{"id":"CVE-2023-52901","summary":"usb: xhci: Check endpoint is valid before dereferencing it","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nusb: xhci: Check endpoint is valid before dereferencing it\n\nWhen the host controller is not responding, all URBs queued to all\nendpoints need to be killed. This can cause a kernel panic if we\ndereference an invalid endpoint.\n\nFix this by using xhci_get_virt_ep() helper to find the endpoint and\nchecking if the endpoint is valid before dereferencing it.\n\n[233311.853271] xhci-hcd xhci-hcd.1.auto: xHCI host controller not responding, assume dead\n[233311.853393] Unable to handle kernel NULL pointer dereference at virtual address 00000000000000e8\n\n[233311.853964] pc : xhci_hc_died+0x10c/0x270\n[233311.853971] lr : xhci_hc_died+0x1ac/0x270\n\n[233311.854077] Call trace:\n[233311.854085]  xhci_hc_died+0x10c/0x270\n[233311.854093]  xhci_stop_endpoint_command_watchdog+0x100/0x1a4\n[233311.854105]  call_timer_fn+0x50/0x2d4\n[233311.854112]  expire_timers+0xac/0x2e4\n[233311.854118]  run_timer_softirq+0x300/0xabc\n[233311.854127]  __do_softirq+0x148/0x528\n[233311.854135]  irq_exit+0x194/0x1a8\n[233311.854143]  __handle_domain_irq+0x164/0x1d0\n[233311.854149]  gic_handle_irq.22273+0x10c/0x188\n[233311.854156]  el1_irq+0xfc/0x1a8\n[233311.854175]  lpm_cpuidle_enter+0x25c/0x418 [msm_pm]\n[233311.854185]  cpuidle_enter_state+0x1f0/0x764\n[233311.854194]  do_idle+0x594/0x6ac\n[233311.854201]  cpu_startup_entry+0x7c/0x80\n[233311.854209]  secondary_start_kernel+0x170/0x198","modified":"2026-04-11T12:46:38.295093Z","published":"2024-08-21T06:10:41.640Z","related":["SUSE-SU-2024:3189-1","SUSE-SU-2024:3190-1","SUSE-SU-2024:3209-1","SUSE-SU-2024:3227-1","SUSE-SU-2024:3251-1","SUSE-SU-2024:3252-1","SUSE-SU-2024:3408-1","SUSE-SU-2024:3483-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/52xxx/CVE-2023-52901.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/08864dc14a6803f0377ca77b9740b26db30c020f"},{"type":"WEB","url":"https://git.kernel.org/stable/c/2d2820d5f375563690c96e60676855205abfb7f5"},{"type":"WEB","url":"https://git.kernel.org/stable/c/375be2dd61a072f7b1cac9b17eea59e07b58db3a"},{"type":"WEB","url":"https://git.kernel.org/stable/c/66fc1600855c05c4ba4e997184c91cf298e0405c"},{"type":"WEB","url":"https://git.kernel.org/stable/c/9891e5c73cab3fd9ed532dc50e9799e55e974766"},{"type":"WEB","url":"https://git.kernel.org/stable/c/e8fb5bc76eb86437ab87002d4a36d6da02165654"},{"type":"WEB","url":"https://git.kernel.org/stable/c/f39c813af0b64f44af94e435c07bfa1ddc2575f5"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/52xxx/CVE-2023-52901.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52901"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"50e8725e7c429701e530439013f9681e1fa36b5d"},{"fixed":"375be2dd61a072f7b1cac9b17eea59e07b58db3a"},{"fixed":"2d2820d5f375563690c96e60676855205abfb7f5"},{"fixed":"9891e5c73cab3fd9ed532dc50e9799e55e974766"},{"fixed":"66fc1600855c05c4ba4e997184c91cf298e0405c"},{"fixed":"f39c813af0b64f44af94e435c07bfa1ddc2575f5"},{"fixed":"08864dc14a6803f0377ca77b9740b26db30c020f"},{"fixed":"e8fb5bc76eb86437ab87002d4a36d6da02165654"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-52901.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"3.15.0"},{"fixed":"4.14.304"}]},{"type":"ECOSYSTEM","events":[{"introduced":"4.15.0"},{"fixed":"4.19.271"}]},{"type":"ECOSYSTEM","events":[{"introduced":"4.20.0"},{"fixed":"5.4.230"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.5.0"},{"fixed":"5.10.165"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.11.0"},{"fixed":"5.15.90"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"6.1.8"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-52901.json"}}],"schema_version":"1.7.5"}