CVE-2023-53693

Source
https://cve.org/CVERecord?id=CVE-2023-53693
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53693.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-53693
Downstream
Related
Published
2025-10-22T13:23:35.280Z
Modified
2026-03-20T12:33:18.271884Z
Summary
USB: gadget: Fix the memory leak in raw_gadget driver
Details

In the Linux kernel, the following vulnerability has been resolved:

USB: gadget: Fix the memory leak in raw_gadget driver

Currently, increasing rawdev->count happens before invoke the rawqueueevent(), if the rawqueueevent() return error, invoke rawrelease() will not trigger the dev_free() to be called.

[ 268.905865][ T5067] raw-gadget.0 gadget.0: failed to queue event [ 268.912053][ T5067] udc dummyudc.0: failed to start USB Raw Gadget: -12 [ 268.918885][ T5067] raw-gadget.0: probe of gadget.0 failed with error -12 [ 268.925956][ T5067] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 268.934657][ T5067] misc raw-gadget: fail, usbgadgetregisterdriver returned -16

BUG: memory leak

[<ffffffff8154bf94>] kmalloctrace+0x24/0x90 mm/slabcommon.c:1076 [<ffffffff8347eb55>] kmalloc include/linux/slab.h:582 [inline] [<ffffffff8347eb55>] kzalloc include/linux/slab.h:703 [inline] [<ffffffff8347eb55>] devnew drivers/usb/gadget/legacy/rawgadget.c:191 [inline] [<ffffffff8347eb55>] rawopen+0x45/0x110 drivers/usb/gadget/legacy/rawgadget.c:385 [<ffffffff827d1d09>] misc_open+0x1a9/0x1f0 drivers/char/misc.c:165

[<ffffffff8154bf94>] kmalloctrace+0x24/0x90 mm/slabcommon.c:1076 [<ffffffff8347cd2f>] kmalloc include/linux/slab.h:582 [inline] [<ffffffff8347cd2f>] rawioctlinit+0xdf/0x410 drivers/usb/gadget/legacy/rawgadget.c:460 [<ffffffff8347dfe9>] rawioctl+0x5f9/0x1120 drivers/usb/gadget/legacy/rawgadget.c:1250 [<ffffffff81685173>] vfsioctl fs/ioctl.c:51 [inline]

[<ffffffff8154bf94>] kmalloctrace+0x24/0x90 mm/slabcommon.c:1076 [<ffffffff833ecc6a>] kmalloc include/linux/slab.h:582 [inline] [<ffffffff833ecc6a>] kzalloc include/linux/slab.h:703 [inline] [<ffffffff833ecc6a>] dummyallocrequest+0x5a/0xe0 drivers/usb/gadget/udc/dummyhcd.c:665 [<ffffffff833e9132>] usbepallocrequest+0x22/0xd0 drivers/usb/gadget/udc/core.c:196 [<ffffffff8347f13d>] gadgetbind+0x6d/0x370 drivers/usb/gadget/legacy/rawgadget.c:292

This commit therefore invoke krefget() under the condition that rawqueue_event() return success.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53693.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
f2c2e717642c66f7fe7e5dd69b2e8ff5849f4d10
Fixed
68e6287ac61dc22513cd39f02b9ac1fef28513e4
Fixed
0f7a2b567197798da7bfa2252f4485c0ca6c6266
Fixed
de77000c1923d7942f9b4f08447c8feeae1c0f33
Fixed
9934e5d07c0dc294169a7d52f6309f35cd6d7755
Fixed
83e30f2bf86ef7c38fbd476ed81a88522b620628

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53693.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.7.0
Fixed
5.10.190
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.124
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.43
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.4.8

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53693.json"