CVE-2023-53475
Gravedad CVSS v3.1:
MEDIA
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
01/10/2025
Última modificación:
20/01/2026
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
usb: xhci: tegra: fix sleep in atomic call<br />
<br />
When we set the dual-role port to Host mode, we observed the following<br />
splat:<br />
[ 167.057718] BUG: sleeping function called from invalid context at<br />
include/linux/sched/mm.h:229<br />
[ 167.057872] Workqueue: events tegra_xusb_usb_phy_work<br />
[ 167.057954] Call trace:<br />
[ 167.057962] dump_backtrace+0x0/0x210<br />
[ 167.057996] show_stack+0x30/0x50<br />
[ 167.058020] dump_stack_lvl+0x64/0x84<br />
[ 167.058065] dump_stack+0x14/0x34<br />
[ 167.058100] __might_resched+0x144/0x180<br />
[ 167.058140] __might_sleep+0x64/0xd0<br />
[ 167.058171] slab_pre_alloc_hook.constprop.0+0xa8/0x110<br />
[ 167.058202] __kmalloc_track_caller+0x74/0x2b0<br />
[ 167.058233] kvasprintf+0xa4/0x190<br />
[ 167.058261] kasprintf+0x58/0x90<br />
[ 167.058285] tegra_xusb_find_port_node.isra.0+0x58/0xd0<br />
[ 167.058334] tegra_xusb_find_port+0x38/0xa0<br />
[ 167.058380] tegra_xusb_padctl_get_usb3_companion+0x38/0xd0<br />
[ 167.058430] tegra_xhci_id_notify+0x8c/0x1e0<br />
[ 167.058473] notifier_call_chain+0x88/0x100<br />
[ 167.058506] atomic_notifier_call_chain+0x44/0x70<br />
[ 167.058537] tegra_xusb_usb_phy_work+0x60/0xd0<br />
[ 167.058581] process_one_work+0x1dc/0x4c0<br />
[ 167.058618] worker_thread+0x54/0x410<br />
[ 167.058650] kthread+0x188/0x1b0<br />
[ 167.058672] ret_from_fork+0x10/0x20<br />
<br />
The function tegra_xusb_padctl_get_usb3_companion eventually calls<br />
tegra_xusb_find_port and this in turn calls kasprintf which might sleep<br />
and so cannot be called from an atomic context.<br />
<br />
Fix this by moving the call to tegra_xusb_padctl_get_usb3_companion to<br />
the tegra_xhci_id_work function where it is really needed.
Impacto
Puntuación base 3.x
5.50
Gravedad 3.x
MEDIA
Productos y versiones vulnerables
| CPE | Desde | Hasta |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.7 (incluyendo) | 5.10.178 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (incluyendo) | 5.15.107 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (incluyendo) | 6.1.24 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (incluyendo) | 6.2.11 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:6.3:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.3:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.3:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.3:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.3:rc5:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- https://git.kernel.org/stable/c/1122474b757a5dd8b2b50008a97f33cdb10dff6e
- https://git.kernel.org/stable/c/130c61c516cd0684282a8f6ab163281d60642fc5
- https://git.kernel.org/stable/c/1fe6015aa92cc0dfd875c1d3c7c1750a1b0767d9
- https://git.kernel.org/stable/c/4c7f9d2e413dc06a157c4e5dccde84aaf4655eb3
- https://git.kernel.org/stable/c/b4b4f17aa46c025da77aed5133b08971959c9684



