CVE-2023-54083
Description
In the Linux kernel, the following vulnerability has been resolved:
phy: tegra: xusb: Clear the driver reference in usb-phy dev
For the dual-role port, it will assign the phy dev to usb-phy dev and use the port dev driver as the dev driver of usb-phy.
When we try to destroy the port dev, it will destroy its dev driver as well. But we did not remove the reference from usb-phy dev. This might cause the use-after-free issue in KASAN.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
In the Linux kernel's Tegra XUSB phy driver, dual-role port device cleanup fails to clear a usb-phy reference, leading to a use-after-free vulnerability.
Root
Cause
The vulnerability resides in the Linux kernel's phy: tegra: xusb driver. For dual-role USB ports, the driver assigns the physical device (phy dev) to the usb-phy device and uses the port device's driver as the usb-phy device's driver. When the port device is destroyed, its device driver is also destroyed. However, the reference from the usb-phy device to that driver is not removed, leaving a dangling pointer.
Exploitation
Exploitation requires that a dual-role port (capable of acting as both host and device) be used and subsequently removed while the usb-phy device still holds a reference to the port device's driver. No special privileges are needed beyond the ability to trigger device removal (e.g., through hot-unplug, driver unbind, or system suspend/resume cycles). An attacker with physical access or control over the USB subsystem could potentially induce the vulnerable code path.
Impact
A use-after-free condition occurs when the stale driver reference is accessed after the port device has been destroyed. This can lead to memory corruption, a kernel crash (denial of service), or potentially arbitrary code execution in kernel context, as reported by KASAN [1].
Mitigation
The fix involves clearing the driver reference in the usb-phy device during port device teardown. Patches have been applied to the Linux kernel stable branches; users should update to a kernel version containing the commit that addresses CVE-2023-54083 [1][2][3].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
5b6a107c52073b84998a407a8238edc04ddb982187460347ac0c2fcb1325dVulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
5- git.kernel.org/stable/c/238edc04ddb9d272b38f5419bcd419ad3b92b91bnvd
- git.kernel.org/stable/c/82187460347ad58fd6b06d2883da73c3f2df9631nvd
- git.kernel.org/stable/c/b6a107c52073496d2e5d2837915f59fb3103832fnvd
- git.kernel.org/stable/c/b84998a407a882991916b1a61d987c400d8a0ce6nvd
- git.kernel.org/stable/c/c0c2fcb1325d0d4f3b322b5ee49385f8eca2560dnvd
News mentions
0No linked articles in our index yet.