CVE-2023-53045 (GCVE-0-2023-53045)
Vulnerability from cvelistv5
Published
2025-05-02 15:55
Modified
2025-05-04 07:48
Severity ?
Summary
In the Linux kernel, the following vulnerability has been resolved: usb: gadget: u_audio: don't let userspace block driver unbind In the unbind callback for f_uac1 and f_uac2, a call to snd_card_free() via g_audio_cleanup() will disconnect the card and then wait for all resources to be released, which happens when the refcount falls to zero. Since userspace can keep the refcount incremented by not closing the relevant file descriptor, the call to unbind may block indefinitely. This can cause a deadlock during reboot, as evidenced by the following blocked task observed on my machine: task:reboot state:D stack:0 pid:2827 ppid:569 flags:0x0000000c Call trace: __switch_to+0xc8/0x140 __schedule+0x2f0/0x7c0 schedule+0x60/0xd0 schedule_timeout+0x180/0x1d4 wait_for_completion+0x78/0x180 snd_card_free+0x90/0xa0 g_audio_cleanup+0x2c/0x64 afunc_unbind+0x28/0x60 ... kernel_restart+0x4c/0xac __do_sys_reboot+0xcc/0x1ec __arm64_sys_reboot+0x28/0x30 invoke_syscall+0x4c/0x110 ... The issue can also be observed by opening the card with arecord and then stopping the process through the shell before unbinding: # arecord -D hw:UAC2Gadget -f S32_LE -c 2 -r 48000 /dev/null Recording WAVE '/dev/null' : Signed 32 bit Little Endian, Rate 48000 Hz, Stereo ^Z[1]+ Stopped arecord -D hw:UAC2Gadget -f S32_LE -c 2 -r 48000 /dev/null # echo gadget.0 > /sys/bus/gadget/drivers/configfs-gadget/unbind (observe that the unbind command never finishes) Fix the problem by using snd_card_free_when_closed() instead, which will still disconnect the card as desired, but defer the task of freeing the resources to the core once userspace closes its file descriptor.
Impacted products
Vendor Product Version
Linux Linux Version: 132fcb460839a876f5bc8b71bede60f8d0875757
Version: 132fcb460839a876f5bc8b71bede60f8d0875757
Version: 132fcb460839a876f5bc8b71bede60f8d0875757
Version: 132fcb460839a876f5bc8b71bede60f8d0875757
Version: 132fcb460839a876f5bc8b71bede60f8d0875757
Version: 132fcb460839a876f5bc8b71bede60f8d0875757
Version: 132fcb460839a876f5bc8b71bede60f8d0875757
Version: 132fcb460839a876f5bc8b71bede60f8d0875757
Create a notification for this product.
   Linux Linux Version: 3.4
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "drivers/usb/gadget/function/u_audio.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "3e016ef2e72da93a2ea7afbb45de1b481b44d761",
              "status": "affected",
              "version": "132fcb460839a876f5bc8b71bede60f8d0875757",
              "versionType": "git"
            },
            {
              "lessThan": "3256e152b645fc1e788ba44c2d8ced690113e3e6",
              "status": "affected",
              "version": "132fcb460839a876f5bc8b71bede60f8d0875757",
              "versionType": "git"
            },
            {
              "lessThan": "0eda2004f38d95ef5715d62be884cd344260535b",
              "status": "affected",
              "version": "132fcb460839a876f5bc8b71bede60f8d0875757",
              "versionType": "git"
            },
            {
              "lessThan": "33f341c1fc60e172a3515c51bdabee11e83d1ee9",
              "status": "affected",
              "version": "132fcb460839a876f5bc8b71bede60f8d0875757",
              "versionType": "git"
            },
            {
              "lessThan": "b131989797f7287d7fdadb2bababc05a15d44750",
              "status": "affected",
              "version": "132fcb460839a876f5bc8b71bede60f8d0875757",
              "versionType": "git"
            },
            {
              "lessThan": "3bc7324e4911351e39c54a62e6ca46321cb10faf",
              "status": "affected",
              "version": "132fcb460839a876f5bc8b71bede60f8d0875757",
              "versionType": "git"
            },
            {
              "lessThan": "43ca70753dfffd517d2af126da28690f8f615605",
              "status": "affected",
              "version": "132fcb460839a876f5bc8b71bede60f8d0875757",
              "versionType": "git"
            },
            {
              "lessThan": "6c67ed9ad9b83e453e808f9b31a931a20a25629b",
              "status": "affected",
              "version": "132fcb460839a876f5bc8b71bede60f8d0875757",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "drivers/usb/gadget/function/u_audio.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "3.4"
            },
            {
              "lessThan": "3.4",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.14.*",
              "status": "unaffected",
              "version": "4.14.312",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.19.*",
              "status": "unaffected",
              "version": "4.19.280",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.4.*",
              "status": "unaffected",
              "version": "5.4.240",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.10.*",
              "status": "unaffected",
              "version": "5.10.177",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.15.*",
              "status": "unaffected",
              "version": "5.15.105",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.1.*",
              "status": "unaffected",
              "version": "6.1.22",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.2.*",
              "status": "unaffected",
              "version": "6.2.9",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "6.3",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "4.14.312",
                  "versionStartIncluding": "3.4",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "4.19.280",
                  "versionStartIncluding": "3.4",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.4.240",
                  "versionStartIncluding": "3.4",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.10.177",
                  "versionStartIncluding": "3.4",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.15.105",
                  "versionStartIncluding": "3.4",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.1.22",
                  "versionStartIncluding": "3.4",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.2.9",
                  "versionStartIncluding": "3.4",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.3",
                  "versionStartIncluding": "3.4",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: gadget: u_audio: don\u0027t let userspace block driver unbind\n\nIn the unbind callback for f_uac1 and f_uac2, a call to snd_card_free()\nvia g_audio_cleanup() will disconnect the card and then wait for all\nresources to be released, which happens when the refcount falls to zero.\nSince userspace can keep the refcount incremented by not closing the\nrelevant file descriptor, the call to unbind may block indefinitely.\nThis can cause a deadlock during reboot, as evidenced by the following\nblocked task observed on my machine:\n\n  task:reboot  state:D stack:0   pid:2827  ppid:569    flags:0x0000000c\n  Call trace:\n   __switch_to+0xc8/0x140\n   __schedule+0x2f0/0x7c0\n   schedule+0x60/0xd0\n   schedule_timeout+0x180/0x1d4\n   wait_for_completion+0x78/0x180\n   snd_card_free+0x90/0xa0\n   g_audio_cleanup+0x2c/0x64\n   afunc_unbind+0x28/0x60\n   ...\n   kernel_restart+0x4c/0xac\n   __do_sys_reboot+0xcc/0x1ec\n   __arm64_sys_reboot+0x28/0x30\n   invoke_syscall+0x4c/0x110\n   ...\n\nThe issue can also be observed by opening the card with arecord and\nthen stopping the process through the shell before unbinding:\n\n  # arecord -D hw:UAC2Gadget -f S32_LE -c 2 -r 48000 /dev/null\n  Recording WAVE \u0027/dev/null\u0027 : Signed 32 bit Little Endian, Rate 48000 Hz, Stereo\n  ^Z[1]+  Stopped                    arecord -D hw:UAC2Gadget -f S32_LE -c 2 -r 48000 /dev/null\n  # echo gadget.0 \u003e /sys/bus/gadget/drivers/configfs-gadget/unbind\n  (observe that the unbind command never finishes)\n\nFix the problem by using snd_card_free_when_closed() instead, which will\nstill disconnect the card as desired, but defer the task of freeing the\nresources to the core once userspace closes its file descriptor."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-05-04T07:48:29.370Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/3e016ef2e72da93a2ea7afbb45de1b481b44d761"
        },
        {
          "url": "https://git.kernel.org/stable/c/3256e152b645fc1e788ba44c2d8ced690113e3e6"
        },
        {
          "url": "https://git.kernel.org/stable/c/0eda2004f38d95ef5715d62be884cd344260535b"
        },
        {
          "url": "https://git.kernel.org/stable/c/33f341c1fc60e172a3515c51bdabee11e83d1ee9"
        },
        {
          "url": "https://git.kernel.org/stable/c/b131989797f7287d7fdadb2bababc05a15d44750"
        },
        {
          "url": "https://git.kernel.org/stable/c/3bc7324e4911351e39c54a62e6ca46321cb10faf"
        },
        {
          "url": "https://git.kernel.org/stable/c/43ca70753dfffd517d2af126da28690f8f615605"
        },
        {
          "url": "https://git.kernel.org/stable/c/6c67ed9ad9b83e453e808f9b31a931a20a25629b"
        }
      ],
      "title": "usb: gadget: u_audio: don\u0027t let userspace block driver unbind",
      "x_generator": {
        "engine": "bippy-1.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2023-53045",
    "datePublished": "2025-05-02T15:55:02.518Z",
    "dateReserved": "2025-04-16T07:18:43.828Z",
    "dateUpdated": "2025-05-04T07:48:29.370Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2023-53045\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2025-05-02T16:15:23.590\",\"lastModified\":\"2025-05-05T20:54:45.973\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nusb: gadget: u_audio: don\u0027t let userspace block driver unbind\\n\\nIn the unbind callback for f_uac1 and f_uac2, a call to snd_card_free()\\nvia g_audio_cleanup() will disconnect the card and then wait for all\\nresources to be released, which happens when the refcount falls to zero.\\nSince userspace can keep the refcount incremented by not closing the\\nrelevant file descriptor, the call to unbind may block indefinitely.\\nThis can cause a deadlock during reboot, as evidenced by the following\\nblocked task observed on my machine:\\n\\n  task:reboot  state:D stack:0   pid:2827  ppid:569    flags:0x0000000c\\n  Call trace:\\n   __switch_to+0xc8/0x140\\n   __schedule+0x2f0/0x7c0\\n   schedule+0x60/0xd0\\n   schedule_timeout+0x180/0x1d4\\n   wait_for_completion+0x78/0x180\\n   snd_card_free+0x90/0xa0\\n   g_audio_cleanup+0x2c/0x64\\n   afunc_unbind+0x28/0x60\\n   ...\\n   kernel_restart+0x4c/0xac\\n   __do_sys_reboot+0xcc/0x1ec\\n   __arm64_sys_reboot+0x28/0x30\\n   invoke_syscall+0x4c/0x110\\n   ...\\n\\nThe issue can also be observed by opening the card with arecord and\\nthen stopping the process through the shell before unbinding:\\n\\n  # arecord -D hw:UAC2Gadget -f S32_LE -c 2 -r 48000 /dev/null\\n  Recording WAVE \u0027/dev/null\u0027 : Signed 32 bit Little Endian, Rate 48000 Hz, Stereo\\n  ^Z[1]+  Stopped                    arecord -D hw:UAC2Gadget -f S32_LE -c 2 -r 48000 /dev/null\\n  # echo gadget.0 \u003e /sys/bus/gadget/drivers/configfs-gadget/unbind\\n  (observe that the unbind command never finishes)\\n\\nFix the problem by using snd_card_free_when_closed() instead, which will\\nstill disconnect the card as desired, but defer the task of freeing the\\nresources to the core once userspace closes its file descriptor.\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: usb: gadget: u_audio: no permitir que el espacio de usuario bloquee la desvinculaci\u00f3n del controlador. En la llamada de desvinculaci\u00f3n para f_uac1 y f_uac2, una llamada a snd_card_free() mediante g_audio_cleanup() desconectar\u00e1 la tarjeta y esperar\u00e1 a que se liberen todos los recursos, lo que ocurre cuando el recuento de referencias llega a cero. Dado que el espacio de usuario puede mantener el recuento de referencias incrementado al no cerrar el descriptor de archivo correspondiente, la llamada a desvinculaci\u00f3n podr\u00eda bloquearse indefinidamente. Esto puede causar un bloqueo durante el reinicio, como lo demuestra la siguiente tarea bloqueada observada en mi m\u00e1quina: task:reboot state:D stack:0 pid:2827 ppid:569 flags:0x0000000c Rastreo de llamadas: __switch_to+0xc8/0x140 __schedule+0x2f0/0x7c0 schedule+0x60/0xd0 schedule_timeout+0x180/0x1d4 wait_for_completion+0x78/0x180 snd_card_free+0x90/0xa0 g_audio_cleanup+0x2c/0x64 afunc_unbind+0x28/0x60 ... kernel_restart+0x4c/0xac __do_sys_reboot+0xcc/0x1ec __arm64_sys_reboot+0x28/0x30 invoke_syscall+0x4c/0x110 ... El problema tambi\u00e9n se puede observar al abrir la tarjeta con arecord y luego detener el proceso a trav\u00e9s del shell antes de desvincular: # arecord -D hw:UAC2Gadget -f S32_LE -c 2 -r 48000 /dev/null Recording WAVE \u0027/dev/null\u0027 : Signed 32 bit Little Endian, Rate 48000 Hz, Stereo ^Z[1]+ Stopped arecord -D hw:UAC2Gadget -f S32_LE -c 2 -r 48000 /dev/null # echo gadget.0 \u0026gt; /sys/bus/gadget/drivers/configfs-gadget/unbind (observe que el comando de desvinculaci\u00f3n nunca finaliza) Corrija el problema usando snd_card_free_when_closed() en su lugar, que a\u00fan desconectar\u00e1 la tarjeta como se desea, pero pospondr\u00e1 la tarea de liberar los recursos al n\u00facleo una vez que el espacio de usuario cierre su descriptor de archivo.\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/0eda2004f38d95ef5715d62be884cd344260535b\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/3256e152b645fc1e788ba44c2d8ced690113e3e6\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/33f341c1fc60e172a3515c51bdabee11e83d1ee9\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/3bc7324e4911351e39c54a62e6ca46321cb10faf\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/3e016ef2e72da93a2ea7afbb45de1b481b44d761\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/43ca70753dfffd517d2af126da28690f8f615605\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/6c67ed9ad9b83e453e808f9b31a931a20a25629b\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/b131989797f7287d7fdadb2bababc05a15d44750\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…