{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-52877","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2024-05-21T15:19:24.264Z","datePublished":"2024-05-21T15:32:09.946Z","dateUpdated":"2025-05-04T07:44:59.559Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2025-05-04T07:44:59.559Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nusb: typec: tcpm: Fix NULL pointer dereference in tcpm_pd_svdm()\n\nIt is possible that typec_register_partner() returns ERR_PTR on failure.\nWhen port->partner is an error, a NULL pointer dereference may occur as\nshown below.\n\n[91222.095236][  T319] typec port0: failed to register partner (-17)\n...\n[91225.061491][  T319] Unable to handle kernel NULL pointer dereference\nat virtual address 000000000000039f\n[91225.274642][  T319] pc : tcpm_pd_data_request+0x310/0x13fc\n[91225.274646][  T319] lr : tcpm_pd_data_request+0x298/0x13fc\n[91225.308067][  T319] Call trace:\n[91225.308070][  T319]  tcpm_pd_data_request+0x310/0x13fc\n[91225.308073][  T319]  tcpm_pd_rx_handler+0x100/0x9e8\n[91225.355900][  T319]  kthread_worker_fn+0x178/0x58c\n[91225.355902][  T319]  kthread+0x150/0x200\n[91225.355905][  T319]  ret_from_fork+0x10/0x30\n\nAdd a check for port->partner to avoid dereferencing a NULL pointer."}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/usb/typec/tcpm/tcpm.c"],"versions":[{"version":"5e1d4c49fbc86dab6e005d66f066bd53c9479cde","lessThan":"e5f53a68a596e04df3fde3099273435a30b6fdac","status":"affected","versionType":"git"},{"version":"5e1d4c49fbc86dab6e005d66f066bd53c9479cde","lessThan":"e7a802447c491903aa7cb45967aa2a934a4e63fc","status":"affected","versionType":"git"},{"version":"5e1d4c49fbc86dab6e005d66f066bd53c9479cde","lessThan":"9ee038590d808a95d16adf92818dcd4752273c08","status":"affected","versionType":"git"},{"version":"5e1d4c49fbc86dab6e005d66f066bd53c9479cde","lessThan":"b37a168c0137156042a0ca9626651b5a789e822b","status":"affected","versionType":"git"},{"version":"5e1d4c49fbc86dab6e005d66f066bd53c9479cde","lessThan":"4987daf86c152ff882d51572d154ad12e4ff3a4b","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/usb/typec/tcpm/tcpm.c"],"versions":[{"version":"5.12","status":"affected"},{"version":"0","lessThan":"5.12","status":"unaffected","versionType":"semver"},{"version":"5.15.138","lessThanOrEqual":"5.15.*","status":"unaffected","versionType":"semver"},{"version":"6.1.62","lessThanOrEqual":"6.1.*","status":"unaffected","versionType":"semver"},{"version":"6.5.11","lessThanOrEqual":"6.5.*","status":"unaffected","versionType":"semver"},{"version":"6.6.1","lessThanOrEqual":"6.6.*","status":"unaffected","versionType":"semver"},{"version":"6.7","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.12","versionEndExcluding":"5.15.138"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.12","versionEndExcluding":"6.1.62"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.12","versionEndExcluding":"6.5.11"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.12","versionEndExcluding":"6.6.1"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.12","versionEndExcluding":"6.7"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/e5f53a68a596e04df3fde3099273435a30b6fdac"},{"url":"https://git.kernel.org/stable/c/e7a802447c491903aa7cb45967aa2a934a4e63fc"},{"url":"https://git.kernel.org/stable/c/9ee038590d808a95d16adf92818dcd4752273c08"},{"url":"https://git.kernel.org/stable/c/b37a168c0137156042a0ca9626651b5a789e822b"},{"url":"https://git.kernel.org/stable/c/4987daf86c152ff882d51572d154ad12e4ff3a4b"}],"title":"usb: typec: tcpm: Fix NULL pointer dereference in tcpm_pd_svdm()","x_generator":{"engine":"bippy-1.2.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-06-10T19:16:07.522837Z","id":"CVE-2023-52877","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-06-10T19:16:15.611Z"}},{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T23:11:36.091Z"},"title":"CVE Program Container","references":[{"url":"https://git.kernel.org/stable/c/e5f53a68a596e04df3fde3099273435a30b6fdac","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/e7a802447c491903aa7cb45967aa2a934a4e63fc","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/9ee038590d808a95d16adf92818dcd4752273c08","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/b37a168c0137156042a0ca9626651b5a789e822b","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/4987daf86c152ff882d51572d154ad12e4ff3a4b","tags":["x_transferred"]}]}]}}