CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
Low
EPSS
Percentile
5.1%
In the Linux kernel, the following vulnerability has been resolved:
usb: typec: tcpm: fix use-after-free case in tcpm_register_source_caps
There could be a potential use-after-free case in
tcpm_register_source_caps(). This could happen when:
git.kernel.org/linus/e7e921918d905544500ca7a95889f898121ba886 (6.10-rc4)
git.kernel.org/stable/c/04c05d50fa79a41582f7bde8a1fd4377ae4a39e5
git.kernel.org/stable/c/4053696594d7235f3638d49a00cf0f289e4b36a3
git.kernel.org/stable/c/6b67b652849faf108a09647c7fde9b179ef24e2b
git.kernel.org/stable/c/e7e921918d905544500ca7a95889f898121ba886
launchpad.net/bugs/cve/CVE-2024-40903
nvd.nist.gov/vuln/detail/CVE-2024-40903
security-tracker.debian.org/tracker/CVE-2024-40903
www.cve.org/CVERecord?id=CVE-2024-40903