VYPR
Unrated severityNVD Advisory· Published Dec 9, 2025· Updated Apr 15, 2026

CVE-2023-53840

CVE-2023-53840

Description

In the Linux kernel, the following vulnerability has been resolved:

usb: early: xhci-dbc: Fix a potential out-of-bound memory access

If xdbc_bulk_write() fails, the values in 'buf' can be anything. So the string is not guaranteed to be NULL terminated when xdbc_trace() is called.

Reserve an extra byte, which will be zeroed automatically because 'buf' is a static variable, in order to avoid troubles, should it happen.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

In the Linux kernel's xhci-dbc early USB driver, a failed xdbc_bulk_write() could leave the buffer non-NULL-terminated, causing an out-of-bounds memory access when passed to xdbc_trace().

Vulnerability

Overview

CVE-2023-53840 is a memory safety flaw in the Linux kernel's early USB xHCI debug capability (xhci-dbc) driver. The root cause lies in the xdbc_trace() function: if xdbc_bulk_write() fails, the contents of the static buf array are indeterminate and not guaranteed to be NULL-terminated. When xdbc_trace() subsequently processes this buffer, it may read past the intended boundaries, leading to an out-of-bounds memory access [1].

Attack

Vector and Impact

The vulnerability is triggerable during early USB debug output, which is enabled only when the kernel is booted with specific debug parameters. An attacker would need local access to the system or control over the USB debug connection to induce a failure in xdbc_bulk_write(). However, the primary impact is a potential denial of service (system crash or memory corruption) rather than privilege escalation, as the bug lies in a debugging subsystem that is not exposed to unprivileged users by default.

Mitigation

The fix, merged into the stable kernel tree, reserves an extra byte in the static buf variable, which is automatically zeroed due to its static storage class [1]. This ensures that even if xdbc_bulk_write() fails, the buffer remains NULL-terminated, preventing the out-of-bounds read. Users should apply the latest stable kernel updates to address this issue.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2
  • Linux/Kernelinferred2 versions
    (expand)+ 1 more
    • (no CPE)
    • (no CPE)

Patches

4

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

4

News mentions

0

No linked articles in our index yet.