In the Linux kernel, the following vulnerability has been resolved:
usb: typec: tcpm: fix use-after-free case in tcpm_register_source_caps
There could be a potential use-after-free case in
tcpm_register_source_caps(). This could happen when:
* new (say invalid) source caps are advertised
* the existing source caps are unregistered
* tcpm_register_source_caps() returns with an error as
usb_power_delivery_register_capabilities() fails
This causes port->partner_source_caps to hold on to the now freed source
caps.
Reset port->partner_source_caps value to NULL after unregistering
existing source caps.
Metrics
Affected Vendors & Products
References
History
Thu, 12 Sep 2024 08:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 11 Sep 2024 13:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
MITRE
Status: PUBLISHED
Assigner: Linux
Published: 2024-07-12T12:20:44.367Z
Updated: 2024-09-11T17:34:38.436Z
Reserved: 2024-07-12T12:17:45.579Z
Link: CVE-2024-40903
Vulnrichment
Updated: 2024-08-02T04:39:54.867Z
NVD
Status : Analyzed
Published: 2024-07-12T13:15:13.660
Modified: 2024-07-24T19:01:54.317
Link: CVE-2024-40903
Redhat