CVE-2023-54052
Memory Leak in Linux mt7921 WiFi Driver Causing Network Disruption
Publication date: 2025-12-24
Last updated on: 2025-12-24
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| mt76 | mt7921 | * |
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is in the Linux kernel's mt76 wireless driver for the mt7921 device. It involves a problem where transmission status (txs) messages may be dropped when frames are aggregated using AMSDU. This causes some socket buffers (SKBs) to be held in the driver, leading to a temporary network stoppage. Although the issue can be recovered by txs timeout handling, the fix involves disabling txs in AMSDU to prevent the problem.
How can this vulnerability impact me? :
The impact of this vulnerability is that the network may temporarily stop working due to SKBs being held in the driver when txs messages are dropped during AMSDU aggregation. This can cause temporary network outages or interruptions in wireless connectivity.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, disable TXS (transmit status) in AMSDU aggregation on the mt7921 driver to avoid skb leaks that cause temporary network stoppage. This can be done by applying the updated Linux kernel patch that fixes the issue or by disabling AMSDU TXS if configurable in your driver settings.