CVE-2023-53119

Source
https://cve.org/CVERecord?id=CVE-2023-53119
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53119.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-53119
Downstream
Related
Published
2025-05-02T15:55:56.818Z
Modified
2026-04-02T17:30:29.078066649Z
Summary
nfc: pn533: initialize struct pn533_out_arg properly
Details

In the Linux kernel, the following vulnerability has been resolved:

nfc: pn533: initialize struct pn533outarg properly

struct pn533outarg used as a temporary context for outurb is not initialized properly. Its uninitialized 'phy' field can be dereferenced in error cases inside pn533out_complete() callback function. It causes the following failure:

general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007] CPU: 1 PID: 0 Comm: swapper/1 Not tainted 6.2.0-rc3-next-20230110-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 RIP: 0010:pn533outcomplete.cold+0x15/0x44 drivers/nfc/pn533/usb.c:441 Call Trace: <IRQ> __usbhcdgiveback_urb+0x2b6/0x5c0 drivers/usb/core/hcd.c:1671 usbhcdgivebackurb+0x384/0x430 drivers/usb/core/hcd.c:1754 dummytimer+0x1203/0x32d0 drivers/usb/gadget/udc/dummyhcd.c:1988 calltimerfn+0x1da/0x800 kernel/time/timer.c:1700 expiretimers+0x234/0x330 kernel/time/timer.c:1751 __run_timers kernel/time/timer.c:2022 [inline] __runtimers kernel/time/timer.c:1995 [inline] runtimer_softirq+0x326/0x910 kernel/time/timer.c:2035 __dosoftirq+0x1fb/0xaf6 kernel/softirq.c:571 invokesoftirq kernel/softirq.c:445 [inline] _irqexitrcu+0x123/0x180 kernel/softirq.c:650 irqexitrcu+0x9/0x20 kernel/softirq.c:662 sysvecapictimerinterrupt+0x97/0xc0 arch/x86/kernel/apic/apic.c:1107

Initialize the field with the pn533usbphy currently used.

Found by Linux Verification Center (linuxtesting.org) with Syzkaller.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53119.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
35529d6b827eedb6bf7e81130e4b7e0aba9e58d2
Fixed
2bd1ed6d607d7013ed4959e86990a04f028543ef
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
321db5131c92983dac4f3338e8fbb6df214238c0
Fixed
4c20a07ed26a71a8ccc9c6d935fc181573f5462e
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
9424d2205fe94a095fb9365ec0c6137f0b394a2b
Fixed
0f9c1f26d434c32520dfe33326b28c5954bc4299
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0ca78c99656f5c448567db1e148367aa3b01c80a
Fixed
2703da78849c47b6b5b4471edb35fc7b7f91dead
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
39ae73e581112cfe27ba50aecb1c891ce57cecb1
Fixed
2bee84369b76f6c9ef71938069c65a6ebd1a12f7
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
8998db5021a28ad67aa8d627bdb4226e4046ccc4
Fixed
a97ef110c491b72c138111a595a3a3af56cbc94c
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
9dab880d675b9d0dd56c6428e4e8352a3339371d
Fixed
2cbd4213baf7be5d87d183e2032c54003de0790f
Fixed
484b7059796e3bc1cb527caa61dfc60da649b4f6

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53119.json"