CVE-2023-54299
Description
In the Linux kernel, the following vulnerability has been resolved:
usb: typec: bus: verify partner exists in typec_altmode_attention
Some usb hubs will negotiate DisplayPort Alt mode with the device but will then negotiate a data role swap after entering the alt mode. The data role swap causes the device to unregister all alt modes, however the usb hub will still send Attention messages even after failing to reregister the Alt Mode. type_altmode_attention currently does not verify whether or not a device's altmode partner exists, which results in a NULL pointer error when dereferencing the typec_altmode and typec_altmode_ops belonging to the altmode partner.
Verify the presence of a device's altmode partner before sending the Attention message to the Alt Mode driver.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A NULL pointer dereference in Linux kernel's USB Type-C altmode driver occurs when a hub sends Attention messages after a data role swap removes the partner.
Vulnerability
In the Linux kernel, the USB Type-C bus driver function typec_altmode_attention does not verify whether a device's altmode partner still exists before dereferencing it. A race condition exists: some USB hubs negotiate DisplayPort Alt mode with the device, then perform a data role swap that causes the device to unregister all alt modes; however the hub may continue sending Attention messages even after failing to re‑register the Alt Mode. This leads to a NULL pointer dereference when the kernel tries to access the typec_altmode and typec_altmode_ops of the now‑absent partner [1][2][3].
Exploitation
An attacker with physical access to the USB port (or a malicious USB device) can trigger this bug a victim machine by triggering a data role swap after DisplayPort Alt mode is entered. No special authentication is required beyond the ability to engage in USB‑C protocol negotiation. The affected code path is reachable during normal operation when an uncooperative hub sends Attention messages [1].
Impact
Successful exploitation causes a kernel NULL pointer dereference, leading to a system crash (denial of service). No privilege escalation is described; the impact is limited to availability loss.
Mitigation
The fix adds a check for the partner's existence before sending the Attention message to the Alt Mode driver [1][2][3]. Patched versions are available in the stable kernel tree. Users should update to a kernel containing commit f23643306430 or equivalents.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
75f71716772b838e1f2ee82ba0ad6bad31da60d3b5fe47938d49547950bf71101867a1711f23643306430Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
7- git.kernel.org/stable/c/0ad6bad31da692f8d7acacab07eabe7586239ae0nvd
- git.kernel.org/stable/c/0d3b5fe47938e9c451466845304a2bd74e967a80nvd
- git.kernel.org/stable/c/1101867a1711c27d8bbe0e83136bec47f8c1ca2anvd
- git.kernel.org/stable/c/38e1f2ee82bacbbfded8f1c06794a443d038d054nvd
- git.kernel.org/stable/c/5f71716772b88cbe0e1788f6a38d7871aff2120bnvd
- git.kernel.org/stable/c/d49547950bf7f3480d6ca05fe055978e5f0d9e5bnvd
- git.kernel.org/stable/c/f23643306430f86e2f413ee2b986e0773e79da31nvd
News mentions
0No linked articles in our index yet.