Skip to main content

CVE-2024-35924: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2024-35924cvecve-2024-35924
Published: Sun May 19 2024 (05/19/2024, 10:10:35 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: usb: typec: ucsi: Limit read size on v1.2 Between UCSI 1.2 and UCSI 2.0, the size of the MESSAGE_IN region was increased from 16 to 256. In order to avoid overflowing reads for older systems, add a mechanism to use the read UCSI version to truncate read sizes on UCSI v1.2.

AI-Powered Analysis

AILast updated: 07/04/2025, 05:56:34 UTC

Technical Analysis

CVE-2024-35924 is a vulnerability identified in the Linux kernel's USB Type-C subsystem, specifically within the USB Type-C Connector System Software Interface (UCSI) driver. The issue arises from a mismatch in the expected size of the MESSAGE_IN region between UCSI versions 1.2 and 2.0. In UCSI 1.2, the MESSAGE_IN region size is 16 bytes, whereas in UCSI 2.0, it was increased to 256 bytes. The vulnerability occurs because older systems running UCSI 1.2 may not properly limit read operations to the smaller 16-byte size, potentially allowing an overflow when reading from the MESSAGE_IN region. This can lead to out-of-bounds reads, which may expose kernel memory contents or cause kernel instability. The patch introduced adds a mechanism to detect the UCSI version in use and truncate read sizes accordingly for UCSI 1.2, preventing overflow. This vulnerability is rooted in the kernel's USB Type-C driver code and affects Linux kernel versions that include the vulnerable UCSI implementation prior to the patch. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet.

Potential Impact

For European organizations, this vulnerability could have several impacts depending on the deployment environment. Linux is widely used in servers, desktops, and embedded devices across Europe, including critical infrastructure, government, and enterprise environments. Exploitation of this vulnerability could lead to kernel memory disclosure or denial of service through kernel crashes, potentially allowing attackers to gain sensitive information or disrupt services. Although no active exploits are known, the vulnerability affects the kernel's USB Type-C subsystem, which is commonly used in modern hardware for device connectivity. Organizations relying on Linux systems with USB Type-C hardware interfaces are at risk, especially if they use older kernel versions without the patch. This could impact data confidentiality and system availability, particularly in sectors with high reliance on Linux-based systems such as finance, telecommunications, and public administration.

Mitigation Recommendations

European organizations should promptly identify Linux systems running vulnerable kernel versions with UCSI 1.2 support. Specific mitigation steps include: 1) Applying the official Linux kernel patches that implement the read size truncation for UCSI 1.2 to prevent overflow conditions. 2) Updating Linux distributions to the latest stable kernel versions where this vulnerability is resolved. 3) For critical systems where immediate patching is not feasible, consider disabling USB Type-C interfaces or restricting physical access to USB ports to reduce attack surface. 4) Implement kernel hardening and monitoring to detect abnormal kernel behavior or crashes related to USB subsystem. 5) Engage with hardware vendors to ensure firmware compatibility and updates that support secure UCSI implementations. These targeted actions go beyond generic advice by focusing on the specific USB Type-C UCSI driver and its versioning nuances.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-05-17T13:50:33.125Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682cd0fa1484d88663aebfda

Added to database: 5/20/2025, 6:59:06 PM

Last enriched: 7/4/2025, 5:56:34 AM

Last updated: 8/11/2025, 8:42:07 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats