CVE-2023-53475Linux vulnerability

5 documents5 sources
Severity
5.5MEDIUMNVD
EPSS
0.0%
top 95.88%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 1

Description

In the Linux kernel, the following vulnerability has been resolved: usb: xhci: tegra: fix sleep in atomic call When we set the dual-role port to Host mode, we observed the following splat: [ 167.057718] BUG: sleeping function called from invalid context at include/linux/sched/mm.h:229 [ 167.057872] Workqueue: events tegra_xusb_usb_phy_work [ 167.057954] Call trace: [ 167.057962] dump_backtrace+0x0/0x210 [ 167.057996] show_stack+0x30/0x50 [ 167.058020] dump_stack_lvl+0x64/0x84 [ 167.058065] dum

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages4 packages

NVDlinux/linux_kernel5.75.10.178+4
Debianlinux/linux_kernel< 5.10.178-1+3
CVEListV5linux/linuxf836e7843036fbf34320356e156cd4267fa5bfa2b4b4f17aa46c025da77aed5133b08971959c9684+5
debiandebian/linux< linux 6.1.25-1 (bookworm)

Patches

🔴Vulnerability Details

2
GHSA
GHSA-hj96-v5c9-949r: In the Linux kernel, the following vulnerability has been resolved: usb: xhci: tegra: fix sleep in atomic call When we set the dual-role port to Hos2025-10-01
OSV
CVE-2023-53475: In the Linux kernel, the following vulnerability has been resolved: usb: xhci: tegra: fix sleep in atomic call When we set the dual-role port to Host2025-10-01

📋Vendor Advisories

2
Red Hat
kernel: usb: xhci: tegra: fix sleep in atomic call2025-10-01
Debian
CVE-2023-53475: linux - In the Linux kernel, the following vulnerability has been resolved: usb: xhci: ...2023