CVE-2023-53452
BaseFortify
Publication date: 2025-10-01
Last updated on: 2025-10-02
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| rtw89 | rtw89 | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a race condition in the Linux kernel's wifi driver (rtw89). It occurs when the network device (netdev) is registered before the NAPI (New API for network packet processing) is initialized, and user space starts the netdev which enables NAPI. This sequence can trigger a kernel BUG due to an invalid operation, causing a system crash. The issue is fixed by changing the order of operations during device initialization and improving error handling.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to crash (kernel BUG), leading to system instability or denial of service. If exploited or triggered, it could disrupt network functionality on affected systems using the rtw89 wifi driver.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring for kernel BUG messages related to the rtw89 driver, specifically looking for logs indicating a BUG_ON() at net/core/dev.c:6423 or invalid opcode errors during network device startup. Checking system logs (e.g., using 'dmesg' or 'journalctl') for such kernel BUG traces involving 'rtw89' or 'napi_enable' can help identify the issue. Example commands: 'dmesg | grep -i rtw89', 'journalctl -k | grep -i napi_enable'.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, update the Linux kernel to a version that includes the fix where the order of functions is switched to move netdev registration to the last step of PCI probe, and error handling in rtw89_core_register_hw() is corrected. If updating is not immediately possible, avoid starting the affected network device until a patched kernel is applied to prevent triggering the race condition and kernel BUG.