96c0b701c53f9006bcc836eaeb35a05a023
Fixed
e44189455c62469eb91d383ce9103d54c1f807a3
Fixed
0e66fd8e5a2e45c7dacfc9178ba702153f4a61a8
Fixed
ef92cd55289a282910575c5b9d87f646f2d39b38
Fixed
56971710cd541f2f05160a84b3183477d34a1be9
Fixed
e56aac6e5a25630645607b6856d4b2a17b2311a5

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-53203.json"