CVE-2023-53529
Gravedad CVSS v3.1:
MEDIA
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
01/10/2025
Última modificación:
23/01/2026
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
wifi: rtw88: Fix memory leak in rtw88_usb<br />
<br />
Kmemleak shows the following leak arising from routine in the usb<br />
probe routine:<br />
<br />
unreferenced object 0xffff895cb29bba00 (size 512):<br />
comm "(udev-worker)", pid 534, jiffies 4294903932 (age 102751.088s)<br />
hex dump (first 32 bytes):<br />
77 30 30 30 00 00 00 00 02 2f 2d 2b 30 00 00 00 w000...../-+0...<br />
02 00 2a 28 00 00 00 00 ff 55 ff ff ff 00 00 00 ..*(.....U......<br />
backtrace:<br />
[] kmalloc_trace+0x26/0x90<br />
[] rtw_usb_probe+0x2f1/0x680 [rtw_usb]<br />
[] usb_probe_interface+0xdd/0x2e0 [usbcore]<br />
[] really_probe+0x18e/0x3d0<br />
[] __driver_probe_device+0x78/0x160<br />
[] driver_probe_device+0x1f/0x90<br />
[] __driver_attach+0xbf/0x1b0<br />
[] bus_for_each_dev+0x70/0xc0<br />
[] bus_add_driver+0x10e/0x210<br />
[] driver_register+0x55/0xf0<br />
[] usb_register_driver+0x88/0x140 [usbcore]<br />
[] do_one_initcall+0x43/0x210<br />
[] do_init_module+0x4a/0x200<br />
[] __do_sys_finit_module+0xac/0x120<br />
[] do_syscall_64+0x56/0x80<br />
[] entry_SYSCALL_64_after_hwframe+0x46/0xb0<br />
<br />
The leak was verified to be real by unloading the driver, which resulted<br />
in a dangling pointer to the allocation.<br />
<br />
The allocated memory is freed in rtw_usb_intf_deinit().
Impacto
Puntuación base 3.x
5.50
Gravedad 3.x
MEDIA
Productos y versiones vulnerables
| CPE | Desde | Hasta |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.2 (incluyendo) | 6.3.4 (excluyendo) |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página



