{ "id": "CVE-2024-35924", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-19T11:15:48.653", "lastModified": "2024-11-21T09:21:12.833", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: typec: ucsi: Limit read size on v1.2\n\nBetween UCSI 1.2 and UCSI 2.0, the size of the MESSAGE_IN region was\nincreased from 16 to 256. In order to avoid overflowing reads for older\nsystems, add a mechanism to use the read UCSI version to truncate read\nsizes on UCSI v1.2." }, { "lang": "es", "value": "En el kernel de Linux se ha resuelto la siguiente vulnerabilidad: usb: typec: ucsi: Limitar el tama\u00f1o de lectura en v1.2 Entre UCSI 1.2 y UCSI 2.0, el tama\u00f1o de la regi\u00f3n MESSAGE_IN se increment\u00f3 de 16 a 256. Para evitar el desbordamiento lecturas para sistemas m\u00e1s antiguos, agregue un mecanismo para usar la versi\u00f3n de lectura UCSI para truncar los tama\u00f1os de lectura en UCSI v1.2." } ], "metrics": {}, "references": [ { "url": "https://git.kernel.org/stable/c/0defcaa09d3b21e8387829ee3a652c43fa91e13f", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" }, { "url": "https://git.kernel.org/stable/c/266f403ec47573046dee4bcebda82777ce702c40", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" }, { "url": "https://git.kernel.org/stable/c/b3db266fb031fba88c423d4bb8983a73a3db6527", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" }, { "url": "https://git.kernel.org/stable/c/0defcaa09d3b21e8387829ee3a652c43fa91e13f", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "https://git.kernel.org/stable/c/266f403ec47573046dee4bcebda82777ce702c40", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "https://git.kernel.org/stable/c/b3db266fb031fba88c423d4bb8983a73a3db6527", "source": "af854a3a-2127-422b-91ae-364da2661108" } ] }