-

CVE-2023-53574

In the Linux kernel, the following vulnerability has been resolved:

wifi: rtw88: delete timer and free skb queue when unloading

Fix possible crash and memory leak on driver unload by deleting
TX purge timer and freeing C2H queue in 'rtw_core_deinit()',
shrink critical section in the latter by freeing COEX queue
out of TX report lock scope.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
Product Linux
Default Statusunaffected
Version < 4128b00a6006870e117ab1841e58f369e9284ecb
Version e3037485c68ec1a299ff41160d8fedbd4abc29b9
Status affected
Version < 634fcbcaa4062db39aeb5ac6ed1bc1feb8dd5216
Version e3037485c68ec1a299ff41160d8fedbd4abc29b9
Status affected
VendorLinux
Product Linux
Default Statusaffected
Version 5.2
Status affected
Version < 5.2
Version 0
Status unaffected
Version <= 6.5.*
Version 6.5.5
Status unaffected
Version <= *
Version 6.6
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.02% 0.034
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string