CVE-2021-46980 (GCVE-0-2021-46980)
Vulnerability from cvelistv5
Published
2024-02-28 08:13
Modified
2025-05-04 07:01
Severity ?
Summary
In the Linux kernel, the following vulnerability has been resolved: usb: typec: ucsi: Retrieve all the PDOs instead of just the first 4 commit 4dbc6a4ef06d ("usb: typec: ucsi: save power data objects in PD mode") introduced retrieval of the PDOs when connected to a PD-capable source. But only the first 4 PDOs are received since that is the maximum number that can be fetched at a time given the MESSAGE_IN length limitation (16 bytes). However, as per the PD spec a connected source may advertise up to a maximum of 7 PDOs. If such a source is connected it's possible the PPM could have negotiated a power contract with one of the PDOs at index greater than 4, and would be reflected in the request data object's (RDO) object position field. This would result in an out-of-bounds access when the rdo_index() is used to index into the src_pdos array in ucsi_psy_get_voltage_now(). With the help of the UBSAN -fsanitize=array-bounds checker enabled this exact issue is revealed when connecting to a PD source adapter that advertise 5 PDOs and the PPM enters a contract having selected the 5th one. [ 151.545106][ T70] Unexpected kernel BRK exception at EL1 [ 151.545112][ T70] Internal error: BRK handler: f2005512 [#1] PREEMPT SMP ... [ 151.545499][ T70] pc : ucsi_psy_get_prop+0x208/0x20c [ 151.545507][ T70] lr : power_supply_show_property+0xc0/0x328 ... [ 151.545542][ T70] Call trace: [ 151.545544][ T70] ucsi_psy_get_prop+0x208/0x20c [ 151.545546][ T70] power_supply_uevent+0x1a4/0x2f0 [ 151.545550][ T70] dev_uevent+0x200/0x384 [ 151.545555][ T70] kobject_uevent_env+0x1d4/0x7e8 [ 151.545557][ T70] power_supply_changed_work+0x174/0x31c [ 151.545562][ T70] process_one_work+0x244/0x6f0 [ 151.545564][ T70] worker_thread+0x3e0/0xa64 We can resolve this by instead retrieving and storing up to the maximum of 7 PDOs in the con->src_pdos array. This would involve two calls to the GET_PDOS command.
Impacted products
Vendor Product Version
Linux Linux Version: 4dbc6a4ef06d6a79ff91be6fc2e90f8660031ce0
Version: 4dbc6a4ef06d6a79ff91be6fc2e90f8660031ce0
Version: 4dbc6a4ef06d6a79ff91be6fc2e90f8660031ce0
Version: 4dbc6a4ef06d6a79ff91be6fc2e90f8660031ce0
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2021-46980",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-02-28T20:37:53.449326Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-06-04T17:13:09.787Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T05:24:37.898Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/e5366bea0277425e1868ba20eeb27c879d5a6e2d"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/a453bfd7ef15fd9d524004d3ca7b05353a302911"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/5e9c6f58b01e6fdfbc740390c01f542a35c97e57"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/1f4642b72be79757f050924a9b9673b6a02034bc"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "drivers/usb/typec/ucsi/ucsi.c",
            "drivers/usb/typec/ucsi/ucsi.h"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "e5366bea0277425e1868ba20eeb27c879d5a6e2d",
              "status": "affected",
              "version": "4dbc6a4ef06d6a79ff91be6fc2e90f8660031ce0",
              "versionType": "git"
            },
            {
              "lessThan": "a453bfd7ef15fd9d524004d3ca7b05353a302911",
              "status": "affected",
              "version": "4dbc6a4ef06d6a79ff91be6fc2e90f8660031ce0",
              "versionType": "git"
            },
            {
              "lessThan": "5e9c6f58b01e6fdfbc740390c01f542a35c97e57",
              "status": "affected",
              "version": "4dbc6a4ef06d6a79ff91be6fc2e90f8660031ce0",
              "versionType": "git"
            },
            {
              "lessThan": "1f4642b72be79757f050924a9b9673b6a02034bc",
              "status": "affected",
              "version": "4dbc6a4ef06d6a79ff91be6fc2e90f8660031ce0",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "drivers/usb/typec/ucsi/ucsi.c",
            "drivers/usb/typec/ucsi/ucsi.h"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "5.8"
            },
            {
              "lessThan": "5.8",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.10.*",
              "status": "unaffected",
              "version": "5.10.38",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.11.*",
              "status": "unaffected",
              "version": "5.11.22",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.12.*",
              "status": "unaffected",
              "version": "5.12.5",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "5.13",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.10.38",
                  "versionStartIncluding": "5.8",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.11.22",
                  "versionStartIncluding": "5.8",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.12.5",
                  "versionStartIncluding": "5.8",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.13",
                  "versionStartIncluding": "5.8",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: typec: ucsi: Retrieve all the PDOs instead of just the first 4\n\ncommit 4dbc6a4ef06d (\"usb: typec: ucsi: save power data objects\nin PD mode\") introduced retrieval of the PDOs when connected to a\nPD-capable source. But only the first 4 PDOs are received since\nthat is the maximum number that can be fetched at a time given the\nMESSAGE_IN length limitation (16 bytes). However, as per the PD spec\na connected source may advertise up to a maximum of 7 PDOs.\n\nIf such a source is connected it\u0027s possible the PPM could have\nnegotiated a power contract with one of the PDOs at index greater\nthan 4, and would be reflected in the request data object\u0027s (RDO)\nobject position field. This would result in an out-of-bounds access\nwhen the rdo_index() is used to index into the src_pdos array in\nucsi_psy_get_voltage_now().\n\nWith the help of the UBSAN -fsanitize=array-bounds checker enabled\nthis exact issue is revealed when connecting to a PD source adapter\nthat advertise 5 PDOs and the PPM enters a contract having selected\nthe 5th one.\n\n[  151.545106][   T70] Unexpected kernel BRK exception at EL1\n[  151.545112][   T70] Internal error: BRK handler: f2005512 [#1] PREEMPT SMP\n...\n[  151.545499][   T70] pc : ucsi_psy_get_prop+0x208/0x20c\n[  151.545507][   T70] lr : power_supply_show_property+0xc0/0x328\n...\n[  151.545542][   T70] Call trace:\n[  151.545544][   T70]  ucsi_psy_get_prop+0x208/0x20c\n[  151.545546][   T70]  power_supply_uevent+0x1a4/0x2f0\n[  151.545550][   T70]  dev_uevent+0x200/0x384\n[  151.545555][   T70]  kobject_uevent_env+0x1d4/0x7e8\n[  151.545557][   T70]  power_supply_changed_work+0x174/0x31c\n[  151.545562][   T70]  process_one_work+0x244/0x6f0\n[  151.545564][   T70]  worker_thread+0x3e0/0xa64\n\nWe can resolve this by instead retrieving and storing up to the\nmaximum of 7 PDOs in the con-\u003esrc_pdos array. This would involve\ntwo calls to the GET_PDOS command."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-05-04T07:01:39.641Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/e5366bea0277425e1868ba20eeb27c879d5a6e2d"
        },
        {
          "url": "https://git.kernel.org/stable/c/a453bfd7ef15fd9d524004d3ca7b05353a302911"
        },
        {
          "url": "https://git.kernel.org/stable/c/5e9c6f58b01e6fdfbc740390c01f542a35c97e57"
        },
        {
          "url": "https://git.kernel.org/stable/c/1f4642b72be79757f050924a9b9673b6a02034bc"
        }
      ],
      "title": "usb: typec: ucsi: Retrieve all the PDOs instead of just the first 4",
      "x_generator": {
        "engine": "bippy-1.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2021-46980",
    "datePublished": "2024-02-28T08:13:10.357Z",
    "dateReserved": "2024-02-27T18:42:55.945Z",
    "dateUpdated": "2025-05-04T07:01:39.641Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2021-46980\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2024-02-28T09:15:37.273\",\"lastModified\":\"2024-12-31T16:06:11.213\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nusb: typec: ucsi: Retrieve all the PDOs instead of just the first 4\\n\\ncommit 4dbc6a4ef06d (\\\"usb: typec: ucsi: save power data objects\\nin PD mode\\\") introduced retrieval of the PDOs when connected to a\\nPD-capable source. But only the first 4 PDOs are received since\\nthat is the maximum number that can be fetched at a time given the\\nMESSAGE_IN length limitation (16 bytes). However, as per the PD spec\\na connected source may advertise up to a maximum of 7 PDOs.\\n\\nIf such a source is connected it\u0027s possible the PPM could have\\nnegotiated a power contract with one of the PDOs at index greater\\nthan 4, and would be reflected in the request data object\u0027s (RDO)\\nobject position field. This would result in an out-of-bounds access\\nwhen the rdo_index() is used to index into the src_pdos array in\\nucsi_psy_get_voltage_now().\\n\\nWith the help of the UBSAN -fsanitize=array-bounds checker enabled\\nthis exact issue is revealed when connecting to a PD source adapter\\nthat advertise 5 PDOs and the PPM enters a contract having selected\\nthe 5th one.\\n\\n[  151.545106][   T70] Unexpected kernel BRK exception at EL1\\n[  151.545112][   T70] Internal error: BRK handler: f2005512 [#1] PREEMPT SMP\\n...\\n[  151.545499][   T70] pc : ucsi_psy_get_prop+0x208/0x20c\\n[  151.545507][   T70] lr : power_supply_show_property+0xc0/0x328\\n...\\n[  151.545542][   T70] Call trace:\\n[  151.545544][   T70]  ucsi_psy_get_prop+0x208/0x20c\\n[  151.545546][   T70]  power_supply_uevent+0x1a4/0x2f0\\n[  151.545550][   T70]  dev_uevent+0x200/0x384\\n[  151.545555][   T70]  kobject_uevent_env+0x1d4/0x7e8\\n[  151.545557][   T70]  power_supply_changed_work+0x174/0x31c\\n[  151.545562][   T70]  process_one_work+0x244/0x6f0\\n[  151.545564][   T70]  worker_thread+0x3e0/0xa64\\n\\nWe can resolve this by instead retrieving and storing up to the\\nmaximum of 7 PDOs in the con-\u003esrc_pdos array. This would involve\\ntwo calls to the GET_PDOS command.\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: usb: typec: ucsi: recupera todos los PDO en lugar de solo los primeros 4 commits 4dbc6a4ef06d (\\\"usb: typec: ucsi: guarda objetos de datos de energ\u00eda en modo PD\\\") introdujo la recuperaci\u00f3n de los PDO cuando se conectan a una fuente compatible con PD. Pero solo se reciben los primeros 4 PDO, ya que ese es el n\u00famero m\u00e1ximo que se puede recuperar a la vez dada la limitaci\u00f3n de longitud de MESSAGE_IN (16 bytes). Sin embargo, seg\u00fan las especificaciones de PD, una fuente conectada puede anunciar hasta un m\u00e1ximo de 7 PDO. Si dicha fuente est\u00e1 conectada, es posible que el PPM haya negociado un contrato de energ\u00eda con uno de los PDO con un \u00edndice mayor que 4, y se reflejar\u00eda en el campo de posici\u00f3n del objeto del objeto de datos de solicitud (RDO). Esto dar\u00eda como resultado un acceso fuera de los l\u00edmites cuando se usa rdo_index() para indexar en la matriz src_pdos en ucsi_psy_get_voltage_now(). Con la ayuda del verificador UBSAN -fsanitize=array-bounds habilitado, este problema exacto se revela cuando se conecta a un adaptador de fuente PD que anuncia 5 PDO y el PPM firma un contrato despu\u00e9s de seleccionar el quinto. [ 151.545106][ T70] Excepci\u00f3n inesperada de BRK del kernel en EL1 [ 151.545112][ T70] Error interno: controlador BRK: f2005512 [#1] SMP PREEMPT ... [ 151.545499][ T70] pc : ucsi_psy_get_prop+0x208/0x20c [ 151.545507 ] [ T70] lr : power_supply_show_property+0xc0/0x328 ... [ 151.545542][ T70] Rastreo de llamadas: [ 151.545544][ T70] ucsi_psy_get_prop+0x208/0x20c [ 151.545546][ T70] power_supply_uevent+0x1a4/0x 2f0 [151.545550][T70] dev_uevent+0x200/0x384 [ 151.545555][ T70] kobject_uevent_env+0x1d4/0x7e8 [ 151.545557][ T70] power_supply_changed_work+0x174/0x31c [ 151.545562][ T70] Process_one_work+0x244/0 x6f0 [ 151.545564][ T70] work_thread+0x3e0/0xa64 Nosotros Puede resolver esto recuperando y almacenando hasta un m\u00e1ximo de 7 PDO en la matriz con-\u0026gt;src_pdos. Esto implicar\u00eda dos llamadas al comando GET_PDOS.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H\",\"baseScore\":7.1,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.2}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-125\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.8\",\"versionEndExcluding\":\"5.10.38\",\"matchCriteriaId\":\"48EEEAD2-D08A-422C-8830-6CCF86E89E64\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.11\",\"versionEndExcluding\":\"5.11.22\",\"matchCriteriaId\":\"83B53E9A-F426-4C03-9A5F-A931FF79827E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.12\",\"versionEndExcluding\":\"5.12.5\",\"matchCriteriaId\":\"0274929A-B36C-4F4C-AB22-30A0DD6B995B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"0CBAD0FC-C281-4666-AB2F-F8E6E1165DF7\"}]}]}],\"references\":[{\"url\":\"https://git.kernel.org/stable/c/1f4642b72be79757f050924a9b9673b6a02034bc\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/5e9c6f58b01e6fdfbc740390c01f542a35c97e57\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/a453bfd7ef15fd9d524004d3ca7b05353a302911\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/e5366bea0277425e1868ba20eeb27c879d5a6e2d\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/1f4642b72be79757f050924a9b9673b6a02034bc\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/5e9c6f58b01e6fdfbc740390c01f542a35c97e57\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/a453bfd7ef15fd9d524004d3ca7b05353a302911\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/e5366bea0277425e1868ba20eeb27c879d5a6e2d\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://git.kernel.org/stable/c/e5366bea0277425e1868ba20eeb27c879d5a6e2d\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/a453bfd7ef15fd9d524004d3ca7b05353a302911\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/5e9c6f58b01e6fdfbc740390c01f542a35c97e57\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/1f4642b72be79757f050924a9b9673b6a02034bc\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-04T05:24:37.898Z\"}}, {\"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2021-46980\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-02-28T20:37:53.449326Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-05-23T19:01:13.841Z\"}, \"title\": \"CISA ADP Vulnrichment\"}], \"cna\": {\"title\": \"usb: typec: ucsi: Retrieve all the PDOs instead of just the first 4\", \"affected\": [{\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"4dbc6a4ef06d6a79ff91be6fc2e90f8660031ce0\", \"lessThan\": \"e5366bea0277425e1868ba20eeb27c879d5a6e2d\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"4dbc6a4ef06d6a79ff91be6fc2e90f8660031ce0\", \"lessThan\": \"a453bfd7ef15fd9d524004d3ca7b05353a302911\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"4dbc6a4ef06d6a79ff91be6fc2e90f8660031ce0\", \"lessThan\": \"5e9c6f58b01e6fdfbc740390c01f542a35c97e57\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"4dbc6a4ef06d6a79ff91be6fc2e90f8660031ce0\", \"lessThan\": \"1f4642b72be79757f050924a9b9673b6a02034bc\", \"versionType\": \"git\"}], \"programFiles\": [\"drivers/usb/typec/ucsi/ucsi.c\", \"drivers/usb/typec/ucsi/ucsi.h\"], \"defaultStatus\": \"unaffected\"}, {\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"5.8\"}, {\"status\": \"unaffected\", \"version\": \"0\", \"lessThan\": \"5.8\", \"versionType\": \"semver\"}, {\"status\": \"unaffected\", \"version\": \"5.10.38\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.10.*\"}, {\"status\": \"unaffected\", \"version\": \"5.11.22\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.11.*\"}, {\"status\": \"unaffected\", \"version\": \"5.12.5\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.12.*\"}, {\"status\": \"unaffected\", \"version\": \"5.13\", \"versionType\": \"original_commit_for_fix\", \"lessThanOrEqual\": \"*\"}], \"programFiles\": [\"drivers/usb/typec/ucsi/ucsi.c\", \"drivers/usb/typec/ucsi/ucsi.h\"], \"defaultStatus\": \"affected\"}], \"references\": [{\"url\": \"https://git.kernel.org/stable/c/e5366bea0277425e1868ba20eeb27c879d5a6e2d\"}, {\"url\": \"https://git.kernel.org/stable/c/a453bfd7ef15fd9d524004d3ca7b05353a302911\"}, {\"url\": \"https://git.kernel.org/stable/c/5e9c6f58b01e6fdfbc740390c01f542a35c97e57\"}, {\"url\": \"https://git.kernel.org/stable/c/1f4642b72be79757f050924a9b9673b6a02034bc\"}], \"x_generator\": {\"engine\": \"bippy-1.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\nusb: typec: ucsi: Retrieve all the PDOs instead of just the first 4\\n\\ncommit 4dbc6a4ef06d (\\\"usb: typec: ucsi: save power data objects\\nin PD mode\\\") introduced retrieval of the PDOs when connected to a\\nPD-capable source. But only the first 4 PDOs are received since\\nthat is the maximum number that can be fetched at a time given the\\nMESSAGE_IN length limitation (16 bytes). However, as per the PD spec\\na connected source may advertise up to a maximum of 7 PDOs.\\n\\nIf such a source is connected it\u0027s possible the PPM could have\\nnegotiated a power contract with one of the PDOs at index greater\\nthan 4, and would be reflected in the request data object\u0027s (RDO)\\nobject position field. This would result in an out-of-bounds access\\nwhen the rdo_index() is used to index into the src_pdos array in\\nucsi_psy_get_voltage_now().\\n\\nWith the help of the UBSAN -fsanitize=array-bounds checker enabled\\nthis exact issue is revealed when connecting to a PD source adapter\\nthat advertise 5 PDOs and the PPM enters a contract having selected\\nthe 5th one.\\n\\n[  151.545106][   T70] Unexpected kernel BRK exception at EL1\\n[  151.545112][   T70] Internal error: BRK handler: f2005512 [#1] PREEMPT SMP\\n...\\n[  151.545499][   T70] pc : ucsi_psy_get_prop+0x208/0x20c\\n[  151.545507][   T70] lr : power_supply_show_property+0xc0/0x328\\n...\\n[  151.545542][   T70] Call trace:\\n[  151.545544][   T70]  ucsi_psy_get_prop+0x208/0x20c\\n[  151.545546][   T70]  power_supply_uevent+0x1a4/0x2f0\\n[  151.545550][   T70]  dev_uevent+0x200/0x384\\n[  151.545555][   T70]  kobject_uevent_env+0x1d4/0x7e8\\n[  151.545557][   T70]  power_supply_changed_work+0x174/0x31c\\n[  151.545562][   T70]  process_one_work+0x244/0x6f0\\n[  151.545564][   T70]  worker_thread+0x3e0/0xa64\\n\\nWe can resolve this by instead retrieving and storing up to the\\nmaximum of 7 PDOs in the con-\u003esrc_pdos array. This would involve\\ntwo calls to the GET_PDOS command.\"}], \"cpeApplicability\": [{\"nodes\": [{\"negate\": false, \"cpeMatch\": [{\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.10.38\", \"versionStartIncluding\": \"5.8\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.11.22\", \"versionStartIncluding\": \"5.8\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.12.5\", \"versionStartIncluding\": \"5.8\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.13\", \"versionStartIncluding\": \"5.8\"}], \"operator\": \"OR\"}]}], \"providerMetadata\": {\"orgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"shortName\": \"Linux\", \"dateUpdated\": \"2025-05-04T07:01:39.641Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2021-46980\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-05-04T07:01:39.641Z\", \"dateReserved\": \"2024-02-27T18:42:55.945Z\", \"assignerOrgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"datePublished\": \"2024-02-28T08:13:10.357Z\", \"assignerShortName\": \"Linux\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…