CVE-2023-53785
BaseFortify
Publication date: 2025-12-09
Last updated on: 2025-12-09
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.1.24 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs in the Linux kernel's mt76 driver for the mt7921 wireless device. The code assumes there is enough headroom in the socket buffer (skb) for SDIO headers when preparing packets for transmission. However, this assumption is not always true, especially when packets come from the receive path of another network device and are bridged to the mt7921 device. Blindly prepending bytes without ensuring sufficient headroom can cause kernel panics. The fix involves ensuring adequate headroom by calling skb_cow_head() before adding headers, preventing these panics.
How can this vulnerability impact me? :
This vulnerability can cause kernel panics (system crashes) when bridging an MT7921-based USB 802.11ax wireless interface with an Ethernet interface under certain system configurations. This can lead to system instability and potential denial of service on affected devices, such as Intel Atom-based x86 systems or ARM-based Raspberry Pi 1 devices using specific network adapters.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by observing kernel panics related to the mt7921 driver, especially when bridging an MT7921AU-based USB 802.11ax interface with an Ethernet interface. Look for kernel panic stack traces involving skb_push and mt7921_usb_sdio_tx_prepare_skb in your system logs (e.g., using dmesg or journalctl). Specific commands to check for such panics include: 'dmesg | grep -i mt7921', 'journalctl -k | grep -i skb_panic', or monitoring kernel logs for related errors during network bridging operations.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, update your Linux kernel to a version that includes the fix where mt7921_usb_sdio_tx_prepare_skb() calls skb_cow_head() to ensure adequate headroom for SDIO headers. This fix prevents kernel panics caused by bridging MT7921 interfaces. Until the update is applied, avoid bridging the MT7921 interface with other network interfaces to prevent triggering the panic.