CVE-2023-54299

Source
https://cve.org/CVERecord?id=CVE-2023-54299
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-54299.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-54299
Downstream
Related
Published
2025-12-30T12:23:35.146Z
Modified
2026-03-28T17:44:27.004699149Z
Summary
usb: typec: bus: verify partner exists in typec_altmode_attention
Details

In the Linux kernel, the following vulnerability has been resolved:

usb: typec: bus: verify partner exists in typecaltmodeattention

Some usb hubs will negotiate DisplayPort Alt mode with the device but will then negotiate a data role swap after entering the alt mode. The data role swap causes the device to unregister all alt modes, however the usb hub will still send Attention messages even after failing to reregister the Alt Mode. typealtmodeattention currently does not verify whether or not a device's altmode partner exists, which results in a NULL pointer error when dereferencing the typecaltmode and typecaltmode_ops belonging to the altmode partner.

Verify the presence of a device's altmode partner before sending the Attention message to the Alt Mode driver.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/54xxx/CVE-2023-54299.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
8a37d87d72f0c69f837229c04d2fcd7117ea57e7
Fixed
5f71716772b88cbe0e1788f6a38d7871aff2120b
Fixed
38e1f2ee82bacbbfded8f1c06794a443d038d054
Fixed
0ad6bad31da692f8d7acacab07eabe7586239ae0
Fixed
0d3b5fe47938e9c451466845304a2bd74e967a80
Fixed
d49547950bf7f3480d6ca05fe055978e5f0d9e5b
Fixed
1101867a1711c27d8bbe0e83136bec47f8c1ca2a
Fixed
f23643306430f86e2f413ee2b986e0773e79da31

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-54299.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
4.19.0
Fixed
5.4.257
Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.195
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.132
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.53
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.4.16
Type
ECOSYSTEM
Events
Introduced
6.5.0
Fixed
6.5.3

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-54299.json"