CVE-2023-54277

Source
https://cve.org/CVERecord?id=CVE-2023-54277
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-54277.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-54277
Downstream
Related
Published
2025-12-30T12:16:05.690Z
Modified
2026-03-20T12:33:31.935159Z
Summary
fbdev: udlfb: Fix endpoint check
Details

In the Linux kernel, the following vulnerability has been resolved:

fbdev: udlfb: Fix endpoint check

The syzbot fuzzer detected a problem in the udlfb driver, caused by an endpoint not having the expected type:

usb 1-1: Read EDID byte 0 failed: -71 usb 1-1: Unable to get valid EDID from device/display ------------[ cut here ]------------ usb 1-1: BOGUS urb xfer, pipe 3 != type 1 WARNING: CPU: 0 PID: 9 at drivers/usb/core/urb.c:504 usbsubmiturb+0xed6/0x1880 drivers/usb/core/urb.c:504 Modules linked in: CPU: 0 PID: 9 Comm: kworker/0:1 Not tainted 6.4.0-rc1-syzkaller-00016-ga4422ff22142 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/28/2023 Workqueue: usbhubwq hubevent RIP: 0010:usbsubmiturb+0xed6/0x1880 drivers/usb/core/urb.c:504 ... Call Trace: <TASK> dlfbsubmiturb+0x92/0x180 drivers/video/fbdev/udlfb.c:1980 dlfbsetvideomode+0x21f0/0x2950 drivers/video/fbdev/udlfb.c:315 dlfbopssetpar+0x2a7/0x8d0 drivers/video/fbdev/udlfb.c:1111 dlfbusb_probe+0x149a/0x2710 drivers/video/fbdev/udlfb.c:1743

The current approach for this issue failed to catch the problem because it only checks for the existence of a bulk-OUT endpoint; it doesn't check whether this endpoint is the one that the driver will actually use.

We can fix the problem by instead checking that the endpoint used by the driver does exist and is bulk-OUT.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/54xxx/CVE-2023-54277.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
f6db63819db632158647d5bbf4d7d2d90dc1a268
Fixed
1522dc58bff87af79461b96d90ec122e9e726004
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
c4fb41bdf4d6ccca850c4af5d707d14a0fb717a7
Fixed
58ecc165abdaed85447455e6dc396758e8c6f219
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
4df1584738f1dc6f0dd854d258bba48591f1ed0e
Fixed
9e12c58a5ece41be72157cef348576b135c9fc72
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
aaf7dbe07385e0b8deb7237eca2a79926bbc7091
Fixed
c8fdf7feca77cd99e25ef0a1e9e72dfc83add8ef
Fixed
e19383e5dee5adbf3d19f3f210f440a88d1b7dde
Fixed
ed9de4ed39875706607fb08118a58344ae6c5f42
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
895ea8a290ba87850bcaf2ecfcddef75a014fa54

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-54277.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.4.244
Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.181
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.114
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.31
Type
ECOSYSTEM
Events
Introduced
5.18.0
Fixed
6.3.5

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-54277.json"