CVE-2023-53467

5.5 MEDIUM

📋 TL;DR

This vulnerability is a memory leak in the Linux kernel's rtw89 WiFi driver. When the rtw89_append_probe_req_ie() function fails to allocate memory properly, it doesn't free a network buffer (skb), causing a kernel memory leak. This affects systems using Realtek rtw89 WiFi chips with vulnerable kernel versions.

💻 Affected Systems

Products:
  • Linux kernel with rtw89 WiFi driver
Versions: Kernel versions containing vulnerable rtw89 driver code before fixes were applied
Operating Systems: Linux distributions using affected kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with Realtek rtw89 WiFi hardware using the vulnerable driver code.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Sustained exploitation could cause kernel memory exhaustion leading to system instability, crashes, or denial of service.

🟠

Likely Case

Gradual memory consumption over time requiring system reboot to recover memory.

🟢

If Mitigated

Minimal impact with proper monitoring and regular reboots.

🌐 Internet-Facing: LOW - Requires local access to WiFi interface, not directly exploitable over internet.
🏢 Internal Only: MEDIUM - Local attackers or malicious processes could trigger the leak repeatedly.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW - Triggering requires sending specific WiFi probe requests.

Exploitation requires ability to send WiFi frames to trigger the vulnerable code path.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Kernel commits: 1e336d6bab68973084a18c1e4bd78cd0bbbdcacd, 4a0e218cc9c42d1903ade8b5a371dcf48cf918c5, a10b6d73123bd480751d916575835abb615072fd

Vendor Advisory: https://git.kernel.org/stable/c/1e336d6bab68973084a18c1e4bd78cd0bbbdcacd

Restart Required: Yes

Instructions:

1. Update Linux kernel to version containing the fix commits. 2. Rebuild kernel if compiling from source. 3. Reboot system to load patched kernel.

🔧 Temporary Workarounds

Disable rtw89 WiFi driver

linux

Temporarily disable the vulnerable WiFi driver if not needed

sudo modprobe -r rtw89_core
sudo modprobe -r rtw89_pci

🧯 If You Can't Patch

  • Monitor kernel memory usage for abnormal increases
  • Implement regular system reboots to clear accumulated memory

🔍 How to Verify

Check if Vulnerable:

Check if rtw89 driver is loaded: lsmod | grep rtw89. Check kernel version against patched versions.

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version includes fix commits. Check dmesg for rtw89 driver loading without errors.

📡 Detection & Monitoring

Log Indicators:

  • Kernel OOM (Out of Memory) messages
  • System instability logs
  • WiFi driver error messages

Network Indicators:

  • Abnormal WiFi probe request patterns

SIEM Query:

source="kernel" AND ("out of memory" OR "OOM" OR "rtw89")

🔗 References

📤 Share & Export