CVE-2023-53641
BaseFortify
Publication date: 2025-10-07
Last updated on: 2026-02-03
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 6.3 (inc) to 6.3.2 (inc) |
| linux | kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-401 | The product does not sufficiently track and release allocated memory after it has been used, making the memory unavailable for reallocation and reuse. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a memory leak in the Linux kernel's ath9k wireless driver, specifically in the hif_usb component. The issue occurs because a buffer (remain_skb) allocated during USB receive operations is not always freed if the device is deinitialized or suspended before the next expected processing call. This can cause the allocated memory to be leaked, as the code assumes the buffer will be freed during the next call, which may never happen if the device state changes.
How can this vulnerability impact me? :
The memory leak can lead to increased memory usage over time, potentially causing system instability or crashes if the leaked memory accumulates. This can degrade the performance of the affected device or system running the vulnerable Linux kernel with the ath9k driver.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, update the Linux kernel to a version where the memory leak in ath9k_hif_usb_rx_stream() has been fixed. This fix involves freeing the remain_skb explicitly when the rx urbs are deallocated, preventing memory leaks during device deinitialization or suspend. Until the update is applied, avoid frequent device deinitialization or suspend cycles that could trigger the leak.