CVE-2023-54036
Memory Leak in Linux Kernel rtl8xxxu WiFi Drivers (RTL8723BU, RTL8192EU
Publication date: 2025-12-24
Last updated on: 2025-12-24
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| rtl | rtl8188fu | * |
| rtl | rtl8192eu | * |
| rtl | rtl8723bu | * |
| linux | linux_kernel | * |
| linux | kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves memory leaks in the Linux kernel's rtl8xxxu wifi driver for certain combo chips (RTL8723BU and RTL8192EU). The RTL8723BU chip leaks memory when connected to a Bluetooth audio device due to busy Bluetooth traffic generating many card-to-host (C2H) messages that are not properly freed. The RTL8192EU chip leaks memory because C2H messages are added to a queue and never removed, especially after a recent change causing it to send C2H messages when the TX rate changes. The fix involves properly freeing these messages to prevent memory leaks.
How can this vulnerability impact me? :
The memory leaks caused by this vulnerability can lead to increased memory usage and potential resource exhaustion on systems using the affected wifi chips. This could degrade system performance or cause instability, especially when Bluetooth audio devices are connected and generating heavy traffic.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, update the Linux kernel to a version that includes the fix for the rtl8xxxu driver memory leaks affecting RTL8723BU and RTL8192EU chips. This fix involves proper freeing of C2H messages in the driver code. Applying the kernel update will prevent memory leaks caused by busy Bluetooth traffic and TX rate changes.