DEBIAN-CVE-2023-52877

Source
https://security-tracker.debian.org/tracker/CVE-2023-52877
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2023-52877.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2023-52877
Upstream
Published
2024-05-21T16:15:24Z
Modified
2025-09-25T23:29:54.335798Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

In the Linux kernel, the following vulnerability has been resolved: usb: typec: tcpm: Fix NULL pointer dereference in tcpmpdsvdm() It is possible that typecregisterpartner() returns ERRPTR on failure. When port->partner is an error, a NULL pointer dereference may occur as shown below. [91222.095236][ T319] typec port0: failed to register partner (-17) ... [91225.061491][ T319] Unable to handle kernel NULL pointer dereference at virtual address 000000000000039f [91225.274642][ T319] pc : tcpmpddatarequest+0x310/0x13fc [91225.274646][ T319] lr : tcpmpddatarequest+0x298/0x13fc [91225.308067][ T319] Call trace: [91225.308070][ T319] tcpmpddatarequest+0x310/0x13fc [91225.308073][ T319] tcpmpdrxhandler+0x100/0x9e8 [91225.355900][ T319] kthreadworkerfn+0x178/0x58c [91225.355902][ T319] kthread+0x150/0x200 [91225.355905][ T319] retfrom_fork+0x10/0x30 Add a check for port->partner to avoid dereferencing a NULL pointer.

References

Affected packages

Debian:12 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.1.64-1

Affected versions

6.*

6.1.27-1
6.1.37-1
6.1.38-1
6.1.38-2~bpo11+1
6.1.38-2
6.1.38-3
6.1.38-4~bpo11+1
6.1.38-4
6.1.52-1
6.1.55-1~bpo11+1
6.1.55-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.6.8-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:14 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.6.8-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}