CVE-2024-36893
Severity CVSS v4.0:
Pending analysis
Type:
CWE-476
NULL Pointer Dereference
Publication date:
30/05/2024
Last modified:
17/10/2024
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
usb: typec: tcpm: Check for port partner validity before consuming it<br />
<br />
typec_register_partner() does not guarantee partner registration<br />
to always succeed. In the event of failure, port->partner is set<br />
to the error value or NULL. Given that port->partner validity is<br />
not checked, this results in the following crash:<br />
<br />
Unable to handle kernel NULL pointer dereference at virtual address xx<br />
pc : run_state_machine+0x1bc8/0x1c08<br />
lr : run_state_machine+0x1b90/0x1c08<br />
..<br />
Call trace:<br />
run_state_machine+0x1bc8/0x1c08<br />
tcpm_state_machine_work+0x94/0xe4<br />
kthread_worker_fn+0x118/0x328<br />
kthread+0x1d0/0x23c<br />
ret_from_fork+0x10/0x20<br />
<br />
To prevent the crash, check for port->partner validity before<br />
derefencing it in all the call sites.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.1.91 (excluding) | |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.31 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.8.10 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/2a07e6f0ad8a6e504a3912cfe8dc859b7d0740a5
- https://git.kernel.org/stable/c/789326cafbd1f67f424436b6bc8bdb887a364637
- https://git.kernel.org/stable/c/ae11f04b452b5205536e1c02d31f8045eba249dd
- https://git.kernel.org/stable/c/d56d2ca03cc22123fd7626967d096d8661324e57
- https://git.kernel.org/stable/c/fc2b655cb6dd2b381f1f284989721002e39b6b77



