CVE-2024-53083

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-53083
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-53083.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-53083
Downstream
Related
Published
2024-11-19T17:45:12Z
Modified
2025-10-15T04:23:15.518367Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
usb: typec: qcom-pmic: init value of hdr_len/txbuf_len earlier
Details

In the Linux kernel, the following vulnerability has been resolved:

usb: typec: qcom-pmic: init value of hdrlen/txbuflen earlier

If the read of USBPDPHYRXACKNOWLEDGEREG failed, then hdrlen and txbuflen are uninitialized. This commit stops to print uninitialized value and misleading/false data.

References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
a4422ff221429c600c3dc5d0394fb3738b89d040
Fixed
35925e2b7b404cad3db857434d3312b892b55432
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
a4422ff221429c600c3dc5d0394fb3738b89d040
Fixed
74d8cee747b37cd9f5ca631f678e66e7f40f2b5f
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
a4422ff221429c600c3dc5d0394fb3738b89d040
Fixed
029778a4fd2c90c2e76a902b797c2348a722f1b8

Affected versions

v6.*

v6.10
v6.10-rc1
v6.10-rc2
v6.10-rc3
v6.10-rc4
v6.10-rc5
v6.10-rc6
v6.10-rc7
v6.11
v6.11-rc1
v6.11-rc2
v6.11-rc3
v6.11-rc4
v6.11-rc5
v6.11-rc6
v6.11-rc7
v6.11.1
v6.11.2
v6.11.3
v6.11.4
v6.11.5
v6.11.6
v6.11.7
v6.12-rc1
v6.12-rc2
v6.12-rc3
v6.12-rc4
v6.12-rc5
v6.12-rc6
v6.4
v6.4-rc2
v6.4-rc3
v6.4-rc4
v6.4-rc5
v6.4-rc6
v6.4-rc7
v6.5
v6.5-rc1
v6.5-rc2
v6.5-rc3
v6.5-rc4
v6.5-rc5
v6.5-rc6
v6.5-rc7
v6.6
v6.6-rc1
v6.6-rc2
v6.6-rc3
v6.6-rc4
v6.6-rc5
v6.6-rc6
v6.6-rc7
v6.6.1
v6.6.10
v6.6.11
v6.6.12
v6.6.13
v6.6.14
v6.6.15
v6.6.16
v6.6.17
v6.6.18
v6.6.19
v6.6.2
v6.6.20
v6.6.21
v6.6.22
v6.6.23
v6.6.24
v6.6.25
v6.6.26
v6.6.27
v6.6.28
v6.6.29
v6.6.3
v6.6.30
v6.6.31
v6.6.32
v6.6.33
v6.6.34
v6.6.35
v6.6.36
v6.6.37
v6.6.38
v6.6.39
v6.6.4
v6.6.40
v6.6.41
v6.6.42
v6.6.43
v6.6.44
v6.6.45
v6.6.46
v6.6.47
v6.6.48
v6.6.49
v6.6.5
v6.6.50
v6.6.51
v6.6.52
v6.6.53
v6.6.54
v6.6.55
v6.6.56
v6.6.57
v6.6.58
v6.6.59
v6.6.6
v6.6.60
v6.6.7
v6.6.8
v6.6.9
v6.7
v6.7-rc1
v6.7-rc2
v6.7-rc3
v6.7-rc4
v6.7-rc5
v6.7-rc6
v6.7-rc7
v6.7-rc8
v6.8
v6.8-rc1
v6.8-rc2
v6.8-rc3
v6.8-rc4
v6.8-rc5
v6.8-rc6
v6.8-rc7
v6.9
v6.9-rc1
v6.9-rc2
v6.9-rc3
v6.9-rc4
v6.9-rc5
v6.9-rc6
v6.9-rc7

Database specific

vanir_signatures

[
    {
        "signature_type": "Function",
        "deprecated": false,
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@35925e2b7b404cad3db857434d3312b892b55432",
        "signature_version": "v1",
        "target": {
            "function": "qcom_pmic_typec_pdphy_pd_transmit_payload",
            "file": "drivers/usb/typec/tcpm/qcom/qcom_pmic_typec_pdphy.c"
        },
        "digest": {
            "function_hash": "211398022544443742434239429687268619290",
            "length": 1487.0
        },
        "id": "CVE-2024-53083-0a831baf"
    },
    {
        "signature_type": "Line",
        "deprecated": false,
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@029778a4fd2c90c2e76a902b797c2348a722f1b8",
        "signature_version": "v1",
        "target": {
            "file": "drivers/usb/typec/tcpm/qcom/qcom_pmic_typec_pdphy.c"
        },
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "63095259654154782533487608901513694613",
                "315794377469861646402674740734967822943",
                "315676584450739559502284720243491826161",
                "167103610614076131809581186552622039255",
                "57706008235773093156097744178354859802",
                "75546609213474302345837696811079704363",
                "84211177125847185099156576679988133139",
                "309132110337501781023476418746399331854",
                "202183569421851763835180026276645190120"
            ]
        },
        "id": "CVE-2024-53083-5d5d1417"
    },
    {
        "signature_type": "Line",
        "deprecated": false,
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@35925e2b7b404cad3db857434d3312b892b55432",
        "signature_version": "v1",
        "target": {
            "file": "drivers/usb/typec/tcpm/qcom/qcom_pmic_typec_pdphy.c"
        },
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "63095259654154782533487608901513694613",
                "315794377469861646402674740734967822943",
                "315676584450739559502284720243491826161",
                "167103610614076131809581186552622039255",
                "57706008235773093156097744178354859802",
                "75546609213474302345837696811079704363",
                "84211177125847185099156576679988133139",
                "309132110337501781023476418746399331854",
                "202183569421851763835180026276645190120"
            ]
        },
        "id": "CVE-2024-53083-98c8bb6b"
    },
    {
        "signature_type": "Function",
        "deprecated": false,
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@74d8cee747b37cd9f5ca631f678e66e7f40f2b5f",
        "signature_version": "v1",
        "target": {
            "function": "qcom_pmic_typec_pdphy_pd_transmit_payload",
            "file": "drivers/usb/typec/tcpm/qcom/qcom_pmic_typec_pdphy.c"
        },
        "digest": {
            "function_hash": "211398022544443742434239429687268619290",
            "length": 1487.0
        },
        "id": "CVE-2024-53083-f464c2a0"
    },
    {
        "signature_type": "Function",
        "deprecated": false,
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@029778a4fd2c90c2e76a902b797c2348a722f1b8",
        "signature_version": "v1",
        "target": {
            "function": "qcom_pmic_typec_pdphy_pd_transmit_payload",
            "file": "drivers/usb/typec/tcpm/qcom/qcom_pmic_typec_pdphy.c"
        },
        "digest": {
            "function_hash": "211398022544443742434239429687268619290",
            "length": 1487.0
        },
        "id": "CVE-2024-53083-f8b5c10c"
    },
    {
        "signature_type": "Line",
        "deprecated": false,
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@74d8cee747b37cd9f5ca631f678e66e7f40f2b5f",
        "signature_version": "v1",
        "target": {
            "file": "drivers/usb/typec/tcpm/qcom/qcom_pmic_typec_pdphy.c"
        },
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "63095259654154782533487608901513694613",
                "315794377469861646402674740734967822943",
                "315676584450739559502284720243491826161",
                "167103610614076131809581186552622039255",
                "57706008235773093156097744178354859802",
                "75546609213474302345837696811079704363",
                "84211177125847185099156576679988133139",
                "309132110337501781023476418746399331854",
                "202183569421851763835180026276645190120"
            ]
        },
        "id": "CVE-2024-53083-fd9a99a2"
    }
]

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
6.5.0
Fixed
6.6.61
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.11.8