VYPR
Unrated severityNVD Advisory· Published Dec 30, 2025· Updated Apr 15, 2026

CVE-2023-54299

CVE-2023-54299

Description

In the Linux kernel, the following vulnerability has been resolved:

usb: typec: bus: verify partner exists in typec_altmode_attention

Some usb hubs will negotiate DisplayPort Alt mode with the device but will then negotiate a data role swap after entering the alt mode. The data role swap causes the device to unregister all alt modes, however the usb hub will still send Attention messages even after failing to reregister the Alt Mode. type_altmode_attention currently does not verify whether or not a device's altmode partner exists, which results in a NULL pointer error when dereferencing the typec_altmode and typec_altmode_ops belonging to the altmode partner.

Verify the presence of a device's altmode partner before sending the Attention message to the Alt Mode driver.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A NULL pointer dereference in Linux kernel's USB Type-C altmode driver occurs when a hub sends Attention messages after a data role swap removes the partner.

Vulnerability

In the Linux kernel, the USB Type-C bus driver function typec_altmode_attention does not verify whether a device's altmode partner still exists before dereferencing it. A race condition exists: some USB hubs negotiate DisplayPort Alt mode with the device, then perform a data role swap that causes the device to unregister all alt modes; however the hub may continue sending Attention messages even after failing to re‑register the Alt Mode. This leads to a NULL pointer dereference when the kernel tries to access the typec_altmode and typec_altmode_ops of the now‑absent partner [1][2][3].

Exploitation

An attacker with physical access to the USB port (or a malicious USB device) can trigger this bug a victim machine by triggering a data role swap after DisplayPort Alt mode is entered. No special authentication is required beyond the ability to engage in USB‑C protocol negotiation. The affected code path is reachable during normal operation when an uncooperative hub sends Attention messages [1].

Impact

Successful exploitation causes a kernel NULL pointer dereference, leading to a system crash (denial of service). No privilege escalation is described; the impact is limited to availability loss.

Mitigation

The fix adds a check for the partner's existence before sending the Attention message to the Alt Mode driver [1][2][3]. Patched versions are available in the stable kernel tree. Users should update to a kernel containing commit f23643306430 or equivalents.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

7

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

7

News mentions

0

No linked articles in our index yet.