CVE-2023-53415 (GCVE-0-2023-53415)
Vulnerability from cvelistv5
Published
2025-09-18 13:58
Modified
2026-01-14 19:13
Summary
In the Linux kernel, the following vulnerability has been resolved: USB: dwc3: fix memory leak with using debugfs_lookup() When calling debugfs_lookup() the result must have dput() called on it, otherwise the memory will leak over time. To make things simpler, just call debugfs_lookup_and_remove() instead which handles all of the logic at once. Note, the root dentry for the debugfs directory for the device needs to be saved so we don't have to keep looking it up, which required a bit more refactoring to properly create and remove it when needed.
Impacted products
Vendor Product Version
Linux Linux Version: 8d396bb0a5b62b326f6be7594d8bd46b088296bd
Version: 8d396bb0a5b62b326f6be7594d8bd46b088296bd
Version: 8d396bb0a5b62b326f6be7594d8bd46b088296bd
Version: 8d396bb0a5b62b326f6be7594d8bd46b088296bd
Version: 3bef21035888dd19750ad79b5d08fe52a02ad719
Version: d7e403eea007f47776186d4d572f234b1221e6e3
Version: e52d43c82f2f6556f0b7a790c19c072c1e99a95f
Version: afd8b0d091d5b4febe2d0ac3b7735c1826329302
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "HIGH",
              "baseScore": 5.5,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "NONE",
              "integrityImpact": "NONE",
              "privilegesRequired": "LOW",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2023-53415",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-01-14T19:05:29.768162Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-401",
                "description": "CWE-401 Missing Release of Memory after Effective Lifetime",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-01-14T19:13:07.084Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "drivers/usb/dwc3/core.h",
            "drivers/usb/dwc3/debug.h",
            "drivers/usb/dwc3/debugfs.c",
            "drivers/usb/dwc3/gadget.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "cf52c320cf74245ce1c12b0bd48f77b87d77fbc9",
              "status": "affected",
              "version": "8d396bb0a5b62b326f6be7594d8bd46b088296bd",
              "versionType": "git"
            },
            {
              "lessThan": "ce234af49d103d95e3fdca59b25e0d0242f41bb4",
              "status": "affected",
              "version": "8d396bb0a5b62b326f6be7594d8bd46b088296bd",
              "versionType": "git"
            },
            {
              "lessThan": "bab872b638130a18fd54d9adfad7db77ed6457be",
              "status": "affected",
              "version": "8d396bb0a5b62b326f6be7594d8bd46b088296bd",
              "versionType": "git"
            },
            {
              "lessThan": "be308d68785b205e483b3a0c61ba3a82da468f2c",
              "status": "affected",
              "version": "8d396bb0a5b62b326f6be7594d8bd46b088296bd",
              "versionType": "git"
            },
            {
              "status": "affected",
              "version": "3bef21035888dd19750ad79b5d08fe52a02ad719",
              "versionType": "git"
            },
            {
              "status": "affected",
              "version": "d7e403eea007f47776186d4d572f234b1221e6e3",
              "versionType": "git"
            },
            {
              "status": "affected",
              "version": "e52d43c82f2f6556f0b7a790c19c072c1e99a95f",
              "versionType": "git"
            },
            {
              "status": "affected",
              "version": "afd8b0d091d5b4febe2d0ac3b7735c1826329302",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "drivers/usb/dwc3/core.h",
            "drivers/usb/dwc3/debug.h",
            "drivers/usb/dwc3/debugfs.c",
            "drivers/usb/dwc3/gadget.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "5.13"
            },
            {
              "lessThan": "5.13",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.15.*",
              "status": "unaffected",
              "version": "5.15.100",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.1.*",
              "status": "unaffected",
              "version": "6.1.18",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.2.*",
              "status": "unaffected",
              "version": "6.2.5",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "6.3",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.15.100",
                  "versionStartIncluding": "5.13",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.1.18",
                  "versionStartIncluding": "5.13",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.2.5",
                  "versionStartIncluding": "5.13",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.3",
                  "versionStartIncluding": "5.13",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionStartIncluding": "4.19.196",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionStartIncluding": "5.4.128",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionStartIncluding": "5.10.46",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionStartIncluding": "5.12.13",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nUSB: dwc3: fix memory leak with using debugfs_lookup()\n\nWhen calling debugfs_lookup() the result must have dput() called on it,\notherwise the memory will leak over time.  To make things simpler, just\ncall debugfs_lookup_and_remove() instead which handles all of the logic\nat once.\n\nNote, the root dentry for the debugfs directory for the device needs to\nbe saved so we don\u0027t have to keep looking it up, which required a bit\nmore refactoring to properly create and remove it when needed."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-01-05T10:20:04.274Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/cf52c320cf74245ce1c12b0bd48f77b87d77fbc9"
        },
        {
          "url": "https://git.kernel.org/stable/c/ce234af49d103d95e3fdca59b25e0d0242f41bb4"
        },
        {
          "url": "https://git.kernel.org/stable/c/bab872b638130a18fd54d9adfad7db77ed6457be"
        },
        {
          "url": "https://git.kernel.org/stable/c/be308d68785b205e483b3a0c61ba3a82da468f2c"
        }
      ],
      "title": "USB: dwc3: fix memory leak with using debugfs_lookup()",
      "x_generator": {
        "engine": "bippy-1.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2023-53415",
    "datePublished": "2025-09-18T13:58:51.771Z",
    "dateReserved": "2025-09-17T14:54:09.740Z",
    "dateUpdated": "2026-01-14T19:13:07.084Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2",
  "vulnerability-lookup:meta": {
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 5.5, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"NONE\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2023-53415\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2026-01-14T19:05:29.768162Z\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-401\", \"description\": \"CWE-401 Missing Release of Memory after Effective Lifetime\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2026-01-14T19:05:25.783Z\"}}], \"cna\": {\"title\": \"USB: dwc3: fix memory leak with using debugfs_lookup()\", \"affected\": [{\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"8d396bb0a5b62b326f6be7594d8bd46b088296bd\", \"lessThan\": \"cf52c320cf74245ce1c12b0bd48f77b87d77fbc9\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"8d396bb0a5b62b326f6be7594d8bd46b088296bd\", \"lessThan\": \"ce234af49d103d95e3fdca59b25e0d0242f41bb4\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"8d396bb0a5b62b326f6be7594d8bd46b088296bd\", \"lessThan\": \"bab872b638130a18fd54d9adfad7db77ed6457be\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"8d396bb0a5b62b326f6be7594d8bd46b088296bd\", \"lessThan\": \"be308d68785b205e483b3a0c61ba3a82da468f2c\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"3bef21035888dd19750ad79b5d08fe52a02ad719\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"d7e403eea007f47776186d4d572f234b1221e6e3\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"e52d43c82f2f6556f0b7a790c19c072c1e99a95f\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"afd8b0d091d5b4febe2d0ac3b7735c1826329302\", \"versionType\": \"git\"}], \"programFiles\": [\"drivers/usb/dwc3/core.h\", \"drivers/usb/dwc3/debug.h\", \"drivers/usb/dwc3/debugfs.c\", \"drivers/usb/dwc3/gadget.c\"], \"defaultStatus\": \"unaffected\"}, {\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"5.13\"}, {\"status\": \"unaffected\", \"version\": \"0\", \"lessThan\": \"5.13\", \"versionType\": \"semver\"}, {\"status\": \"unaffected\", \"version\": \"5.15.100\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.15.*\"}, {\"status\": \"unaffected\", \"version\": \"6.1.18\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.1.*\"}, {\"status\": \"unaffected\", \"version\": \"6.2.5\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.2.*\"}, {\"status\": \"unaffected\", \"version\": \"6.3\", \"versionType\": \"original_commit_for_fix\", \"lessThanOrEqual\": \"*\"}], \"programFiles\": [\"drivers/usb/dwc3/core.h\", \"drivers/usb/dwc3/debug.h\", \"drivers/usb/dwc3/debugfs.c\", \"drivers/usb/dwc3/gadget.c\"], \"defaultStatus\": \"affected\"}], \"references\": [{\"url\": \"https://git.kernel.org/stable/c/cf52c320cf74245ce1c12b0bd48f77b87d77fbc9\"}, {\"url\": \"https://git.kernel.org/stable/c/ce234af49d103d95e3fdca59b25e0d0242f41bb4\"}, {\"url\": \"https://git.kernel.org/stable/c/bab872b638130a18fd54d9adfad7db77ed6457be\"}, {\"url\": \"https://git.kernel.org/stable/c/be308d68785b205e483b3a0c61ba3a82da468f2c\"}], \"x_generator\": {\"engine\": \"bippy-1.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\nUSB: dwc3: fix memory leak with using debugfs_lookup()\\n\\nWhen calling debugfs_lookup() the result must have dput() called on it,\\notherwise the memory will leak over time.  To make things simpler, just\\ncall debugfs_lookup_and_remove() instead which handles all of the logic\\nat once.\\n\\nNote, the root dentry for the debugfs directory for the device needs to\\nbe saved so we don\u0027t have to keep looking it up, which required a bit\\nmore refactoring to properly create and remove it when needed.\"}], \"cpeApplicability\": [{\"nodes\": [{\"negate\": false, \"cpeMatch\": [{\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.15.100\", \"versionStartIncluding\": \"5.13\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.1.18\", \"versionStartIncluding\": \"5.13\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.2.5\", \"versionStartIncluding\": \"5.13\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.3\", \"versionStartIncluding\": \"5.13\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionStartIncluding\": \"4.19.196\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionStartIncluding\": \"5.4.128\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionStartIncluding\": \"5.10.46\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionStartIncluding\": \"5.12.13\"}], \"operator\": \"OR\"}]}], \"providerMetadata\": {\"orgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"shortName\": \"Linux\", \"dateUpdated\": \"2026-01-05T10:20:04.274Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2023-53415\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-01-14T19:13:07.084Z\", \"dateReserved\": \"2025-09-17T14:54:09.740Z\", \"assignerOrgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"datePublished\": \"2025-09-18T13:58:51.771Z\", \"assignerShortName\": \"Linux\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.2"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…