In the Linux kernel, the following vulnerability has been resolved:
usb: typec: qcom-pmic: init value of hdrlen/txbuflen earlier
If the read of USBPDPHYRXACKNOWLEDGEREG failed, then hdrlen and txbuflen are uninitialized. This commit stops to print uninitialized value and misleading/false data.
[ { "signature_type": "Function", "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@35925e2b7b404cad3db857434d3312b892b55432", "signature_version": "v1", "target": { "function": "qcom_pmic_typec_pdphy_pd_transmit_payload", "file": "drivers/usb/typec/tcpm/qcom/qcom_pmic_typec_pdphy.c" }, "digest": { "function_hash": "211398022544443742434239429687268619290", "length": 1487.0 }, "id": "CVE-2024-53083-0a831baf" }, { "signature_type": "Line", "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@029778a4fd2c90c2e76a902b797c2348a722f1b8", "signature_version": "v1", "target": { "file": "drivers/usb/typec/tcpm/qcom/qcom_pmic_typec_pdphy.c" }, "digest": { "threshold": 0.9, "line_hashes": [ "63095259654154782533487608901513694613", "315794377469861646402674740734967822943", "315676584450739559502284720243491826161", "167103610614076131809581186552622039255", "57706008235773093156097744178354859802", "75546609213474302345837696811079704363", "84211177125847185099156576679988133139", "309132110337501781023476418746399331854", "202183569421851763835180026276645190120" ] }, "id": "CVE-2024-53083-5d5d1417" }, { "signature_type": "Line", "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@35925e2b7b404cad3db857434d3312b892b55432", "signature_version": "v1", "target": { "file": "drivers/usb/typec/tcpm/qcom/qcom_pmic_typec_pdphy.c" }, "digest": { "threshold": 0.9, "line_hashes": [ "63095259654154782533487608901513694613", "315794377469861646402674740734967822943", "315676584450739559502284720243491826161", "167103610614076131809581186552622039255", "57706008235773093156097744178354859802", "75546609213474302345837696811079704363", "84211177125847185099156576679988133139", "309132110337501781023476418746399331854", "202183569421851763835180026276645190120" ] }, "id": "CVE-2024-53083-98c8bb6b" }, { "signature_type": "Function", "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@74d8cee747b37cd9f5ca631f678e66e7f40f2b5f", "signature_version": "v1", "target": { "function": "qcom_pmic_typec_pdphy_pd_transmit_payload", "file": "drivers/usb/typec/tcpm/qcom/qcom_pmic_typec_pdphy.c" }, "digest": { "function_hash": "211398022544443742434239429687268619290", "length": 1487.0 }, "id": "CVE-2024-53083-f464c2a0" }, { "signature_type": "Function", "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@029778a4fd2c90c2e76a902b797c2348a722f1b8", "signature_version": "v1", "target": { "function": "qcom_pmic_typec_pdphy_pd_transmit_payload", "file": "drivers/usb/typec/tcpm/qcom/qcom_pmic_typec_pdphy.c" }, "digest": { "function_hash": "211398022544443742434239429687268619290", "length": 1487.0 }, "id": "CVE-2024-53083-f8b5c10c" }, { "signature_type": "Line", "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@74d8cee747b37cd9f5ca631f678e66e7f40f2b5f", "signature_version": "v1", "target": { "file": "drivers/usb/typec/tcpm/qcom/qcom_pmic_typec_pdphy.c" }, "digest": { "threshold": 0.9, "line_hashes": [ "63095259654154782533487608901513694613", "315794377469861646402674740734967822943", "315676584450739559502284720243491826161", "167103610614076131809581186552622039255", "57706008235773093156097744178354859802", "75546609213474302345837696811079704363", "84211177125847185099156576679988133139", "309132110337501781023476418746399331854", "202183569421851763835180026276645190120" ] }, "id": "CVE-2024-53083-fd9a99a2" } ]