CVE-2023-52877

Source
https://cve.org/CVERecord?id=CVE-2023-52877
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-52877.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-52877
Downstream
Related
Published
2024-05-21T15:32:09.946Z
Modified
2026-03-14T12:16:53.383956Z
Summary
usb: typec: tcpm: Fix NULL pointer dereference in tcpm_pd_svdm()
Details

In the Linux kernel, the following vulnerability has been resolved:

usb: typec: tcpm: Fix NULL pointer dereference in tcpmpdsvdm()

It is possible that typecregisterpartner() returns ERR_PTR on failure. When port->partner is an error, a NULL pointer dereference may occur as shown below.

[91222.095236][ T319] typec port0: failed to register partner (-17) ... [91225.061491][ T319] Unable to handle kernel NULL pointer dereference at virtual address 000000000000039f [91225.274642][ T319] pc : tcpmpddatarequest+0x310/0x13fc [91225.274646][ T319] lr : tcpmpddatarequest+0x298/0x13fc [91225.308067][ T319] Call trace: [91225.308070][ T319] tcpmpddatarequest+0x310/0x13fc [91225.308073][ T319] tcpmpdrxhandler+0x100/0x9e8 [91225.355900][ T319] kthreadworkerfn+0x178/0x58c [91225.355902][ T319] kthread+0x150/0x200 [91225.355905][ T319] retfromfork+0x10/0x30

Add a check for port->partner to avoid dereferencing a NULL pointer.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/52xxx/CVE-2023-52877.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
5e1d4c49fbc86dab6e005d66f066bd53c9479cde
Fixed
e5f53a68a596e04df3fde3099273435a30b6fdac
Fixed
e7a802447c491903aa7cb45967aa2a934a4e63fc
Fixed
9ee038590d808a95d16adf92818dcd4752273c08
Fixed
b37a168c0137156042a0ca9626651b5a789e822b
Fixed
4987daf86c152ff882d51572d154ad12e4ff3a4b

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-52877.json"