CVE-2023-53054

Source
https://cve.org/CVERecord?id=CVE-2023-53054
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53054.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-53054
Downstream
Related
Published
2025-05-02T15:55:09.354Z
Modified
2026-04-11T12:46:40.686890Z
Summary
usb: dwc2: fix a devres leak in hw_enable upon suspend resume
Details

In the Linux kernel, the following vulnerability has been resolved:

usb: dwc2: fix a devres leak in hw_enable upon suspend resume

Each time the platform goes to low power, PM suspend / resume routines call: _dwc2lowlevelhwenable -> devmaddactionorreset(). This adds a new devres each time. This may also happen at runtime, as dwc2lowlevelhwenable() can be called from udcstart().

This can be seen with tracing: - echo 1 > /sys/kernel/debug/tracing/events/dev/devres_log/enable - go to low power - cat /sys/kernel/debug/tracing/trace

A new "ADD" entry is found upon each low power cycle: ... devreslog: 49000000.usb-otg ADD 82a13bba devmactionrelease (8 bytes) ... devreslog: 49000000.usb-otg ADD 49889daf devmactionrelease (8 bytes) ...

A second issue is addressed here: - regulatorbulkenable() is called upon each PM cycle (suspend/resume). - regulatorbulkdisable() never gets called.

So the reference count for these regulators constantly increase, by one upon each low power cycle, due to missing regulatorbulkdisable() call in _dwc2lowlevelhwdisable().

The original fix that introduced the devmaddactionorreset() call, fixed an issue during probe, that happens due to other errors in dwc2driverprobe() -> dwc2corereset(). Then the probe fails without disabling regulators, when drmode == USBDRMODEPERIPHERAL.

Rather fix the error path: disable all the low level hardware in the error path, by using the "hsotg->llhwenabled" flag. Checking drmode has been introduced to avoid a dual call to dwc2lowlevelhwdisable(). "llhwenabled" should achieve the same (and is used currently in the remove() routine).

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53054.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
33a06f1300a79cfd461cea0268f05e969d4f34ec
Fixed
1f01027c51eb16145e8e07fafea3ca07ef102d06
Fixed
cba76e1fb896b573f09f51aa299223276a77bc90
Fixed
ffb8ab6f87bd28d700ab5c20d9d3a7e75067630d
Fixed
6485fc381b6528b6f547ee1ff10bdbcbe31a6e4c
Fixed
f747313249b74f323ddf841a9c8db14d989f296a
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
c95e1f67b9a84479d1a6d2e9b123a1553af2a75e
Last affected
7d2a4749e1589295c69183f7d79d5b62664b34d6
Last affected
8a8841b9f3eb1f46e3fc6d56a9b9299c53f4f86f
Last affected
fa7fd9ba18533e9aa5f718a06de3deb522a4b587
Last affected
b2c2b88b049684b89776036f9a03fcc2d1bb3c22
Last affected
e7c4b79d70a70b4b7b0a04c640238a2ef0a7a8c8
Last affected
88dcd13872b11bd60e6d4cb6317821e1d367e524

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53054.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.9.0
Fixed
5.10.177
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.105
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.22
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.2.9

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53054.json"