CVE-2023-54083
BaseFortify
Publication date: 2025-12-24
Last updated on: 2025-12-29
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs in the Linux kernel's tegra xusb driver where the driver reference in the usb-phy device is not cleared when the port device is destroyed. Specifically, for a dual-role port, the phy device is assigned to the usb-phy device and uses the port device driver as the usb-phy device driver. When the port device is destroyed, its driver is also destroyed, but the reference in the usb-phy device remains. This can lead to a use-after-free issue detected by KASAN (Kernel Address Sanitizer).
How can this vulnerability impact me? :
This vulnerability can cause a use-after-free condition in the kernel, which may lead to system instability, crashes, or potential security risks such as privilege escalation or arbitrary code execution if exploited. It affects the reliability and security of systems using the affected Linux kernel component.