{"id":"CVE-2023-53196","summary":"usb: dwc3: qcom: Fix potential memory leak","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nusb: dwc3: qcom: Fix potential memory leak\n\nFunction dwc3_qcom_probe() allocates memory for resource structure\nwhich is pointed by parent_res pointer. This memory is not\nfreed. This leads to memory leak. Use stack memory to prevent\nmemory leak.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.","modified":"2026-04-11T11:57:21.730714Z","published":"2025-09-15T14:06:43.535Z","related":["SUSE-SU-2025:03600-1","SUSE-SU-2025:03615-1","SUSE-SU-2025:03628-1","SUSE-SU-2025:03634-1","SUSE-SU-2025:20851-1","SUSE-SU-2025:20861-1","SUSE-SU-2025:20870-1","SUSE-SU-2025:20898-1","SUSE-SU-2025:3716-1","SUSE-SU-2025:3751-1","SUSE-SU-2025:3761-1","SUSE-SU-2025:4057-1","SUSE-SU-2025:4132-1","SUSE-SU-2025:4141-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53196.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/097fb3ee710d4de83b8d4f5589e8ee13e0f0541e"},{"type":"WEB","url":"https://git.kernel.org/stable/c/134a7d4642f11daed6bbc378f930a54dd0322291"},{"type":"WEB","url":"https://git.kernel.org/stable/c/648a163cff21ea355c8765e882ba8bf66a870a3e"},{"type":"WEB","url":"https://git.kernel.org/stable/c/74f8606ddfa450d2255b4e61472a7632def1e8c4"},{"type":"WEB","url":"https://git.kernel.org/stable/c/b626cd5e4a87a281629e0c2b07519990077c0fbe"},{"type":"WEB","url":"https://git.kernel.org/stable/c/c3b322b84ab5dda7eaca9ded763628b7467734f4"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53196.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53196"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"2bc02355f8ba2c1f108ec8b16a673b467a17228c"},{"fixed":"648a163cff21ea355c8765e882ba8bf66a870a3e"},{"fixed":"74f8606ddfa450d2255b4e61472a7632def1e8c4"},{"fixed":"b626cd5e4a87a281629e0c2b07519990077c0fbe"},{"fixed":"c3b322b84ab5dda7eaca9ded763628b7467734f4"},{"fixed":"134a7d4642f11daed6bbc378f930a54dd0322291"},{"fixed":"097fb3ee710d4de83b8d4f5589e8ee13e0f0541e"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53196.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"5.3.0"},{"fixed":"5.4.251"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.5.0"},{"fixed":"5.10.188"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.11.0"},{"fixed":"5.15.121"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"6.1.39"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.2.0"},{"fixed":"6.4.4"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53196.json"}}],"schema_version":"1.7.5"}