Skip to main content

CVE-2024-53149: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2024-53149cvecve-2024-53149
Published: Tue Dec 24 2024 (12/24/2024, 11:28:49 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: usb: typec: ucsi: glink: fix off-by-one in connector_status UCSI connector's indices start from 1 up to 3, PMIC_GLINK_MAX_PORTS. Correct the condition in the pmic_glink_ucsi_connector_status() callback, fixing Type-C orientation reporting for the third USB-C connector.

AI-Powered Analysis

AILast updated: 06/28/2025, 10:10:23 UTC

Technical Analysis

CVE-2024-53149 addresses a vulnerability in the Linux kernel's USB Type-C subsystem, specifically within the UCSI (USB Type-C Connector System Software Interface) implementation that manages USB-C connector status reporting via the PMIC (Power Management Integrated Circuit) GLINK interface. The vulnerability is an off-by-one error in the function pmic_glink_ucsi_connector_status(), which incorrectly handles the indexing of USB-C connectors. The UCSI connector indices are defined to start from 1 and go up to 3 (PMIC_GLINK_MAX_PORTS). However, the flawed condition in the code mishandles the third connector's status reporting, leading to incorrect Type-C orientation reporting for that connector. This bug could cause the system to misinterpret the orientation or status of the third USB-C port, potentially affecting device connectivity or power delivery negotiation. The vulnerability does not appear to allow direct code execution or privilege escalation but could degrade USB-C functionality or cause unexpected behavior in devices relying on accurate connector status. The issue was resolved by correcting the boundary condition in the kernel code. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet.

Potential Impact

For European organizations, the impact of CVE-2024-53149 is primarily related to hardware interoperability and device usability rather than direct security compromise. Organizations relying on Linux-based systems with multiple USB-C ports, especially those using hardware with three or more USB-C connectors managed via PMIC GLINK and UCSI, may experience issues such as incorrect detection of USB-C cable orientation or failure in power delivery negotiation on the affected port. This could lead to intermittent connectivity problems, device charging failures, or degraded peripheral functionality. In sectors where reliable USB-C connectivity is critical—such as manufacturing, research labs, or enterprises using Linux workstations and servers with USB-C peripherals—this could cause operational disruptions. However, since there is no indication of privilege escalation or data breach potential, the confidentiality and integrity impacts are minimal. Availability could be affected if USB-C dependent devices fail to operate correctly, but this is limited to the third USB-C connector and specific hardware configurations. Overall, the threat is more of a functional bug than a severe security risk.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should prioritize updating their Linux kernel to the patched version that corrects the off-by-one error in the pmic_glink_ucsi_connector_status() function. Kernel updates should be applied promptly on all affected systems, especially those with hardware featuring multiple USB-C ports managed by PMIC GLINK interfaces. Organizations should verify their hardware configurations to identify systems with three or more USB-C connectors and test USB-C functionality post-update to ensure correct orientation reporting. Additionally, system administrators should monitor USB-C device behavior for anomalies and consider temporary workarounds such as limiting usage of the third USB-C port if updates cannot be immediately applied. Vendors and hardware manufacturers should be engaged to confirm compatibility and firmware updates if necessary. Since no known exploits exist, immediate emergency response is not required, but proactive patch management is recommended to prevent potential operational issues.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-11-19T17:17:24.998Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9823c4522896dcbded5c

Added to database: 5/21/2025, 9:08:51 AM

Last enriched: 6/28/2025, 10:10:23 AM

Last updated: 8/18/2025, 11:25:12 PM

Views: 21

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats