CVE-2023-53045

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-53045
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53045.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-53045
Downstream
Related
Published
2025-05-02T15:55:02.518Z
Modified
2025-11-28T02:34:23.994439Z
Summary
usb: gadget: u_audio: don't let userspace block driver unbind
Details

In the Linux kernel, the following vulnerability has been resolved:

usb: gadget: u_audio: don't let userspace block driver unbind

In the unbind callback for fuac1 and fuac2, a call to sndcardfree() via gaudiocleanup() will disconnect the card and then wait for all resources to be released, which happens when the refcount falls to zero. Since userspace can keep the refcount incremented by not closing the relevant file descriptor, the call to unbind may block indefinitely. This can cause a deadlock during reboot, as evidenced by the following blocked task observed on my machine:

task:reboot state:D stack:0 pid:2827 ppid:569 flags:0x0000000c Call trace: _switchto+0xc8/0x140 _schedule+0x2f0/0x7c0 schedule+0x60/0xd0 scheduletimeout+0x180/0x1d4 waitforcompletion+0x78/0x180 sndcardfree+0x90/0xa0 gaudiocleanup+0x2c/0x64 afuncunbind+0x28/0x60 ... kernelrestart+0x4c/0xac _dosysreboot+0xcc/0x1ec _arm64sysreboot+0x28/0x30 invoke_syscall+0x4c/0x110 ...

The issue can also be observed by opening the card with arecord and then stopping the process through the shell before unbinding:

# arecord -D hw:UAC2Gadget -f S32LE -c 2 -r 48000 /dev/null Recording WAVE '/dev/null' : Signed 32 bit Little Endian, Rate 48000 Hz, Stereo ^Z[1]+ Stopped arecord -D hw:UAC2Gadget -f S32LE -c 2 -r 48000 /dev/null # echo gadget.0 > /sys/bus/gadget/drivers/configfs-gadget/unbind (observe that the unbind command never finishes)

Fix the problem by using sndcardfreewhenclosed() instead, which will still disconnect the card as desired, but defer the task of freeing the resources to the core once userspace closes its file descriptor.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53045.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
132fcb460839a876f5bc8b71bede60f8d0875757
Fixed
3e016ef2e72da93a2ea7afbb45de1b481b44d761
Fixed
3256e152b645fc1e788ba44c2d8ced690113e3e6
Fixed
0eda2004f38d95ef5715d62be884cd344260535b
Fixed
33f341c1fc60e172a3515c51bdabee11e83d1ee9
Fixed
b131989797f7287d7fdadb2bababc05a15d44750
Fixed
3bc7324e4911351e39c54a62e6ca46321cb10faf
Fixed
43ca70753dfffd517d2af126da28690f8f615605
Fixed
6c67ed9ad9b83e453e808f9b31a931a20a25629b

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
3.4.0
Fixed
4.14.312
Type
ECOSYSTEM
Events
Introduced
4.15.0
Fixed
4.19.280
Type
ECOSYSTEM
Events
Introduced
4.20.0
Fixed
5.4.240
Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.177
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.105
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.22
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.2.9