CVE-2023-52877

Severity CVSS v4.0:
Pending analysis
Type:
CWE-476 NULL Pointer Dereference
Publication date:
21/05/2024
Last modified:
06/01/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> usb: typec: tcpm: Fix NULL pointer dereference in tcpm_pd_svdm()<br /> <br /> It is possible that typec_register_partner() returns ERR_PTR on failure.<br /> When port-&gt;partner is an error, a NULL pointer dereference may occur as<br /> shown below.<br /> <br /> [91222.095236][ T319] typec port0: failed to register partner (-17)<br /> ...<br /> [91225.061491][ T319] Unable to handle kernel NULL pointer dereference<br /> at virtual address 000000000000039f<br /> [91225.274642][ T319] pc : tcpm_pd_data_request+0x310/0x13fc<br /> [91225.274646][ T319] lr : tcpm_pd_data_request+0x298/0x13fc<br /> [91225.308067][ T319] Call trace:<br /> [91225.308070][ T319] tcpm_pd_data_request+0x310/0x13fc<br /> [91225.308073][ T319] tcpm_pd_rx_handler+0x100/0x9e8<br /> [91225.355900][ T319] kthread_worker_fn+0x178/0x58c<br /> [91225.355902][ T319] kthread+0x150/0x200<br /> [91225.355905][ T319] ret_from_fork+0x10/0x30<br /> <br /> Add a check for port-&gt;partner to avoid dereferencing a NULL pointer.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.12 (including) 5.15.138 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.16 (including) 6.1.62 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.2 (including) 6.5.11 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.6 (including) 6.6.1 (excluding)