CVE-2023-53529
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
01/10/2025
Last modified:
23/01/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
wifi: rtw88: Fix memory leak in rtw88_usb<br />
<br />
Kmemleak shows the following leak arising from routine in the usb<br />
probe routine:<br />
<br />
unreferenced object 0xffff895cb29bba00 (size 512):<br />
comm "(udev-worker)", pid 534, jiffies 4294903932 (age 102751.088s)<br />
hex dump (first 32 bytes):<br />
77 30 30 30 00 00 00 00 02 2f 2d 2b 30 00 00 00 w000...../-+0...<br />
02 00 2a 28 00 00 00 00 ff 55 ff ff ff 00 00 00 ..*(.....U......<br />
backtrace:<br />
[] kmalloc_trace+0x26/0x90<br />
[] rtw_usb_probe+0x2f1/0x680 [rtw_usb]<br />
[] usb_probe_interface+0xdd/0x2e0 [usbcore]<br />
[] really_probe+0x18e/0x3d0<br />
[] __driver_probe_device+0x78/0x160<br />
[] driver_probe_device+0x1f/0x90<br />
[] __driver_attach+0xbf/0x1b0<br />
[] bus_for_each_dev+0x70/0xc0<br />
[] bus_add_driver+0x10e/0x210<br />
[] driver_register+0x55/0xf0<br />
[] usb_register_driver+0x88/0x140 [usbcore]<br />
[] do_one_initcall+0x43/0x210<br />
[] do_init_module+0x4a/0x200<br />
[] __do_sys_finit_module+0xac/0x120<br />
[] do_syscall_64+0x56/0x80<br />
[] entry_SYSCALL_64_after_hwframe+0x46/0xb0<br />
<br />
The leak was verified to be real by unloading the driver, which resulted<br />
in a dangling pointer to the allocation.<br />
<br />
The allocated memory is freed in rtw_usb_intf_deinit().
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.2 (including) | 6.3.4 (excluding) |
To consult the complete list of CPE names with products and versions, see this page



