2024-12-08 03:06:42 +00:00

45 lines
2.1 KiB
JSON

{
"id": "CVE-2024-35924",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-05-19T11:15:48.653",
"lastModified": "2024-11-21T09:21:12.833",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: typec: ucsi: Limit read size on v1.2\n\nBetween UCSI 1.2 and UCSI 2.0, the size of the MESSAGE_IN region was\nincreased from 16 to 256. In order to avoid overflowing reads for older\nsystems, add a mechanism to use the read UCSI version to truncate read\nsizes on UCSI v1.2."
},
{
"lang": "es",
"value": "En el kernel de Linux se ha resuelto la siguiente vulnerabilidad: usb: typec: ucsi: Limitar el tama\u00f1o de lectura en v1.2 Entre UCSI 1.2 y UCSI 2.0, el tama\u00f1o de la regi\u00f3n MESSAGE_IN se increment\u00f3 de 16 a 256. Para evitar el desbordamiento lecturas para sistemas m\u00e1s antiguos, agregue un mecanismo para usar la versi\u00f3n de lectura UCSI para truncar los tama\u00f1os de lectura en UCSI v1.2."
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/0defcaa09d3b21e8387829ee3a652c43fa91e13f",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/266f403ec47573046dee4bcebda82777ce702c40",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/b3db266fb031fba88c423d4bb8983a73a3db6527",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/0defcaa09d3b21e8387829ee3a652c43fa91e13f",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://git.kernel.org/stable/c/266f403ec47573046dee4bcebda82777ce702c40",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://git.kernel.org/stable/c/b3db266fb031fba88c423d4bb8983a73a3db6527",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}