CVE-2023-52877

Source
https://cve.org/CVERecord?id=CVE-2023-52877
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-52877.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-52877
Downstream
Related
Published
2024-05-21T15:32:09.946Z
Modified
2026-04-11T12:46:37.870788Z
Summary
usb: typec: tcpm: Fix NULL pointer dereference in tcpm_pd_svdm()
Details

In the Linux kernel, the following vulnerability has been resolved:

usb: typec: tcpm: Fix NULL pointer dereference in tcpmpdsvdm()

It is possible that typecregisterpartner() returns ERR_PTR on failure. When port->partner is an error, a NULL pointer dereference may occur as shown below.

[91222.095236][ T319] typec port0: failed to register partner (-17) ... [91225.061491][ T319] Unable to handle kernel NULL pointer dereference at virtual address 000000000000039f [91225.274642][ T319] pc : tcpmpddatarequest+0x310/0x13fc [91225.274646][ T319] lr : tcpmpddatarequest+0x298/0x13fc [91225.308067][ T319] Call trace: [91225.308070][ T319] tcpmpddatarequest+0x310/0x13fc [91225.308073][ T319] tcpmpdrxhandler+0x100/0x9e8 [91225.355900][ T319] kthreadworkerfn+0x178/0x58c [91225.355902][ T319] kthread+0x150/0x200 [91225.355905][ T319] retfromfork+0x10/0x30

Add a check for port->partner to avoid dereferencing a NULL pointer.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/52xxx/CVE-2023-52877.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
5e1d4c49fbc86dab6e005d66f066bd53c9479cde
Fixed
e5f53a68a596e04df3fde3099273435a30b6fdac
Fixed
e7a802447c491903aa7cb45967aa2a934a4e63fc
Fixed
9ee038590d808a95d16adf92818dcd4752273c08
Fixed
b37a168c0137156042a0ca9626651b5a789e822b
Fixed
4987daf86c152ff882d51572d154ad12e4ff3a4b

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-52877.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.12.0
Fixed
5.15.138
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.62
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.5.11
Type
ECOSYSTEM
Events
Introduced
6.6.0
Fixed
6.6.1

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-52877.json"