This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
Project Subscriptions
No data.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
No reference.
History
Tue, 30 Dec 2025 14:30:00 +0000
Tue, 30 Dec 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In the Linux kernel, the following vulnerability has been resolved: usb: dwc3: don't reset device side if dwc3 was configured as host-only Commit c4a5153e87fd ("usb: dwc3: core: Power-off core/PHYs on system_suspend in host mode") replaces check for HOST only dr_mode with current_dr_role. But during booting, the current_dr_role isn't initialized, thus the device side reset is always issued even if dwc3 was configured as host-only. What's more, on some platforms with host only dwc3, aways issuing device side reset by accessing device register block can cause kernel panic. | This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. |
| Title | usb: dwc3: don't reset device side if dwc3 was configured as host-only | |
| CPEs | ||
| Vendors & Products |
Linux
Linux linux Kernel |
Tue, 30 Dec 2025 12:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In the Linux kernel, the following vulnerability has been resolved: usb: dwc3: don't reset device side if dwc3 was configured as host-only Commit c4a5153e87fd ("usb: dwc3: core: Power-off core/PHYs on system_suspend in host mode") replaces check for HOST only dr_mode with current_dr_role. But during booting, the current_dr_role isn't initialized, thus the device side reset is always issued even if dwc3 was configured as host-only. What's more, on some platforms with host only dwc3, aways issuing device side reset by accessing device register block can cause kernel panic. | |
| Title | usb: dwc3: don't reset device side if dwc3 was configured as host-only | |
| First Time appeared |
Linux
Linux linux Kernel |
|
| CPEs | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Linux
Linux linux Kernel |
|
| References |
|
|
Projects
Sign in to view the affected projects.
Status: REJECTED
Assigner: Linux
Published:
Updated: 2025-12-30T14:05:55.844Z
Reserved: 2025-12-30T12:06:44.515Z
Link: CVE-2023-54256
No data.
Status : Rejected
Published: 2025-12-30T13:16:14.330
Modified: 2025-12-30T14:15:52.533
Link: CVE-2023-54256
No data.
OpenCVE Enrichment
No data.
Weaknesses
No weakness.