VYPR
Unrated severityNVD Advisory· Published Dec 30, 2025· Updated Apr 15, 2026

CVE-2023-54186

CVE-2023-54186

Description

In the Linux kernel, the following vulnerability has been resolved:

usb: typec: altmodes/displayport: fix pin_assignment_show

This patch fixes negative indexing of buf array in pin_assignment_show when get_current_pin_assignments returns 0 i.e. no compatible pin assignments are found.

BUG: KASAN: use-after-free in pin_assignment_show+0x26c/0x33c ... Call trace: dump_backtrace+0x110/0x204 dump_stack_lvl+0x84/0xbc print_report+0x358/0x974 kasan_report+0x9c/0xfc __do_kernel_fault+0xd4/0x2d4 do_bad_area+0x48/0x168 do_tag_check_fault+0x24/0x38 do_mem_abort+0x6c/0x14c el1_abort+0x44/0x68 el1h_64_sync_handler+0x64/0xa4 el1h_64_sync+0x78/0x7c pin_assignment_show+0x26c/0x33c dev_attr_show+0x50/0xc0

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A use-after-free vulnerability in the Linux kernel's USB Type-C DisplayPort alternate mode driver allows local privilege escalation via negative array indexing.

Vulnerability

Overview

A use-after-free vulnerability exists in pin_assignment_show within the Linux kernel's USB Type-C DisplayPort alternate mode driver. The bug occurs when get_current_pin_assignments returns 0 (i.e., no compatible pin assignments are found), leading to negative indexing of the buf array. This triggers a KASAN: use-after-free error, as demonstrated in the kernel crash trace [1].

Exploitation

The vulnerability is accessible locally through the sysfs attribute interface. An attacker with local access can trigger the bug by reading the pin_assignment sysfs file when no pin assignments are configured. No special privileges are required beyond the ability to access the sysfs entry for a USB Type-C DisplayPort device [2].

Impact

Successful exploitation results in a use-after-free condition, potentially allowing an attacker to escalate privileges or cause a denial of service. The KASAN report indicates memory corruption that could be leveraged for arbitrary code execution in kernel context [3].

Mitigation

Patches have been applied to the Linux kernel stable branches. Users should update to a kernel version containing the fix, such as commits [1], [2], and [3]. No workarounds are available; updating is the recommended course of action.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

7

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

7

News mentions

0

No linked articles in our index yet.